23.34.59.13

Regular View Raw Data
Last Seen: 2024-05-03
Tags:
cdn

GeneralInformation

Hostnames a23-34-59-13.deploy.static.akamaitechnologies.com
chooseli.org
connectli.org
emhp.org
healthybabyandme.org
joinscpd.com
paymysewerbill.com
reclaimourwater.info
scdownpayment.com
scpdshield.org
sct-bus.org
suffolkartsandfilm.com
suffolkcountyfilmcommission.com
suffolkcountylandbank.org
suffolkcountyny.gov
aca.suffolkcountyny.gov
acadev.suffolkcountyny.gov
amon.suffolkcountyny.gov
amonrpt.suffolkcountyny.gov
apps.suffolkcountyny.gov
apps2.suffolkcountyny.gov
appt.suffolkcountyny.gov
auction.suffolkcountyny.gov
bipub.suffolkcountyny.gov
box.suffolkcountyny.gov
ca.suffolkcountyny.gov
ce.suffolkcountyny.gov
clerk.suffolkcountyny.gov
comptroller.suffolkcountyny.gov
covidresources.suffolkcountyny.gov
cs.suffolkcountyny.gov
dpw.suffolkcountyny.gov
dss.suffolkcountyny.gov
eco.suffolkcountyny.gov
ecodev.suffolkcountyny.gov
efile.suffolkcountyny.gov
eupdates.suffolkcountyny.gov
falsealarm.suffolkcountyny.gov
fleettest.suffolkcountyny.gov
fres.suffolkcountyny.gov
fs.suffolkcountyny.gov
gis.suffolkcountyny.gov
gis2.suffolkcountyny.gov
gis3.suffolkcountyny.gov
gisapps.suffolkcountyny.gov
gisimages.suffolkcountyny.gov
gisportal.suffolkcountyny.gov
gissbservices.suffolkcountyny.gov
gisservices.suffolkcountyny.gov
gisservices2.suffolkcountyny.gov
gtfsrealtime.suffolkcountyny.gov
health.suffolkcountyny.gov
healthylawns.suffolkcountyny.gov
hrc.suffolkcountyny.gov
hrmp.suffolkcountyny.gov
hrms.suffolkcountyny.gov
test.hrms.suffolkcountyny.gov
izone.suffolkcountyny.gov
kingsparksewers.suffolkcountyny.gov
kiosk.suffolkcountyny.gov
labor.suffolkcountyny.gov
law.suffolkcountyny.gov
lawcm.suffolkcountyny.gov
ldc.suffolkcountyny.gov
legis.suffolkcountyny.gov
lizone.suffolkcountyny.gov
login.suffolkcountyny.gov
mentalhealth.suffolkcountyny.gov
mrp.suffolkcountyny.gov
newemployeeorientation.suffolkcountyny.gov
openaccess.suffolkcountyny.gov
parks.suffolkcountyny.gov
recoveryresources.suffolkcountyny.gov
sandbox.suffolkcountyny.gov
scafv.suffolkcountyny.gov
scalert.suffolkcountyny.gov
sccfb.suffolkcountyny.gov
scoem.suffolkcountyny.gov
scpd.suffolkcountyny.gov
scpdcrb.suffolkcountyny.gov
sheriff.suffolkcountyny.gov
ship.suffolkcountyny.gov
silverblazepay.suffolkcountyny.gov
smtp.suffolkcountyny.gov
survey.suffolkcountyny.gov
web.suffolkcountyny.gov
workday.suffolkcountyny.gov
www.suffolkcountyny.gov
suffolkpd.org
suffolksbravest.com
suffolkservice.org
suffolkstopaddiction.org
suffolkstopbullying.org
suffolkstopdwi.org
suffolkstormwater.com
Domains akamaitechnologies.com chooseli.org connectli.org emhp.org healthybabyandme.org joinscpd.com paymysewerbill.com reclaimourwater.info scdownpayment.com scpdshield.org sct-bus.org suffolkartsandfilm.com suffolkcountyfilmcommission.com suffolkcountylandbank.org suffolkcountyny.gov suffolkpd.org suffolksbravest.com suffolkservice.org suffolkstopaddiction.org suffolkstopbullying.org suffolkstopdwi.org suffolkstormwater.com 
Country United States
City Edison
Organization Akamai Technologies, Inc.
ISP Akamai International B.V.
ASN AS20940

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

OpenPorts

-521130656 | 2024-05-02T16:34:34.288039
  
80 / tcp
-1046863065 | 2024-05-03T15:27:06.802858
  
443 / tcp



Contact Us

Shodan ® - All rights reserved