107.161.187.146

Regular View Raw Data
Last Seen: 2024-04-19
Tags:
starttls

GeneralInformation

Hostnames dirtsheet.org
cpanel.dirtsheet.org
cpcalendars.dirtsheet.org
cpcontacts.dirtsheet.org
mail.dirtsheet.org
webdisk.dirtsheet.org
webmail.dirtsheet.org
www.dirtsheet.org
server.pwpix.net
autoconfig.server.pwpix.net
autodiscover.server.pwpix.net
cpanel.server.pwpix.net
cpcalendars.server.pwpix.net
cpcontacts.server.pwpix.net
ipv6.server.pwpix.net
mail.server.pwpix.net
webdisk.server.pwpix.net
webmail.server.pwpix.net
whm.server.pwpix.net
www.server.pwpix.net
Domains dirtsheet.org pwpix.net 
Country United States
City Lockhart
Organization HostDime.com, Inc.
ISP HostDime.com, Inc.
ASN AS33182

WebTechnologies

Advertising
Analytics

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2022-31629 6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628 5.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2020-11579 7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2019-9641 9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639 7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638 7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637 7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2018-19396 7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395 7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2017-8923 9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963 7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7272 7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2015-9253 6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2013-2220 Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
-1725875958 | 2024-04-14T19:16:39.329773
  
21 / tcp
418007666 | 2024-04-01T21:22:21.998327
  
53 / udp
1965836571 | 2024-04-18T09:00:23.383879
  
80 / tcp
1952082069 | 2024-04-05T20:50:33.633581
  
110 / tcp
-1840661537 | 2024-04-17T20:18:30.985228
  
443 / tcp
-1375370737 | 2024-03-25T01:39:32.934221
  
587 / tcp
-1132241830 | 2024-04-19T10:26:41.996384
  
993 / tcp
-1001764030 | 2024-04-10T07:42:03.720522
  
995 / tcp
-65659974 | 2024-04-16T17:25:10.619138
  
2077 / tcp
-1983394172 | 2024-04-14T20:14:55.323724
  
2082 / tcp
-844135315 | 2024-04-17T12:06:57.555752
  
2083 / tcp
1682626468 | 2024-04-17T20:18:24.710743
  
2086 / tcp
-1515298176 | 2024-04-17T20:18:27.839120
  
2087 / tcp
1004010486 | 2024-03-21T10:18:08.601425
  
2095 / tcp
673727573 | 2024-03-27T19:58:59.419077
  
2096 / tcp



Contact Us

Shodan ® - All rights reserved