212.223.156.97

Regular View Raw Data
Last Seen: 2024-05-07

GeneralInformation

Hostnames srv01.24600.serviceprovider.de
Domains serviceprovider.de 
Country Germany
City Augsburg
Organization Saum & Viebahn GmbH & Co.KG
ISP Ratiokontakt GmbH
ASN AS8741

WebTechnologies

JavaScript frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2017-12419 4.0If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
CVE-2009-2942 7.5The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
602573989 | 2024-05-07T01:42:20.297017
  
21 / tcp
-1635871600 | 2024-05-04T06:02:07.298918
  
25 / tcp
-1677390369 | 2024-04-22T22:48:04.038648
  
53 / tcp
-1677390369 | 2024-05-07T12:11:42.202696
  
53 / udp
-575154173 | 2024-05-02T22:10:27.737558
  
80 / tcp
-575154173 | 2024-05-04T03:42:09.361935
  
443 / tcp
-1935335942 | 2024-04-13T16:12:09.646537
  
465 / tcp
1592863260 | 2024-05-05T00:32:48.765475
  
993 / tcp
-424109003 | 2024-04-26T00:30:16.968917
  
995 / tcp
818595598 | 2024-05-01T17:56:04.141526
  
3306 / tcp
-315561832 | 2024-05-06T04:48:35.360529
  
8443 / tcp
-1338212327 | 2024-04-15T01:53:54.503343
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved