188.68.242.188

Regular View Raw Data
Last Seen: 2024-05-13
Tags:
starttls

GeneralInformation

Hostnames paysurf.pl
www.paysurf.pl
solante.pl
www.solante.pl
n8242h188.sprintdatacenter.net
Domains paysurf.pl solante.pl sprintdatacenter.net 
Country Poland
City Żychlin
Organization Sprint Data Center Customer
ISP "SPRINT" S.A.
ASN AS197226

WebTechnologies

JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
1179746764 | 2024-05-13T19:01:20.068522
  
21 / tcp
-359677033 | 2024-05-11T09:19:37.669513
  
22 / tcp
-1766086323 | 2024-05-09T21:27:04.151850
  
25 / tcp
-1261506320 | 2024-05-11T05:47:25.281016
  
53 / tcp
360330855 | 2024-05-07T22:29:01.608730
  
53 / udp
-1725765452 | 2024-05-11T02:05:27.000998
  
80 / tcp
1475482970 | 2024-05-12T13:57:42.336496
  
110 / tcp
1133575510 | 2024-04-18T18:39:02.461625
  
143 / tcp
11139858 | 2024-05-13T08:23:03.769142
  
443 / tcp
967520586 | 2024-05-07T20:08:16.229723
  
465 / tcp
425500365 | 2024-04-20T01:08:51.706720
  
587 / tcp
1664207957 | 2024-05-12T19:09:44.474349
  
993 / tcp
127848054 | 2024-05-05T20:17:26.541944
  
995 / tcp
-335403411 | 2024-05-07T12:53:30.438724
  
8083 / tcp



Contact Us

Shodan ® - All rights reserved