198.91.94.171

Regular View Raw Data
Last Seen: 2024-04-19

GeneralInformation

Hostnames s18.infinitysrv.com
Domains infinitysrv.com 
Country United States
City Chicago
Organization X10HOSTING, LLC
ISP SingleHop LLC
ASN AS32475

WebTechnologies

Authentication
JavaScript libraries
Miscellaneous
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2020-23064 6.1Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
-1311110304 | 2024-04-16T05:28:53.091102
  
21 / tcp
-270986652 | 2024-04-16T05:22:49.640982
  
80 / tcp
1952082069 | 2024-04-17T08:49:56.718409
  
110 / tcp
1559185454 | 2024-04-19T15:27:03.182738
  
143 / tcp
319334076 | 2024-04-16T05:22:51.306696
  
443 / tcp
-1660027690 | 2024-04-19T18:55:39.982554
  
445 / tcp
-220094677 | 2024-04-18T05:12:01.054595
  
465 / tcp
1155578546 | 2024-04-04T02:56:12.063468
  
587 / tcp
-1132241830 | 2024-04-18T11:58:08.577168
  
993 / tcp
-1001764030 | 2024-04-08T06:04:27.747190
  
995 / tcp
-1781545020 | 2024-04-05T22:49:15.843220
  
2077 / tcp
1708910338 | 2024-04-16T11:21:38.734192
  
2082 / tcp
471815077 | 2024-04-16T11:21:41.414377
  
2083 / tcp
-1470599695 | 2024-04-09T18:40:57.954776
  
2086 / tcp
1476343141 | 2024-04-16T14:50:52.687969
  
2087 / tcp
1165033773 | 2024-04-15T12:49:59.269505
  
3306 / tcp



Contact Us

Shodan ® - All rights reserved