158.69.118.135

Regular View Raw Data
Last Seen: 2024-05-01

GeneralInformation

Hostnames ns520590.ip-158-69-118.net
Domains ip-158-69-118.net 
Country Canada
City Beauharnois
Organization OVH Hosting, Inc.
ISP OVH SAS
ASN AS16276
Operating System Ubuntu

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-148433033 | 2024-05-01T01:41:48.403896
  
21 / tcp
-1670230348 | 2024-04-29T02:00:31.948956
  
22 / tcp
-105995705 | 2024-04-26T23:08:02.924091
  
25 / tcp
-1030437792 | 2024-04-18T11:55:55.539105
  
53 / tcp
-1030437792 | 2024-04-18T05:44:21.669120
  
53 / udp
-1689489348 | 2024-04-27T03:39:57.965910
  
80 / tcp
1924648187 | 2024-04-17T09:02:28.973092
  
110 / tcp
-1712467009 | 2024-04-30T01:56:42.047041
  
143 / tcp
-1689489348 | 2024-05-01T20:14:01.790137
  
443 / tcp
-1646567179 | 2024-04-18T00:31:11.972912
  
465 / tcp
-105995705 | 2024-04-30T05:55:06.677510
  
587 / tcp
-2011063995 | 2024-04-23T18:02:37.193109
  
993 / tcp
-784819759 | 2024-04-22T23:07:53.423263
  
995 / tcp
-1558474317 | 2024-04-29T17:39:31.021989
  
2222 / tcp
-1011323210 | 2024-05-01T06:28:57.028424
  
3306 / tcp
-832464901 | 2024-04-29T06:30:31.131823
  
9000 / tcp
-2026318928 | 2024-04-30T11:24:53.399928
  
10000 / tcp
-733983598 | 2024-04-28T01:38:12.454218
  
20000 / tcp



Contact Us

Shodan ® - All rights reserved