208.91.198.242

Regular View Raw Data
Last Seen: 2024-04-20

GeneralInformation

Hostnames kottakkalurbanbank.com
webhostbox.net
plesk-web12.webhostbox.net
Domains kottakkalurbanbank.com webhostbox.net 
Country United States
City Provo
Organization PDR
ISP Unified Layer
ASN AS46606
Operating System Windows

WebTechnologies

JavaScript frameworks
JavaScript libraries
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-0796 10.0A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-370734890 | 2024-04-17T22:17:10.144193
  
21 / tcp
-1556935644 | 2024-04-14T23:33:10.601211
  
53 / tcp
-1556935644 | 2024-03-30T22:14:30.746242
  
53 / udp
-1960204665 | 2024-04-19T07:04:46.590401
  
80 / tcp
2099977380 | 2024-04-15T06:08:51.253277
  
110 / tcp
-2002840032 | 2024-04-11T11:37:18.033407
  
135 / tcp
2039758722 | 2024-04-20T13:14:46.924604
  
443 / tcp
-1166656618 | 2024-04-03T22:57:54.811212
  
445 / tcp
-1394244240 | 2024-04-16T17:05:33.427470
  
465 / tcp
513933464 | 2024-03-26T17:15:24.133545
  
993 / tcp
-1103855599 | 2024-04-17T19:34:11.667873
  
995 / tcp
-629368106 | 2024-04-04T22:49:04.787731
  
3306 / tcp
1489525118 | 2024-04-19T08:33:53.869678
  
5985 / tcp
-1024657120 | 2024-04-16T00:24:20.323268
  
8443 / tcp
509838872 | 2024-04-13T20:16:25.472793
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved