Last Seen: 2025-04-26
Tags:
starttls

GeneralInformation

cimail.de
178.171.72.212.reverse.server4all.de
xendach.de
    www.xendach.de

WebTechnologies

Databases
Hosting panels
JavaScript frameworks
JavaScript libraries
Message boards
Miscellaneous
Programming languages
21 / tcp
-1011076811 | 2025-04-17T06:27:13.165919
22 / tcp
-266584572 | 2025-04-18T03:33:11.266588
25 / tcp
-1634533185 | 2025-03-31T14:46:41.052146
80 / tcp
-2100514759 | 2025-04-24T20:59:14.562665
110 / tcp
2026722839 | 2025-04-23T03:20:55.329951
143 / tcp
2129779237 | 2025-04-15T02:05:39.230938
443 / tcp
-2046638731 | 2025-04-26T23:40:21.043341
465 / tcp
-697148857 | 2025-04-21T12:14:33.924869
587 / tcp
-30743033 | 2025-04-26T07:46:22.557316
995 / tcp
59278903 | 2025-04-23T15:59:23.533888
8443 / tcp
1552397658 | 2025-04-25T20:36:15.086036

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved