153.122.14.78

Regular View Raw Data
Last Seen: 2024-04-18

GeneralInformation

Country Japan
City Yashio
Organization DIX Co., Ltd.
ISP GMO GlobalSign Holdings K.K.
ASN AS131921

WebTechnologies

JavaScript frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2017-12419 4.0If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
CVE-2009-2942 7.5The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
-1572172664 | 2024-03-31T18:57:12.509546
  
25 / tcp
-252872138 | 2024-04-18T09:14:17.646465
  
53 / tcp
-252872138 | 2024-03-25T23:56:19.149696
  
53 / udp
-260788852 | 2024-04-09T03:16:06.290000
  
80 / tcp
115487969 | 2024-04-15T02:53:22.625294
  
143 / tcp
-260788852 | 2024-04-18T15:17:42.382257
  
443 / tcp
-1572172664 | 2024-04-01T21:48:50.735457
  
587 / tcp
1055293435 | 2024-04-17T12:24:12.678114
  
993 / tcp
603225731 | 2024-04-18T01:27:14.392455
  
995 / tcp
727677714 | 2024-04-18T19:43:49.390789
  
3306 / tcp
-1357151464 | 2024-04-05T09:04:28.798967
  
8443 / tcp
2040589708 | 2024-04-04T17:33:34.906055
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved