3.33.202.128

Regular View Raw Data Timeline
Last Seen: 2025-01-24

GeneralInformation

Hostnames a9e3218ca8de1820f.awsglobalaccelerator.com
Domains awsglobalaccelerator.com 
Cloud Provider Amazon
Cloud Region GLOBAL
Cloud Service GLOBALACCELERATOR
Country United States
City Seattle
Organization Amazon Technologies Inc.
ISP Amazon.com, Inc.
ASN AS16509

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2022
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
2013
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.

OpenPorts

80 / tcp
1949896279 | 2025-01-03T15:19:43.009202
443 / tcp
-553933655 | 2025-01-24T03:58:35.721123



Contact Us

Shodan ® - All rights reserved