Last Seen: 2025-04-25

GeneralInformation

mcc-clr14.com
nasushika.com
    www.nasushika.com

WebTechnologies

Font scripts
JavaScript libraries
Tag managers
25 / tcp
-1529448945 | 2025-03-28T11:31:32.256910
80 / tcp
645632024 | 2025-04-23T18:38:09.140677
143 / tcp
-127552878 | 2025-04-20T09:26:22.149552
443 / tcp
1651563877 | 2025-04-25T11:47:21.702039
465 / tcp
-1333168038 | 2025-04-19T19:26:21.422888
587 / tcp
-1529448945 | 2025-04-19T22:33:25.657387
993 / tcp
-628402902 | 2025-04-06T13:06:41.564122
995 / tcp
1840914556 | 2025-04-23T08:55:39.061274

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved