212.79.162.147

Regular View Raw Data
Last Seen: 2024-05-08
Tags:
starttls

GeneralInformation

Hostnames server1042.topskunden.de
torfabrik.de
www.torfabrik.de
Domains topskunden.de torfabrik.de 
Country Germany
City Bonn
Organization tops.net GmbH & Co. KG
ISP tops.net GmbH & Co. KG
ASN AS12581

WebTechnologies

JavaScript libraries
Programming languages

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
-912603606 | 2024-05-05T19:42:38.209245
  
22 / tcp
419285648 | 2024-05-08T10:09:24.332802
  
25 / tcp
-566593542 | 2024-05-07T02:07:25.777174
  
80 / tcp
1924648187 | 2024-04-22T21:15:59.147282
  
110 / tcp
-1712467009 | 2024-05-02T06:41:54.458674
  
143 / tcp
200678064 | 2024-05-07T11:09:53.969039
  
443 / tcp



Contact Us

Shodan ® - All rights reserved