185.9.147.44

Regular View Raw Data
Last Seen: 2024-04-24

GeneralInformation

Hostnames 2110771.ru
www.2110771.ru
b-art.ru
Domains 2110771.ru b-art.ru 
Country Russian Federation
City Balashikha
Organization SmartApe OU
ISP LLC Smart Ape
ASN AS56694

WebTechnologies

Databases
Form builders
JavaScript libraries
Mobile frameworks
Photo galleries
Programming languages
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2022-31629 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2020-11579 5.0An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2017-8923 7.5The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
536694747 | 2024-04-13T03:17:21.904953
  
21 / tcp
-766474136 | 2024-04-13T05:43:25.973317
  
25 / tcp
-138298183 | 2024-04-21T23:21:43.638562
  
53 / udp
-2127283057 | 2024-04-23T14:28:36.263151
  
80 / tcp
-57774420 | 2024-04-08T11:13:56.257023
  
110 / tcp
-1345205424 | 2024-03-26T22:05:53.670503
  
111 / tcp
-1345205424 | 2024-04-17T14:23:50.431847
  
111 / udp
1772670717 | 2024-04-22T09:42:35.220879
  
123 / udp
312936668 | 2024-04-15T07:26:37.860936
  
143 / tcp
-1123409298 | 2024-04-22T21:21:21.626321
  
443 / tcp
-394598213 | 2024-04-23T23:35:42.266558
  
465 / tcp
-1454436874 | 2024-04-20T15:04:14.024178
  
587 / tcp
-1830824801 | 2024-04-24T08:51:15.165118
  
995 / tcp
-679774274 | 2024-04-18T09:55:05.415196
  
3306 / tcp
-1621004056 | 2024-04-02T07:37:11.717722
  
3310 / tcp



Contact Us

Shodan ® - All rights reserved