198.178.121.76

Regular View Raw Data
Last Seen: 2024-05-21

GeneralInformation

Hostnames 198-178-121-76.static.hvvc.us
cp13.shoutcheap.com
server13.shoutcheap.com
Domains hvvc.us shoutcheap.com 
Country United States
City Tampa
Organization HIVELOCITY, Inc.
ISP HIVELOCITY, Inc.
ASN AS29802

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
CVE-2021-27216 6.3Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.
CVE-2020-8015 7.2A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2020-28026 9.3Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
CVE-2020-28025 5.0Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
CVE-2020-28024 7.5Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
CVE-2020-28023 5.0Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
CVE-2020-28022 7.5Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
CVE-2020-28021 9.0Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
CVE-2020-28019 5.0Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.
CVE-2020-28018 7.5Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
CVE-2020-28017 7.5Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
CVE-2020-28016 7.2Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
CVE-2020-28015 7.2Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
CVE-2020-28014 5.6Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
CVE-2020-28013 7.2Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
CVE-2020-28012 7.2Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
CVE-2020-28011 7.2Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
CVE-2020-28010 7.2Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
CVE-2020-28009 7.2Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
CVE-2020-28008 7.2Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
CVE-2020-28007 7.2Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
CVE-2020-12783 5.0Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
-1600491390 | 2024-05-11T14:52:34.912079
  
21 / tcp
-997029380 | 2024-05-17T13:59:30.959818
  
53 / tcp
-997029380 | 2024-05-18T02:23:38.346909
  
53 / udp
1054644503 | 2024-05-17T13:00:37.404240
  
80 / tcp
1952082069 | 2024-05-19T05:45:20.931188
  
110 / tcp
1559185454 | 2024-05-11T13:36:30.602948
  
143 / tcp
1054644503 | 2024-05-19T10:22:52.605959
  
443 / tcp
-291372437 | 2024-05-12T14:08:06.089759
  
465 / tcp
963764725 | 2024-05-21T01:58:21.913830
  
587 / tcp
-1132241830 | 2024-05-12T00:20:20.081093
  
993 / tcp
-1001764030 | 2024-05-19T05:47:17.619848
  
995 / tcp
-1922445364 | 2024-05-20T13:07:44.247617
  
2077 / tcp
-1922445364 | 2024-05-18T07:27:20.797451
  
2079 / tcp
-818011804 | 2024-05-19T00:11:29.422110
  
2082 / tcp
1884022552 | 2024-05-20T17:27:08.042413
  
2083 / tcp
1208910183 | 2024-05-09T06:50:31.272716
  
2086 / tcp
1470090616 | 2024-05-18T12:49:02.437638
  
2087 / tcp
1094093579 | 2024-05-11T03:36:20.855461
  
2121 / tcp
-2105859950 | 2024-05-14T01:44:05.003206
  
3306 / tcp
-297704816 | 2024-05-03T16:15:46.863484
  
8004 / tcp
817756659 | 2024-05-13T09:30:44.862867
  
8008 / tcp
-1354853456 | 2024-05-14T17:11:36.966547
  
8010 / tcp
1400064181 | 2024-04-24T05:09:32.579296
  
8012 / tcp
732749862 | 2024-04-29T21:44:40.688567
  
8020 / tcp
1560764355 | 2024-05-04T02:03:34.377581
  
8023 / tcp
-297704816 | 2024-05-05T00:51:37.098196
  
8028 / tcp
309466186 | 2024-04-30T18:44:25.409960
  
8041 / tcp
-297704816 | 2024-05-03T10:32:24.914079
  
8042 / tcp
1143782482 | 2024-05-17T10:47:38.889486
  
8056 / tcp
-140523196 | 2024-05-18T21:13:37.697908
  
8060 / tcp
-297704816 | 2024-05-15T17:27:34.868969
  
8069 / tcp
1180497154 | 2024-05-17T22:36:26.329671
  
8080 / tcp
1450190285 | 2024-05-19T15:56:28.751393
  
8089 / tcp
-977426880 | 2024-05-09T04:11:54.912248
  
8091 / tcp
-368098200 | 2024-05-07T14:03:45.361798
  
8097 / tcp
1560764355 | 2024-05-17T17:37:25.949206
  
8099 / tcp
263991313 | 2024-05-15T03:04:46.451084
  
8100 / tcp
1472897007 | 2024-05-18T13:36:59.065659
  
8104 / tcp
-1675211142 | 2024-05-20T04:06:02.597666
  
8112 / tcp
-476686559 | 2024-05-08T22:36:15.212970
  
8184 / tcp
-1937397019 | 2024-05-21T05:31:38.220952
  
8200 / tcp
-1123595879 | 2024-05-03T12:42:36.096941
  
8237 / tcp
-82365790 | 2024-05-02T22:20:12.384880
  
8333 / tcp
1560764355 | 2024-04-28T12:38:20.413932
  
8416 / tcp
1629981774 | 2024-04-27T07:31:17.001104
  
8420 / tcp
-1675211142 | 2024-04-23T17:57:07.722141
  
8448 / tcp
-1309520258 | 2024-05-06T01:07:21.856323
  
8500 / tcp



Contact Us

Shodan ® - All rights reserved