191.101.13.118

Regular View Raw Data Timeline
Last Seen: 2025-03-12
Tags:
eol-product

GeneralInformation

Hostnames trebuo.com
www.trebuo.com
Domains trebuo.com 
Country United States
City Phoenix
Organization Internet Utilities Europe and Asia Limited
ISP Hostinger International Limited
ASN AS47583

WebTechnologies

Blogs
Databases
Ecommerce
Font scripts
Form builders
Hosting
Miscellaneous
Page builders
Programming languages
Recruitment & staffing
Web servers
WordPress themes

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.

OpenPorts

80 / tcp
-1510829672 | 2025-03-10T04:08:23.718081
443 / tcp
-964268985 | 2025-03-12T16:04:52.127506



Contact Us

Shodan ® - All rights reserved