116.90.40.3

Regular View Raw Data
Last Seen: 2024-04-25
Tags:
starttls

GeneralInformation

Hostnames 2gcleaning.com.au
digitalpacific.com.au
vmpl01.digitalpacific.com.au
jcpfacilityservices.com.au
www.jcpfacilityservices.com.au
Domains 2gcleaning.com.au digitalpacific.com.au jcpfacilityservices.com.au 
Country Australia
City Sydney
Organization Hostopia Australia Pty Ltd
ISP Hostopia Australia Web Pty Ltd
ASN AS55803

WebTechnologies

Blogs
Databases
Miscellaneous
Programming languages
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
-1919640817 | 2024-04-11T16:19:36.826022
  
21 / tcp
812656840 | 2024-04-17T16:26:11.735465
  
80 / tcp
1642904388 | 2024-04-02T08:40:21.339252
  
110 / tcp
-127552878 | 2024-04-02T22:49:19.976970
  
143 / tcp
-250240049 | 2024-04-25T03:16:38.712824
  
443 / tcp
-192475931 | 2024-04-01T21:41:51.291044
  
465 / tcp
-628402902 | 2024-04-04T00:43:18.184460
  
993 / tcp
-89659396 | 2024-04-05T03:58:37.365877
  
995 / tcp
-1847871682 | 2024-04-14T05:29:12.506440
  
8443 / tcp
-1145581128 | 2024-04-12T09:46:16.277751
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved