136.243.44.126

Regular View Raw Data
Last Seen: 2024-04-20
Tags:
starttls

GeneralInformation

Hostnames lion.marketoracle.co.uk
gw.lion.marketoracle.co.uk
mail.gw.lion.marketoracle.co.uk
www.gw.lion.marketoracle.co.uk
Domains marketoracle.co.uk 
Country Germany
City Falkenstein
Organization Hetzner Online GmbH
ISP Hetzner Online GmbH
ASN AS24940

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 9.8Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 7.5Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 7.5The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
-949858284 | 2024-04-15T01:07:00.168664
  
53 / tcp
-949858284 | 2024-04-17T04:38:56.076989
  
53 / udp
1990976483 | 2024-04-17T17:06:25.144448
  
80 / tcp
1952082069 | 2024-04-02T20:34:14.873049
  
110 / tcp
1559185454 | 2024-04-04T15:10:08.648243
  
143 / tcp
-1695648236 | 2024-04-17T05:11:14.567456
  
443 / tcp
-574062330 | 2024-04-15T21:58:18.963683
  
465 / tcp
-1109810394 | 2024-03-22T13:02:45.398602
  
587 / tcp
-1132241830 | 2024-04-20T06:04:36.557948
  
993 / tcp
-1001764030 | 2024-04-10T12:55:22.990494
  
995 / tcp
-509698167 | 2024-04-16T20:44:40.560891
  
2082 / tcp
118941334 | 2024-03-25T14:48:37.465573
  
2083 / tcp
1985104264 | 2024-04-16T02:08:48.191456
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved