162.19.171.188

Regular View Raw Data Timeline
Last Seen: 2025-02-28

GeneralInformation

Hostnames jump13.jump.bg
jump13.jumptestsite.com
Domains jump.bg jumptestsite.com 
Country Germany
City Frankfurt am Main
Organization OVH GmbH
ISP OVH SAS
ASN AS16276

WebTechnologies

Databases
Programming languages

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.

OpenPorts

80 / tcp
-2118162738 | 2025-02-20T12:00:04.595914
443 / tcp
-1730454250 | 2025-02-26T19:31:55.070134
2087 / tcp
1072786959 | 2025-02-28T10:20:15.424852
3306 / tcp
-109749530 | 2025-02-05T21:29:50.797976
7080 / tcp
0 | 2025-02-06T16:55:24.193278



Contact Us

Shodan ® - All rights reserved