Hostnames |
a23-34-59-13.deploy.static.akamaitechnologies.com chooseli.org connectli.org emhp.org healthybabyandme.org joinscpd.com paymysewerbill.com reclaimourwater.info scdownpayment.com scpdshield.org sct-bus.org suffolkartsandfilm.com suffolkcountyfilmcommission.com suffolkcountylandbank.org suffolkcountyny.gov aca.suffolkcountyny.gov acadev.suffolkcountyny.gov amon.suffolkcountyny.gov amonrpt.suffolkcountyny.gov apps.suffolkcountyny.gov apps2.suffolkcountyny.gov appt.suffolkcountyny.gov auction.suffolkcountyny.gov bipub.suffolkcountyny.gov box.suffolkcountyny.gov ca.suffolkcountyny.gov ce.suffolkcountyny.gov clerk.suffolkcountyny.gov comptroller.suffolkcountyny.gov covidresources.suffolkcountyny.gov cs.suffolkcountyny.gov dpw.suffolkcountyny.gov dss.suffolkcountyny.gov eco.suffolkcountyny.gov ecodev.suffolkcountyny.gov efile.suffolkcountyny.gov eupdates.suffolkcountyny.gov falsealarm.suffolkcountyny.gov fleettest.suffolkcountyny.gov fres.suffolkcountyny.gov fs.suffolkcountyny.gov gis.suffolkcountyny.gov gis2.suffolkcountyny.gov gis3.suffolkcountyny.gov gisapps.suffolkcountyny.gov gisimages.suffolkcountyny.gov gisportal.suffolkcountyny.gov gissbservices.suffolkcountyny.gov gisservices.suffolkcountyny.gov gisservices2.suffolkcountyny.gov gtfsrealtime.suffolkcountyny.gov health.suffolkcountyny.gov healthylawns.suffolkcountyny.gov hrc.suffolkcountyny.gov hrmp.suffolkcountyny.gov hrms.suffolkcountyny.gov test.hrms.suffolkcountyny.gov izone.suffolkcountyny.gov kingsparksewers.suffolkcountyny.gov kiosk.suffolkcountyny.gov labor.suffolkcountyny.gov law.suffolkcountyny.gov lawcm.suffolkcountyny.gov ldc.suffolkcountyny.gov legis.suffolkcountyny.gov lizone.suffolkcountyny.gov login.suffolkcountyny.gov mentalhealth.suffolkcountyny.gov mrp.suffolkcountyny.gov newemployeeorientation.suffolkcountyny.gov openaccess.suffolkcountyny.gov parks.suffolkcountyny.gov recoveryresources.suffolkcountyny.gov sandbox.suffolkcountyny.gov scafv.suffolkcountyny.gov scalert.suffolkcountyny.gov sccfb.suffolkcountyny.gov scoem.suffolkcountyny.gov scpd.suffolkcountyny.gov scpdcrb.suffolkcountyny.gov sheriff.suffolkcountyny.gov ship.suffolkcountyny.gov silverblazepay.suffolkcountyny.gov smtp.suffolkcountyny.gov survey.suffolkcountyny.gov web.suffolkcountyny.gov workday.suffolkcountyny.gov www.suffolkcountyny.gov suffolkpd.org suffolksbravest.com suffolkservice.org suffolkstopaddiction.org suffolkstopbullying.org suffolkstopdwi.org suffolkstormwater.com |
Domains | akamaitechnologies.com chooseli.org connectli.org emhp.org healthybabyandme.org joinscpd.com paymysewerbill.com reclaimourwater.info scdownpayment.com scpdshield.org sct-bus.org suffolkartsandfilm.com suffolkcountyfilmcommission.com suffolkcountylandbank.org suffolkcountyny.gov suffolkpd.org suffolksbravest.com suffolkservice.org suffolkstopaddiction.org suffolkstopbullying.org suffolkstopdwi.org suffolkstormwater.com |
Country | United States |
City | Edison |
Organization | Akamai Technologies, Inc. |
ISP | Akamai International B.V. |
ASN | AS20940 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2020-11023 | 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2020-11022 | 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2019-11358 | 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. |
CVE-2015-9251 | 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. |