189.14.224.167

Regular View Raw Data
Last Seen: 2024-06-02
Tags:
starttls

GeneralInformation

Hostnames kanpaisushi.com.br
mail.kanpaisushi.com.br
www.kanpaisushi.com.br
vp020.voope.com.br
autoconfig.vp020.voope.com.br
autodiscover.vp020.voope.com.br
cpanel.vp020.voope.com.br
cpcalendars.vp020.voope.com.br
cpcontacts.vp020.voope.com.br
ipv6.vp020.voope.com.br
mail.vp020.voope.com.br
webdisk.vp020.voope.com.br
webmail.vp020.voope.com.br
whm.vp020.voope.com.br
www.vp020.voope.com.br
Domains kanpaisushi.com.br voope.com.br 
Country Brazil
City Nova Roma do Sul
Organization Voope Soluções LTDA
ISP Adylnet Telecom
ASN AS28283

WebTechnologies

Font scripts
JavaScript libraries
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
1832023379 | 2024-05-19T09:18:06.463665
  
53 / tcp
1832023379 | 2024-05-07T09:31:50.272051
  
53 / udp
-1212622355 | 2024-06-01T22:00:08.423562
  
80 / tcp
1952082069 | 2024-05-14T12:44:38.164303
  
110 / tcp
1559185454 | 2024-05-14T21:50:46.075680
  
143 / tcp
-222297238 | 2024-06-02T03:30:51.018824
  
161 / udp
-536597524 | 2024-05-31T23:01:57.552595
  
443 / tcp
-1132241830 | 2024-06-01T03:56:55.569104
  
993 / tcp
-1001764030 | 2024-05-18T18:24:37.138376
  
995 / tcp
-604548051 | 2024-05-10T14:35:53.582846
  
2082 / tcp
956790460 | 2024-05-22T07:42:48.350161
  
2083 / tcp
666476923 | 2024-06-02T19:38:42.692882
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved