51.195.77.13

Regular View Raw Data
Last Seen: 2024-04-28

GeneralInformation

Hostnames ip13.ip-51-195-77.eu
Domains ip-51-195-77.eu 
Country Germany
City Frankfurt am Main
Organization OVH GmbH
ISP OVH SAS
ASN AS16276
Operating System Ubuntu

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
-1672926900 | 2024-04-25T22:58:34.816390
  
21 / tcp
1022558264 | 2024-04-18T23:55:21.043554
  
22 / tcp
1116249829 | 2024-04-25T19:55:03.194642
  
25 / tcp
954483088 | 2024-04-02T20:43:56.343213
  
53 / tcp
954483088 | 2024-04-21T22:06:58.546012
  
53 / udp
589765266 | 2024-04-28T20:20:43.176144
  
80 / tcp
-542153081 | 2024-04-27T04:05:59.520333
  
110 / tcp
-2037328890 | 2024-04-17T20:18:45.646699
  
123 / udp
284488918 | 2024-04-13T23:02:19.865646
  
143 / tcp
2013617963 | 2024-04-28T22:12:24.091085
  
443 / tcp
1240221827 | 2024-04-23T07:21:20.080507
  
993 / tcp
958054138 | 2024-04-28T15:52:08.492002
  
995 / tcp
442404887 | 2024-04-09T10:10:10.482299
  
1500 / tcp
225015788 | 2024-04-27T04:39:29.243510
  
3306 / tcp
-795948505 | 2024-04-25T07:42:25.476210
  
33060 / tcp



Contact Us

Shodan ® - All rights reserved