23.111.181.35

Regular View Raw Data
Last Seen: 2024-05-17

GeneralInformation

Hostnames 23-111-181-35.static.hvvc.us
dev.xanaduconnect.com
www.dev.xanaduconnect.com
svr1.xanaduconnect.com
autoconfig.svr1.xanaduconnect.com
autodiscover.svr1.xanaduconnect.com
cpanel.svr1.xanaduconnect.com
cpcalendars.svr1.xanaduconnect.com
cpcontacts.svr1.xanaduconnect.com
ipv6.svr1.xanaduconnect.com
mail.svr1.xanaduconnect.com
webdisk.svr1.xanaduconnect.com
webmail.svr1.xanaduconnect.com
whm.svr1.xanaduconnect.com
www.svr1.xanaduconnect.com
Domains hvvc.us xanaduconnect.com 
Country United States
City Tampa
Organization HIVELOCITY, Inc.
ISP HIVELOCITY, Inc.
ASN AS29802

WebTechnologies

JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-1103304595 | 2024-05-05T13:05:08.038563
  
21 / tcp
-593601342 | 2024-04-29T08:47:51.762582
  
53 / tcp
-593601342 | 2024-05-11T17:51:01.413631
  
53 / udp
1928786320 | 2024-04-28T20:33:27.209542
  
80 / tcp
1952082069 | 2024-05-17T17:49:50.510440
  
110 / tcp
-1345205424 | 2024-05-06T23:52:22.953755
  
111 / tcp
1559185454 | 2024-05-10T21:57:59.576685
  
143 / tcp
-918489803 | 2024-05-16T11:58:01.611106
  
443 / tcp
636029499 | 2024-05-15T03:17:19.150047
  
465 / tcp
-320959198 | 2024-05-17T17:47:49.248385
  
587 / tcp
-1132241830 | 2024-05-12T06:58:30.826341
  
993 / tcp
-1001764030 | 2024-05-14T21:03:02.765042
  
995 / tcp
1367248419 | 2024-05-16T18:13:37.877765
  
2079 / tcp
-1078314260 | 2024-05-09T03:46:46.847057
  
2083 / tcp
-1220655788 | 2024-05-10T00:07:35.941212
  
2086 / tcp
45547810 | 2024-05-10T00:07:38.518596
  
2087 / tcp
1495908563 | 2024-04-25T16:02:42.776303
  
2096 / tcp
-2105859950 | 2024-05-15T03:01:47.540769
  
3306 / tcp



Contact Us

Shodan ® - All rights reserved