185.169.60.28

Regular View Raw Data
Last Seen: 2024-06-13
Tags:
starttls

GeneralInformation

Hostnames a46.ch
promatrix.ch
lxcp03.promatrix.ch
Domains a46.ch promatrix.ch 
Country Switzerland
City Laufen
Organization promatrix ag
ISP green.ch AG
ASN AS1836

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

316144446 | 2024-06-12T22:04:49.692063
  
21 / tcp
-1510695308 | 2024-06-01T23:37:56.442098
  
80 / tcp
1952082069 | 2024-06-10T10:56:06.005471
  
110 / tcp
1559185454 | 2024-06-04T08:13:20.157016
  
143 / tcp
-767576901 | 2024-06-13T11:32:30.049936
  
443 / tcp
1261025785 | 2024-06-09T07:04:54.988718
  
465 / tcp
2143712919 | 2024-06-10T00:56:22.103578
  
587 / tcp
-1132241830 | 2024-06-12T17:30:11.996505
  
993 / tcp
-1001764030 | 2024-06-12T12:23:20.321981
  
995 / tcp
-588131477 | 2024-06-12T02:57:46.742872
  
2077 / tcp
2100439994 | 2024-06-13T11:32:22.237859
  
2082 / tcp
-1070981731 | 2024-06-13T11:32:25.372309
  
2083 / tcp
1401918036 | 2024-06-12T19:12:53.967500
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[2087],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[2087],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[2087],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();