37.46.129.54

Regular View Raw Data
Last Seen: 2024-05-04

GeneralInformation

Hostnames vistvud.fvds.ru
yaroslavbk.fvds.ru
Domains fvds.ru 
Country Russian Federation
City Moscow
Organization JSC Datacenter
ISP JSC IOT
ASN AS29182

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
50071969 | 2024-04-29T01:17:16.635397
  
21 / tcp
923880031 | 2024-05-01T01:35:28.096504
  
22 / tcp
1745558189 | 2024-05-01T03:48:37.806487
  
25 / tcp
-844802562 | 2024-04-13T07:21:08.832895
  
53 / tcp
-844802562 | 2024-04-15T11:48:10.178732
  
53 / udp
589765266 | 2024-04-28T10:32:36.780352
  
80 / tcp
-542153081 | 2024-05-03T22:00:06.412696
  
110 / tcp
-1790328009 | 2024-05-04T19:37:01.031755
  
123 / udp
284488918 | 2024-04-15T22:45:36.304801
  
143 / tcp
2013617963 | 2024-04-29T06:34:52.520716
  
443 / tcp
-1508426819 | 2024-04-18T16:07:01.111977
  
465 / tcp
-983997548 | 2024-04-12T07:49:41.157271
  
587 / tcp
1240221827 | 2024-05-03T12:54:22.867622
  
993 / tcp
958054138 | 2024-04-18T22:58:19.471539
  
995 / tcp
-2054223523 | 2024-04-16T02:44:59.371599
  
1500 / tcp



Contact Us

Shodan ® - All rights reserved