Last Seen: 2025-04-24
Tags:
cdn

GeneralInformation

erkedanismanlik.com
vankesselolie.nl

WebTechnologies

Miscellaneous
80 / tcp
-1644918983 | 2025-04-24T13:34:09.552303
443 / tcp
0 | 2025-04-24T18:17:53.584587
2082 / tcp
-114791519 | 2025-04-04T05:51:36.448330
2083 / tcp
141477257 | 2025-04-22T17:40:41.521911
2087 / tcp
71128129 | 2025-04-23T03:47:22.624081
8080 / tcp
-548240438 | 2025-04-18T03:59:12.736844
8443 / tcp
0 | 2025-04-24T14:40:25.357310
8880 / tcp
-1820703459 | 2025-04-24T11:17:03.612400

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-1219
5.3In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved