151.80.33.80

Regular View Raw Data
Last Seen: 2024-05-07

GeneralInformation

Hostnames imap.mrap.fr
malcomx.mrap.fr
nanterre.mrap.fr
smtp.mrap.fr
Domains mrap.fr 
Country France
City Gravelines
Organization OVH SAS
ISP OVH SAS
ASN AS16276

WebTechnologies

JavaScript libraries
Programming languages

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2024-23659 SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the name of an uploaded file. This is related to javascript/bigup.js and javascript/bigup.utils.js.
CVE-2023-52322 ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.
CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-24258 SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2022-37155 RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
-951529641 | 2024-04-30T19:07:53.784219
  
25 / tcp
401469826 | 2024-05-07T08:21:43.134672
  
53 / tcp
401469826 | 2024-04-17T17:44:12.697783
  
53 / udp
-567627901 | 2024-05-04T00:07:59.722320
  
80 / tcp
1225844093 | 2024-04-28T20:15:31.191260
  
443 / tcp
1429263033 | 2024-04-12T18:53:10.997571
  
465 / tcp
-1240713744 | 2024-05-05T01:04:06.825955
  
587 / tcp
1535088112 | 2024-05-05T08:48:13.166028
  
993 / tcp
468769230 | 2024-05-04T02:07:40.608334
  
3306 / tcp



Contact Us

Shodan ® - All rights reserved