Last Seen: 2025-04-28

GeneralInformation

medikapet.com
stupefied-margulis.49-13-54-50.plesk.page
static.57.216.75.5.clients.your-server.de

WebTechnologies

Hosting panels
JavaScript frameworks
21 / tcp
2013440974 | 2025-04-15T04:36:51.954919
22 / tcp
-1483686344 | 2025-04-23T22:44:36.008306
25 / tcp
291976367 | 2025-04-28T14:09:39.634154
53 / udp
-197663159 | 2025-04-27T09:02:53.751069
80 / tcp
-2100514759 | 2025-04-25T12:25:26.647896
110 / tcp
-1135496917 | 2025-04-10T16:50:59.340261
443 / tcp
0 | 2025-04-25T12:25:29.675076
465 / tcp
-1326666768 | 2025-04-17T06:19:42.714130
587 / tcp
827857355 | 2025-04-26T16:48:42.158186
993 / tcp
-628402902 | 2025-04-25T08:06:27.151189
995 / tcp
1283677897 | 2025-04-26T18:19:42.743531
8443 / tcp
-1822145111 | 2025-04-23T18:42:12.347091
8880 / tcp
962557218 | 2025-04-25T14:06:48.119390

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.



Contact Us

Shodan ® - All rights reserved