154.210.38.165

Regular View Raw Data
Last Seen: 2024-05-06

GeneralInformation

Hostnames 3lsky.com
www.3lsky.com
51rn.com
www.51rn.com
amoere.com
www.amoere.com
bearings114.com
www.bearings114.com
boaizxc.com
www.boaizxc.com
dongfangwgysy.com
www.dongfangwgysy.com
expat-ins.com
www.expat-ins.com
hanjieji.com
www.hanjieji.com
jhpapercn.com
www.jhpapercn.com
jianai520.com
www.jianai520.com
mingdianvip.com
www.mingdianvip.com
opstxxzx.com
www.opstxxzx.com
sh-pudi.com
www.sh-pudi.com
sreec.net
www.sreec.net
tianqisport.com
www.tianqisport.com
vmavalve.com
www.vmavalve.com
wanlixiangsu.com
www.wanlixiangsu.com
weifenhonggan.com
www.weifenhonggan.com
yjdcwj.com
www.yjdcwj.com
zzmkq.com
www.zzmkq.com
Domains 3lsky.com 51rn.com amoere.com bearings114.com boaizxc.com dongfangwgysy.com expat-ins.com hanjieji.com jhpapercn.com jianai520.com mingdianvip.com opstxxzx.com sh-pudi.com sreec.net tianqisport.com vmavalve.com wanlixiangsu.com weifenhonggan.com yjdcwj.com zzmkq.com 
Country Hong Kong
City Hong Kong
Organization HK Qianlong Technology Co., Limited
ISP HWA CENT TELECOMMUNICATIONS LIMITED
ASN AS139471

WebTechnologies

JavaScript frameworks
JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

OpenPorts

-816199423 | 2024-05-06T06:23:35.685567
  
80 / tcp
989294918 | 2024-04-21T18:02:54.210011
  
443 / tcp



Contact Us

Shodan ® - All rights reserved