Last Seen: 2025-04-21

GeneralInformation

sbg11.timeweb.ru
triya.ru
21 / tcp
1195864781 | 2025-03-29T14:04:49.901628
22 / tcp
-557432434 | 2025-04-21T22:02:13.749708
25 / tcp
1058998614 | 2025-04-18T00:45:48.985401
80 / tcp
619890513 | 2025-03-26T21:49:59.426412
111 / tcp
-1345205424 | 2025-03-23T23:20:44.788273
111 / udp
-1345205424 | 2025-04-04T01:58:07.752350
443 / tcp
1648903731 | 2025-04-09T02:04:14.792514
3306 / tcp
-1365782496 | 2025-04-15T13:30:59.366071
7777 / tcp
1651973090 | 2025-04-02T13:41:51.966708

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-51766
5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
2022(2)
CVE-2022-37452
9.8Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451
7.5Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
2021(1)
CVE-2021-38371
7.5The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.



Contact Us

Shodan ® - All rights reserved