93.174.189.34

Regular View Raw Data
Last Seen: 2024-04-16
Tags:
starttls

GeneralInformation

Hostnames 4ict.ch
www.4ict.ch
Domains 4ict.ch 
Country Switzerland
City Brugg
Organization MATTI consulting
ISP Nexanet AG
ASN AS47506

WebTechnologies

CMS
JavaScript frameworks
JavaScript libraries
Programming languages

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2013-2220 Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
-575930037 | 2024-04-13T01:08:03.696437
  
21 / tcp
-355386283 | 2024-04-15T05:11:06.810016
  
25 / tcp
-2100514759 | 2024-04-16T19:19:59.687059
  
80 / tcp
-445297975 | 2024-03-20T18:08:10.263250
  
110 / tcp
1671146223 | 2024-04-16T19:20:02.420345
  
443 / tcp
-370536307 | 2024-04-12T03:47:44.469512
  
465 / tcp
-939152227 | 2024-04-03T21:18:05.108832
  
587 / tcp
-628402902 | 2024-04-13T20:26:08.235117
  
993 / tcp
994526596 | 2024-04-05T01:40:33.420760
  
995 / tcp
1717344249 | 2024-04-15T05:04:45.079690
  
8443 / tcp



Contact Us

Shodan ® - All rights reserved