45.60.5.160

Regular View Raw Data Timeline
Last Seen: 2025-03-18

GeneralInformation

Hostnames bisa.org
catalystsofchange.org
cimmyt.org
csisa.org
hedwic.org
imperva.com
iwyp.org
maize.org
masagro.mx
scalingscan.org
seedsofdiscovery.org
wheat.org
Domains bisa.org catalystsofchange.org cimmyt.org csisa.org hedwic.org imperva.com iwyp.org maize.org masagro.mx scalingscan.org seedsofdiscovery.org wheat.org 
Country Israel
City Reẖovot
Organization Incapsula Inc
ISP Incapsula Inc
ASN AS19551

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(2)
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2022(1)
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
2013(5)
CVE-2013-4365
7.5Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
CVE-2013-2765
5.0The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2013-0942
4.3Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2013-0941
2.1EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
2012(3)
CVE-2012-4360
4.3Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4001
5.0The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
CVE-2012-3526
5.0The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
2011(2)
CVE-2011-2688
7.5SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
CVE-2011-1176
4.3The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
2009(2)
CVE-2009-2299
5.0The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
CVE-2009-0796
2.6Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
2007(2)
CVE-2007-4723
7.5Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.

OpenPorts

1121255380818283889711913514318924338944344446548555455658763163677188599599810241029111111771200120712341293133714001433152118831935195319561957196719681975198119821986198920002077208220832086208721072121222223452375237624042433248027613000300130503165325632693299330633333349336533893790400040404064407241504159416542444344440144344443444444494463450045024528456746434848491150005001500250055007501050835120513051505180520152225226522852395246525052515257526152625269527052745277527852795443550355555560560156205640568057015721580059005901590259125938598459855986599259935996599759986000600160616080633163806443648267006779700170257050708370877088717174037443747475107547777777798000800180088009801080608069808080838085808680898090809881128123812681398140818181888200844184438451845385048519852085238529853285438545854985548557856285638571857585768577857985818592859485988704870887248731880088348880888888898899900090019002900990519052905590649066906790729073907590809087909090919095910091179122913091319132913791389141914291519152915391599160916591739178918191839186919191959196920092439306935093989443950195309600971098009876994399989999100011005110134103801044310894111011148111680117011200012345130471357914147143441489715002154431601016030168001683118080180811836818443190002000020080201002010620208205122080020900210012108121083227032500025001250022500425006280803010430112301223089431017313373144331444321023312235000355224290144100443044433344334443364500045001450034600149080496944976750000500225005050100501015010350122502025132254022546225472254922550005844359443600016044363443
25 / tcp
-439406069 | 2025-03-14T00:55:47.119937
80 / tcp
2109005458 | 2025-02-19T16:55:00.166006
81 / tcp
-2127773461 | 2025-03-14T22:15:48.151124
82 / tcp
-588165733 | 2025-03-11T21:09:16.479244
83 / tcp
-516289610 | 2025-03-10T13:35:30.899009
88 / tcp
1934779614 | 2025-02-22T02:10:33.913251
135 / tcp
-1687415680 | 2025-03-18T06:12:03.524992
389 / tcp
1269865345 | 2025-03-09T08:15:16.587114
443 / tcp
0 | 2025-03-17T07:37:11.303892
444 / tcp
1345605003 | 2025-03-13T11:18:51.947371
465 / tcp
1187040052 | 2025-03-16T00:59:51.297592
554 / tcp
-1137664635 | 2025-03-12T13:30:25.824043
587 / tcp
-1137326470 | 2025-03-13T15:10:31.268822
631 / tcp
-1457832768 | 2025-03-17T01:49:11.779852
636 / tcp
-272243324 | 2025-03-08T18:32:38.180348
771 / tcp
-1159899945 | 2025-03-09T12:45:52.075352
1024 / tcp
527867357 | 2025-03-05T21:38:13.105806
1177 / tcp
1098839493 | 2025-03-13T18:41:37.971506
1234 / tcp
-557712663 | 2025-02-26T23:44:44.631933
1337 / tcp
477511029 | 2025-03-13T08:08:57.471968
1400 / tcp
-806994208 | 2025-03-09T09:09:58.695088
1433 / tcp
-1151560697 | 2025-03-09T04:48:00.662724
1521 / tcp
823199850 | 2025-03-16T05:37:48.622852
1935 / tcp
-1932813229 | 2025-03-07T08:28:24.336509
2000 / tcp
-904992003 | 2025-03-13T09:17:46.227452
2082 / tcp
1063687535 | 2025-03-12T09:43:48.969684
2083 / tcp
385861541 | 2025-03-08T21:16:40.839813
2086 / tcp
-382586291 | 2025-03-15T19:34:16.430583
2222 / tcp
334780027 | 2025-03-16T23:36:19.451412
2345 / tcp
765791922 | 2025-02-23T13:13:18.845243
2375 / tcp
-1037969233 | 2025-03-15T01:04:11.419492
2376 / tcp
627239342 | 2025-03-13T04:22:29.774612
2404 / tcp
2106564534 | 2025-03-17T20:46:52.926722
2480 / tcp
-1675039761 | 2025-03-17T21:53:17.798235
2761 / tcp
1811137348 | 2025-02-26T14:09:33.011269
3000 / tcp
2117687049 | 2025-02-24T15:30:48.593709
3001 / tcp
-272463735 | 2025-03-17T02:29:28.249062
3050 / tcp
214547726 | 2025-02-27T01:24:01.113105
3256 / tcp
-1848938859 | 2025-03-14T18:20:13.906907
3269 / tcp
602385078 | 2025-03-16T22:33:09.942296
3299 / tcp
-1672125130 | 2025-02-22T23:07:22.612385
3333 / tcp
990274903 | 2025-03-10T12:06:44.260659
3389 / tcp
15853193 | 2025-03-17T19:56:47.117833
3790 / tcp
442389069 | 2025-03-12T09:29:42.160495
4000 / tcp
2045802700 | 2025-03-16T03:13:47.670009
4040 / tcp
1186271840 | 2025-03-07T10:20:33.666304
4064 / tcp
0 | 2025-02-21T11:51:37.064998
4150 / tcp
-1880964417 | 2025-03-09T21:16:32.101858
4434 / tcp
-741397389 | 2025-03-13T19:11:52.001455
4443 / tcp
-189365540 | 2025-03-10T01:16:20.418909
4444 / tcp
-181506450 | 2025-03-14T20:41:44.002041
4500 / tcp
1994443791 | 2025-03-09T18:47:19.903231
4567 / tcp
1048395547 | 2025-03-04T15:45:57.280097
4848 / tcp
17612367 | 2025-03-17T14:10:27.166350
4911 / tcp
-727967853 | 2025-03-09T19:00:03.334720
5000 / tcp
-1482907798 | 2025-02-28T12:39:08.998343
5001 / tcp
1337044544 | 2025-03-14T12:14:03.631951
5002 / tcp
834304641 | 2025-02-28T09:22:51.856499
5005 / tcp
-1518200073 | 2025-03-11T08:00:13.804880
5007 / tcp
1374575529 | 2025-02-27T09:13:19.080735
5010 / tcp
1766319697 | 2025-03-18T00:34:04.613903
5201 / tcp
-1591440226 | 2025-03-15T20:17:49.228378
5222 / tcp
-265916201 | 2025-03-10T12:59:29.018445
5555 / tcp
1232772483 | 2025-03-15T03:36:06.911437
5560 / tcp
334639064 | 2025-03-08T18:56:44.130277
5601 / tcp
927516084 | 2025-03-15T07:37:44.366952
5900 / tcp
878444489 | 2025-03-10T06:29:58.172292
5985 / tcp
1450787512 | 2025-02-23T01:58:16.100516
5986 / tcp
1512334335 | 2025-03-14T00:32:54.997717
6000 / tcp
-395752997 | 2025-03-17T13:26:39.346481
6001 / tcp
53164292 | 2025-03-10T10:06:31.180892
6080 / tcp
-447781088 | 2025-03-15T00:20:24.792089
6443 / tcp
-1569770562 | 2025-02-22T21:46:08.169955
7001 / tcp
-1330448595 | 2025-03-16T06:26:33.970494
7171 / tcp
-2039566341 | 2025-03-07T10:16:19.282890
7443 / tcp
1088332649 | 2025-03-17T00:29:55.480107
7474 / tcp
-86719825 | 2025-02-26T19:09:41.367698
7547 / tcp
1618126341 | 2025-03-09T22:25:42.634327
7777 / tcp
-945164191 | 2025-03-15T13:35:44.049879
7779 / tcp
-1529188299 | 2025-03-17T23:14:35.996698
8000 / tcp
-1535579202 | 2025-02-28T06:46:00.231764
8001 / tcp
-1545382551 | 2025-03-17T15:22:53.948838
8008 / tcp
530953719 | 2025-03-11T08:01:57.819566
8009 / tcp
-1331583911 | 2025-03-05T19:10:13.374518
8010 / tcp
374659262 | 2025-03-13T12:10:22.040448
8060 / tcp
-1092018089 | 2025-03-15T07:33:28.590660
8069 / tcp
-2032490592 | 2025-03-12T03:06:17.087627
8080 / tcp
1798856851 | 2025-03-09T09:16:22.285876
8083 / tcp
-1304885076 | 2025-03-18T06:40:12.031978
8085 / tcp
1890444338 | 2025-03-17T23:06:34.112900
8086 / tcp
-671139118 | 2025-03-05T00:17:02.522796
8089 / tcp
-828574160 | 2025-03-05T06:58:31.519030
8090 / tcp
403115409 | 2025-03-11T02:46:41.518235
8098 / tcp
-310511190 | 2025-03-12T16:01:57.431196
8112 / tcp
-1009534864 | 2025-03-06T07:38:10.740286
8123 / tcp
-1095662419 | 2025-03-17T02:33:48.563089
8126 / tcp
1103385569 | 2025-03-17T13:32:00.783811
8139 / tcp
1133945343 | 2025-03-12T12:32:19.523636
8140 / tcp
-1198237241 | 2025-03-15T06:20:40.828671
8181 / tcp
149932368 | 2025-03-05T09:39:49.856855
8188 / tcp
-915092169 | 2025-03-17T07:03:59.459220
8200 / tcp
-373896445 | 2025-03-15T10:17:05.733104
8443 / tcp
614513872 | 2025-03-10T06:54:32.012841
8800 / tcp
-1995566931 | 2025-03-13T17:53:03.119239
8834 / tcp
490941163 | 2025-03-12T10:29:02.209240
8880 / tcp
897819325 | 2025-03-13T02:07:23.077576
8888 / tcp
-1541004531 | 2025-02-19T08:02:11.918221
8889 / tcp
954727649 | 2025-03-08T15:51:30.381867
8899 / tcp
286696320 | 2025-03-15T15:05:19.391163
9000 / tcp
299210840 | 2025-03-18T10:16:14.501923
9001 / tcp
1023273268 | 2025-02-27T12:28:57.337197
9002 / tcp
-1025246223 | 2025-02-23T07:32:21.475579
9009 / tcp
208352971 | 2025-03-11T15:21:55.933887
9080 / tcp
200635489 | 2025-03-17T14:45:10.811782
9090 / tcp
-1616541590 | 2025-02-28T02:44:12.366425
9091 / tcp
-582072214 | 2025-03-04T14:10:37.497278
9095 / tcp
608068869 | 2025-03-16T15:55:05.063512
9100 / tcp
601745761 | 2025-03-13T05:22:21.645966
9200 / tcp
-1496007405 | 2025-03-07T14:06:48.167689
9306 / tcp
-1558579822 | 2025-03-05T21:59:07.036212
9398 / tcp
920065728 | 2025-03-13T19:08:37.770345
9443 / tcp
1553266614 | 2025-03-15T11:35:51.058798
9600 / tcp
-906843111 | 2025-03-12T08:46:22.675110
9876 / tcp
-1222181210 | 2025-03-17T00:30:10.643687
9943 / tcp
-1346171589 | 2025-03-08T19:27:54.501020
9998 / tcp
-1600241868 | 2025-03-14T14:19:13.054871
9999 / tcp
974976488 | 2025-03-06T20:09:44.007266
10001 / tcp
860317815 | 2025-02-27T06:33:30.301575
10051 / tcp
-1688236625 | 2025-03-14T15:10:59.304757
10134 / tcp
-2067028711 | 2025-03-05T13:52:09.012963
10443 / tcp
-1797896010 | 2025-03-15T01:06:42.800896
12000 / tcp
2134650195 | 2025-03-11T08:40:10.994630
12345 / tcp
1151339225 | 2025-03-15T14:47:54.831298
13047 / tcp
1909467107 | 2025-03-11T22:25:51.049492
13579 / tcp
-1699854024 | 2025-02-25T09:22:12.856909
15443 / tcp
-883053154 | 2025-03-14T04:41:09.486687
16010 / tcp
67589150 | 2025-03-07T17:09:19.847863
16030 / tcp
948416694 | 2025-03-17T22:36:29.709768
18080 / tcp
-935589286 | 2025-03-17T16:01:02.640152
18081 / tcp
1468783581 | 2025-03-17T06:27:45.233831
18443 / tcp
-93469285 | 2025-03-15T09:45:14.605019
20000 / tcp
-1607113493 | 2025-03-06T02:59:00.518263
28080 / tcp
1321800500 | 2025-03-10T23:58:12.437419
31337 / tcp
2146747596 | 2025-03-05T23:28:47.140316
31443 / tcp
88158622 | 2025-03-12T18:02:24.889984
33122 / tcp
-1163279189 | 2025-03-04T13:51:31.951859
35522 / tcp
732095446 | 2025-03-17T02:05:22.623473
50000 / tcp
566188902 | 2025-03-18T03:56:10.100178
50022 / tcp
564131715 | 2025-02-22T11:33:12.962125
50050 / tcp
-1012923631 | 2025-03-16T12:54:04.280620
50122 / tcp
-2130310130 | 2025-02-22T08:43:05.016959
51322 / tcp
5199897 | 2025-02-21T09:24:13.145220
54022 / tcp
1737425664 | 2025-02-19T04:42:08.185120
54622 / tcp
2106706287 | 2025-02-18T14:35:02.790725
54722 / tcp
-1449288650 | 2025-02-18T13:49:11.032115
54922 / tcp
1091351820 | 2025-03-07T08:44:06.149240
55000 / tcp
-466850206 | 2025-03-17T03:38:14.775126
60001 / tcp
-276789701 | 2025-03-15T02:11:50.639093



Contact Us

Shodan ® - All rights reserved