162.250.175.117

Regular View Raw Data
Last Seen: 2024-05-04
Tags:
starttls

GeneralInformation

Hostnames drupal.act-dev.com
autoconfig.drupal.act-dev.com
autodiscover.drupal.act-dev.com
cpanel.drupal.act-dev.com
cpcalendars.drupal.act-dev.com
cpcontacts.drupal.act-dev.com
ipv6.drupal.act-dev.com
mail.drupal.act-dev.com
webdisk.drupal.act-dev.com
webmail.drupal.act-dev.com
whm.drupal.act-dev.com
www.drupal.act-dev.com
giffens.ca
www.glenhuronapples.giffens.ca
glenhuronapples.com
Domains act-dev.com giffens.ca glenhuronapples.com 
Country Canada
City Toronto
Organization DULAY AND DULAY
ISP 1651884 Ontario Inc.
ASN AS40028

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-2091986340 | 2024-04-25T22:36:42.423734
  
21 / tcp
321821348 | 2024-04-17T23:48:06.440995
  
26 / tcp
-361403886 | 2024-05-04T23:50:53.811185
  
53 / tcp
-361403886 | 2024-05-02T16:32:30.733669
  
53 / udp
880230642 | 2024-05-01T21:52:38.941853
  
80 / tcp
1952082069 | 2024-05-02T18:01:21.576550
  
110 / tcp
1559185454 | 2024-04-29T07:59:34.218060
  
143 / tcp
409565738 | 2024-04-30T19:51:31.397063
  
161 / udp
2133868204 | 2024-04-30T06:10:51.255120
  
443 / tcp
-1624296722 | 2024-04-29T11:39:37.942991
  
465 / tcp
921637361 | 2024-04-27T01:19:59.528324
  
587 / tcp
-1132241830 | 2024-04-25T01:31:35.193543
  
993 / tcp
-1001764030 | 2024-04-15T11:46:32.481579
  
995 / tcp
302629489 | 2024-04-29T01:27:45.944432
  
2082 / tcp
776047338 | 2024-05-04T17:12:26.180655
  
2083 / tcp
-2080639594 | 2024-05-01T01:24:13.969054
  
2086 / tcp
-1073662062 | 2024-04-16T21:33:30.821464
  
2087 / tcp
723922305 | 2024-04-28T08:21:34.140320
  
2095 / tcp



Contact Us

Shodan ® - All rights reserved