162.0.235.193

Regular View Raw Data
Last Seen: 2024-04-23
Tags:
starttls

GeneralInformation

Hostnames gtn.us.com
www.gtn.us.com
web-hosting.com
premium154-4.web-hosting.com
Domains us.com web-hosting.com 
Country United States
City Phoenix
Organization Namecheap, Inc.
ISP Namecheap, Inc.
ASN AS22612

WebTechnologies

JavaScript libraries
UI frameworks
WordPress plugins

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
1238844842 | 2024-04-10T21:43:18.515759
  
21 / tcp
94978515 | 2024-04-22T21:43:47.419988
  
26 / tcp
2014475186 | 2024-04-12T13:30:16.514540
  
53 / tcp
2014475186 | 2024-04-17T04:08:00.125073
  
53 / udp
172488979 | 2024-04-21T23:56:25.612115
  
80 / tcp
1952082069 | 2024-04-19T05:51:18.789954
  
110 / tcp
1559185454 | 2024-04-23T09:23:08.324349
  
143 / tcp
121131388 | 2024-04-23T14:37:25.716943
  
443 / tcp
-397516306 | 2024-04-14T07:58:33.101068
  
465 / tcp
-2091628659 | 2024-04-04T23:29:47.884887
  
587 / tcp
-1132241830 | 2024-04-20T13:11:32.855653
  
993 / tcp
-1001764030 | 2024-04-21T06:27:11.800492
  
995 / tcp
-71065529 | 2024-04-10T04:12:45.467907
  
2082 / tcp
-1332413170 | 2024-04-19T23:20:53.542415
  
2083 / tcp



Contact Us

Shodan ® - All rights reserved