Hostnames |
dev.cosavostra.com ns3362329.ip-37-187-73.eu |
Domains | cosavostra.com ip-37-187-73.eu |
Country | France |
City | Gravelines |
Organization | OVH SAS |
ISP | OVH SAS |
ASN | AS16276 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2020-7676 | 3.5angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code. |
CVE-2020-11023 | 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2020-11022 | 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2019-8331 | 4.3In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. |
CVE-2019-14863 | 4.3There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it. |
CVE-2019-11358 | 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. |
CVE-2019-10768 | 5.0In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. |
CVE-2018-20677 | 4.3In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. |
CVE-2018-20676 | 4.3In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. |
CVE-2018-14042 | 4.3In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. |
CVE-2018-14040 | 4.3In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. |
CVE-2016-10735 | 4.3In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. |
CVE-2015-9251 | 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. |
772641795 | 2024-03-15T14:36:45.57682853 / tcp
772641795 | 2024-02-29T20:30:46.69402453 / udp
1736432036 | 2024-03-26T10:15:35.05416280 / tcp
-628673888 | 2024-03-19T22:13:27.445890443 / tcp
102530086 | 2024-02-28T02:51:06.4325701026 / tcp
-2013612776 | 2024-03-26T17:51:05.3790683306 / tcp
1065066233 | 2024-03-25T05:30:58.6990558026 / tcp