Last Seen: 2025-04-28

GeneralInformation

strixner.com
    www.strixner.com

WebTechnologies

Blogs
Databases
Ecommerce
JavaScript libraries
Programming languages
25 / tcp
-133826240 | 2025-04-17T18:36:50.986536
53 / tcp
-1602215730 | 2025-04-24T22:27:10.742647
80 / tcp
-2100514759 | 2025-04-18T23:10:13.309653
110 / tcp
502189025 | 2025-04-28T08:08:08.297866
143 / tcp
-127552878 | 2025-03-31T12:17:18.162683
443 / tcp
472502039 | 2025-04-28T15:20:58.829490
465 / tcp
1200545442 | 2025-04-28T03:52:35.800390
993 / tcp
-628402902 | 2025-04-15T22:49:52.003823
995 / tcp
-734493965 | 2025-04-28T14:16:56.455426
8880 / tcp
-763526241 | 2025-04-20T16:37:00.304554

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved