141.94.89.218

Regular View Raw Data
Last Seen: 2024-05-06

GeneralInformation

Hostnames failover141-94-89-218.alvaria.io
ns3045343.ip-51-255-74.eu
jpfidistribution.com
www.jpfidistribution.com
Domains alvaria.io ip-51-255-74.eu jpfidistribution.com 
Country France
City Roubaix
Organization OVH SAS
ISP OVH SAS
ASN AS16276

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
1268676985 | 2024-04-27T00:45:30.692840
  
21 / tcp
57298795 | 2024-04-26T16:38:37.867804
  
22 / tcp
1821508822 | 2024-05-01T21:43:47.959294
  
25 / tcp
1139324419 | 2024-04-23T05:48:07.328217
  
53 / tcp
1139324419 | 2024-04-24T23:54:58.792266
  
53 / udp
-2100514759 | 2024-05-01T01:39:16.580362
  
80 / tcp
-1496860988 | 2024-04-17T14:50:21.156426
  
110 / tcp
-2037328890 | 2024-04-13T04:58:50.806555
  
123 / udp
-127552878 | 2024-05-05T04:05:26.426584
  
143 / tcp
1825274746 | 2024-05-06T03:24:56.975608
  
443 / tcp
-322042703 | 2024-05-05T15:20:21.460403
  
465 / tcp
-628402902 | 2024-05-01T10:08:10.271156
  
993 / tcp
-400889503 | 2024-05-04T15:58:45.994240
  
995 / tcp
1368327090 | 2024-04-16T10:55:43.811485
  
7080 / tcp
-1168294572 | 2024-04-24T18:29:39.251638
  
8443 / tcp



Contact Us

Shodan ® - All rights reserved