116.202.29.86

Regular View Raw Data
Last Seen: 2024-05-04
Tags:
starttls

GeneralInformation

Hostnames server.travellwd.com
autoconfig.server.travellwd.com
autodiscover.server.travellwd.com
cpanel.server.travellwd.com
cpcalendars.server.travellwd.com
cpcontacts.server.travellwd.com
ipv6.server.travellwd.com
mail.server.travellwd.com
webdisk.server.travellwd.com
webmail.server.travellwd.com
whm.server.travellwd.com
www.server.travellwd.com
Domains travellwd.com 
Country Germany
City Falkenstein
Organization Hetzner Online GmbH
ISP Hetzner Online GmbH
ASN AS24940

WebTechnologies

Databases
JavaScript libraries
Miscellaneous
Performance
Programming languages
UI frameworks
WordPress plugins

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
-1492146840 | 2024-04-20T01:48:24.590866
  
21 / tcp
2065296958 | 2024-04-13T10:25:00.597324
  
22 / tcp
-712099926 | 2024-04-23T01:37:46.610712
  
53 / udp
1600843841 | 2024-05-04T01:40:40.081176
  
80 / tcp
1952082069 | 2024-05-02T15:37:51.541542
  
110 / tcp
1559185454 | 2024-05-02T06:51:19.762708
  
143 / tcp
1304037488 | 2024-04-24T09:06:18.682700
  
443 / tcp
225162973 | 2024-05-03T10:41:43.937224
  
465 / tcp
-1803839059 | 2024-04-29T12:52:00.867688
  
587 / tcp
-1132241830 | 2024-04-30T02:54:57.121458
  
993 / tcp
424501340 | 2024-04-05T16:17:54.977495
  
2082 / tcp
-491692392 | 2024-05-03T15:44:57.614952
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved