190.210.186.175

Regular View Raw Data
Last Seen: 2024-05-06
Tags:
starttls

GeneralInformation

Hostnames avnam.net
vnct9007.avnam.net
sixcan1.com
www.sixcan1.com
Domains avnam.net sixcan1.com 
Country Argentina
City Buenos Aires
Organization ARGENTINA VIRTUAL NETWORKS
ISP NSS S.A.
ASN AS16814

WebTechnologies

JavaScript libraries
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2017-12419 4.0If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2009-2942 7.5The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
-738370680 | 2024-05-05T18:38:56.140619
  
21 / tcp
-1127089085 | 2024-05-04T15:34:18.832272
  
25 / tcp
-2032818125 | 2024-05-06T06:02:11.539911
  
53 / tcp
537807750 | 2024-05-06T07:34:52.664115
  
53 / udp
-1159489400 | 2024-04-27T09:05:35.504578
  
80 / tcp
1356830273 | 2024-05-04T11:16:53.806537
  
143 / tcp
127634911 | 2024-05-03T06:21:40.918800
  
443 / tcp
608636960 | 2024-04-30T03:30:26.316295
  
465 / tcp
-1127089085 | 2024-04-13T02:11:10.333479
  
587 / tcp
-1790423402 | 2024-05-06T09:36:02.321670
  
993 / tcp
-1689669364 | 2024-05-05T03:10:28.801105
  
995 / tcp
-2014302006 | 2024-04-24T02:56:00.817451
  
3306 / tcp
-172537119 | 2024-05-02T20:06:26.656614
  
10000 / tcp
430912095 | 2024-05-06T07:36:24.023231
  
20000 / tcp



Contact Us

Shodan ® - All rights reserved