91.212.213.35

Regular View Raw Data
Last Seen: 2024-05-11

GeneralInformation

Hostnames mail.archeotour.ge
mail.bazari.ge
mail.discovergeorgia.ge
mail.easy.ge
mail.feso.ge
mail.gmpmetal.ge
mail.ibooks.ge
mail.kardanakhiestate.ge
mail.keune.ge
mail.pdc.ge
mail.qualship.com.ge
www25.serv.ge
mail.smarthouse.ge
mail.tsignieri.ge
mail.unfounddoor.ge
Domains archeotour.ge bazari.ge discovergeorgia.ge easy.ge feso.ge gmpmetal.ge ibooks.ge kardanakhiestate.ge keune.ge pdc.ge qualship.com.ge serv.ge smarthouse.ge tsignieri.ge unfounddoor.ge 
Country Georgia
City Tbilisi
Organization Proservice LLC
ISP Proservice LLC
ASN AS47810

WebTechnologies

JavaScript libraries
Programming languages
UI frameworks
Webmail

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
265023944 | 2024-04-25T21:50:34.241442
  
21 / tcp
-1710562805 | 2024-04-28T11:34:49.923858
  
25 / tcp
1088451672 | 2024-04-22T18:34:00.845017
  
53 / tcp
1088451672 | 2024-05-10T19:37:22.849032
  
53 / udp
-94754811 | 2024-05-03T19:01:43.947504
  
80 / tcp
-1463518829 | 2024-05-10T16:52:19.992071
  
110 / tcp
105017197 | 2024-05-03T04:15:33.723769
  
143 / tcp
-1593144055 | 2024-05-09T01:50:01.987262
  
443 / tcp
1654597332 | 2024-05-04T04:33:49.247768
  
465 / tcp
-1935227322 | 2024-04-24T07:52:01.544832
  
587 / tcp
587770568 | 2024-05-05T01:53:14.597005
  
993 / tcp
-1407073078 | 2024-05-05T10:18:30.244719
  
995 / tcp
669445267 | 2024-05-05T09:17:02.533512
  
2222 / tcp
817043922 | 2024-05-11T12:22:44.930371
  
3306 / tcp



Contact Us

Shodan ® - All rights reserved