Hostnames |
11427.cn www.11427.cn 11463.cn www.11463.cn 90231.cn www.90231.cn 90679.cn www.90679.cn 91856.cn www.91856.cn 91976.cn www.91976.cn 92031.cn www.92031.cn 92044.cn www.92044.cn 92126.cn www.92126.cn 92142.cn www.92142.cn 92161.cn www.92161.cn 92172.cn www.92172.cn 92184.cn www.92184.cn 92212.cn www.92212.cn 92213.cn www.92213.cn 92215.cn www.92215.cn 92235.cn www.92235.cn 92253.cn www.92253.cn 92325.cn www.92325.cn 92328.cn www.92328.cn 92338.cn www.92338.cn 92352.cn www.92352.cn 92353.cn www.92353.cn 92362.cn www.92362.cn 92383.cn www.92383.cn 92386.cn www.92386.cn 92392.cn www.92392.cn 92395.cn www.92395.cn 92523.cn www.92523.cn 92528.cn www.92528.cn 93236.cn www.93236.cn 93253.cn www.93253.cn 93256.cn www.93256.cn 93263.cn www.93263.cn 93583.cn www.93583.cn 93592.cn www.93592.cn 93635.cn www.93635.cn 93639.cn www.93639.cn 93662.cn www.93662.cn 93685.cn www.93685.cn 93825.cn www.93825.cn 93828.cn www.93828.cn 93832.cn www.93832.cn 93835.cn www.93835.cn 99562.cn www.99562.cn |
Domains | 11427.cn 11463.cn 90231.cn 90679.cn 91856.cn 91976.cn 92031.cn 92044.cn 92126.cn 92142.cn 92161.cn 92172.cn 92184.cn 92212.cn 92213.cn 92215.cn 92235.cn 92253.cn 92325.cn 92328.cn 92338.cn 92352.cn 92353.cn 92362.cn 92383.cn 92386.cn 92392.cn 92395.cn 92523.cn 92528.cn 93236.cn 93253.cn 93256.cn 93263.cn 93583.cn 93592.cn 93635.cn 93639.cn 93662.cn 93685.cn 93825.cn 93828.cn 93832.cn 93835.cn 99562.cn |
Country | Hong Kong |
City | Hong Kong |
Organization | HONG KONG Megalayer Technology Co.,Limited |
ISP | HONG KONG Megalayer Technology Co.,Limited |
ASN | AS139646 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2020-11023 | 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2020-11022 | 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2019-11358 | 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. |
CVE-2015-9251 | 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. |
1651973090 | 2024-05-20T20:29:54.56945480 / tcp
-1365697403 | 2024-05-22T00:04:40.986855443 / tcp
-881101236 | 2024-05-31T22:18:47.7856603306 / tcp
-85749389 | 2024-05-31T00:17:48.1443358888 / tcp