Author Topic: No such app... heroku gunicorn/19.6.0. & cowboy webserver vulnerabilities?  (Read 1140 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34054
  • malware fighter
Could load balancer code being exploited here ? -> -http://ec2-46-137-180-193.eu-west-1.compute.amazonaws.com/
Re: http://toolbar.netcraft.com/site_report?url=http://ec2-46-137-180-193.eu-west-1.compute.amazonaws.com
F-A- F-X status: https://observatory.mozilla.org/analyze.html?host=ec2-46-137-180-193.eu-west-1.compute.amazonaws.com
Invalid certificate chain: https://hstspreload.org/?domain=ec2-46-137-180-193.eu-west-1.compute.amazonaws.com
That is why I asked myself is it exploitable?

Where found such build? -> -https://energyelephant.com/blog (gunicom & erlang software)...
despite of the fact that the COMODO RSA certificate came installed correctly.

MX-records duplicates: http://www.dnsinspect.com/energyelephant.com/10024453

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!