Last Seen: 2025-04-22

GeneralInformation

pkstarnow.pl

WebTechnologies

Databases
Miscellaneous
Programming languages
UI frameworks
WordPress plugins
80 / tcp
-1903558660 | 2025-04-22T15:39:06.152442
443 / tcp
-903639014 | 2025-04-22T12:00:26.975654
2082 / tcp
1201155578 | 2025-04-22T14:10:09.450736
2083 / tcp
141477257 | 2025-04-22T11:42:40.247141
2086 / tcp
-1223880532 | 2025-04-22T10:23:54.707753
2087 / tcp
-2094089606 | 2025-04-22T15:13:30.788758
8080 / tcp
1608457919 | 2025-04-22T11:59:10.131665
8443 / tcp
141477257 | 2025-04-22T15:33:01.149169
8880 / tcp
1133671788 | 2025-04-22T14:20:43.079826

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved