2a01:ab20:0:4::83

Regular View Raw Data
Last Seen: 2024-05-10

GeneralInformation

Hostnames s074.cyon.net
gozielselbstaendig.ch
www.gozielselbstaendig.ch
gozielselbststaendig.ch
www.gozielselbststaendig.ch
mikrokredite.ch
www.mikrokredite.ch
mikrokreditezuerich.ch
www.mikrokreditezuerich.ch
Domains cyon.net gozielselbstaendig.ch gozielselbststaendig.ch mikrokredite.ch mikrokreditezuerich.ch 
Country Switzerland
City Basel
Organization cyon GmbH
ISP cyon GmbH
ASN AS47302

WebTechnologies

JavaScript libraries
Security
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

OpenPorts

-1588487521 | 2024-05-10T00:19:45.579980
  
443 / tcp



Contact Us

Shodan ® - All rights reserved