37.187.72.216

Regular View Raw Data
Last Seen: 2024-04-18
Tags:
starttls

GeneralInformation

Hostnames cloud1.studio4host.com
cpanel.cloud1.studio4host.com
cpcalendars.cloud1.studio4host.com
cpcontacts.cloud1.studio4host.com
mail.cloud1.studio4host.com
webmail.cloud1.studio4host.com
whm.cloud1.studio4host.com
www.cloud1.studio4host.com
Domains studio4host.com 
Country France
City Calais
Organization OVH SAS
ISP OVH SAS
ASN AS16276

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
1559185454 | 2024-04-09T06:36:08.830997
  
143 / tcp
1680124887 | 2024-04-18T20:25:49.022450
  
465 / tcp
-1132241830 | 2024-03-30T04:41:29.489973
  
993 / tcp
1644662272 | 2024-04-03T23:31:55.247298
  
2083 / tcp
-1446830516 | 2024-04-12T23:56:04.737221
  
2086 / tcp
-872065689 | 2024-04-12T23:56:07.510939
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved