45.60.101.108

Regular View Raw Data
Last Seen: 2024-05-21
Tags:
cdn

GeneralInformation

Hostnames imperva.com
oupcanada.com
Domains imperva.com oupcanada.com 
Country Canada
City Toronto
Organization Incapsula Inc
ISP Incapsula Inc
ASN AS19551

WebTechnologies

JavaScript frameworks
JavaScript libraries
Security
Tag managers

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-7656 4.3jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2012-6708 4.3jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
2042388506 | 2024-05-12T06:04:38.425008
  
25 / tcp
1590623869 | 2024-05-21T17:22:22.472589
  
43 / tcp
-1434306287 | 2024-05-14T01:11:52.211245
  
80 / tcp
1995818868 | 2024-05-14T06:21:22.885755
  
81 / tcp
462081896 | 2024-05-15T00:02:50.362961
  
82 / tcp
1953350869 | 2024-05-10T03:56:09.132114
  
83 / tcp
420309128 | 2024-05-12T04:58:48.532218
  
84 / tcp
2094845356 | 2024-05-16T17:05:27.402994
  
88 / tcp
235896066 | 2024-05-16T09:51:04.636004
  
389 / tcp
480463089 | 2024-05-21T01:58:07.074164
  
443 / tcp
-148888889 | 2024-05-16T21:57:58.405472
  
444 / tcp
-1726843764 | 2024-05-10T18:22:16.575636
  
554 / tcp
1294935307 | 2024-05-15T07:28:45.515360
  
587 / tcp
-74539110 | 2024-05-14T09:58:09.682155
  
631 / tcp
-328831181 | 2024-05-08T09:42:42.106651
  
636 / tcp
816561208 | 2024-05-05T15:07:11.086359
  
1024 / tcp
-571571314 | 2024-05-21T11:55:22.798072
  
1177 / tcp
1803090741 | 2024-05-09T23:11:34.932920
  
1234 / tcp
-276190393 | 2024-05-17T07:59:15.897807
  
1337 / tcp
1015384313 | 2024-05-19T16:54:09.473764
  
1400 / tcp
1843334707 | 2024-05-13T06:00:24.119274
  
1433 / tcp
1659154560 | 2024-04-28T11:13:07.085687
  
1521 / tcp
1413028056 | 2024-05-15T16:00:35.070791
  
1935 / tcp
-1173877203 | 2024-05-20T07:54:09.318791
  
2000 / tcp
-806686398 | 2024-05-21T05:23:35.035651
  
2082 / tcp
89530770 | 2024-05-12T08:14:15.877574
  
2083 / tcp
1645663686 | 2024-05-12T06:14:25.115930
  
2086 / tcp
-2112406071 | 2024-05-21T12:17:42.582188
  
2087 / tcp
657809734 | 2024-05-16T12:17:04.789423
  
2290 / tcp
-948310494 | 2024-05-08T08:20:42.349650
  
2345 / tcp
1140669013 | 2024-05-14T23:36:31.087606
  
2375 / tcp
1510276506 | 2024-05-17T19:58:24.280243
  
2376 / tcp
1477722145 | 2024-05-21T00:45:17.747020
  
2404 / tcp
-1223768443 | 2024-05-06T06:27:11.191825
  
2480 / tcp
1187436441 | 2024-05-20T20:23:12.512133
  
2628 / tcp
23076282 | 2024-05-15T22:43:33.716880
  
2761 / tcp
937465299 | 2024-05-15T18:46:04.968240
  
2762 / tcp
2036202428 | 2024-05-20T09:32:00.507426
  
3000 / tcp
352886221 | 2024-05-18T00:41:27.088121
  
3001 / tcp
1509091602 | 2024-05-13T18:40:00.453737
  
3050 / tcp
979029438 | 2024-05-09T23:33:21.321507
  
3268 / tcp
-1256495563 | 2024-05-17T23:17:07.022298
  
3269 / tcp
555249729 | 2024-05-20T03:33:43.648863
  
3299 / tcp
1402354154 | 2024-05-18T15:26:44.198525
  
3333 / tcp
-993220557 | 2024-05-03T15:01:19.756907
  
3389 / tcp
959639174 | 2024-05-18T22:25:31.458356
  
3790 / tcp
-292713831 | 2024-04-27T11:50:19.155329
  
4000 / tcp
1671003797 | 2024-05-20T22:30:22.061650
  
4022 / tcp
-2081323379 | 2024-05-18T07:33:25.490906
  
4040 / tcp
18683843 | 2024-05-17T07:57:19.275088
  
4443 / tcp
1344468104 | 2024-05-13T02:20:12.928473
  
4444 / tcp
-1056528954 | 2024-05-16T10:43:25.376228
  
4451 / tcp
1511622032 | 2024-04-22T14:07:18.964183
  
4500 / tcp
611041128 | 2024-05-05T00:47:32.837999
  
4567 / tcp
-574814096 | 2024-05-21T05:53:43.872775
  
4848 / tcp
356209826 | 2024-05-21T00:45:43.391682
  
4911 / tcp
1646480237 | 2024-05-10T16:40:32.259292
  
5000 / tcp
-2000449104 | 2024-05-15T21:35:40.376345
  
5001 / tcp
-646750477 | 2024-05-20T17:37:06.985346
  
5005 / tcp
-1107189854 | 2024-05-19T05:46:18.331346
  
5006 / tcp
-1239026177 | 2024-05-11T06:37:51.898996
  
5007 / tcp
1460702267 | 2024-05-20T11:58:12.238476
  
5009 / tcp
1981385584 | 2024-05-16T22:22:30.757212
  
5010 / tcp
1585950868 | 2024-05-18T02:39:51.173123
  
5201 / tcp
9479536 | 2024-05-19T20:48:47.056267
  
5222 / tcp
-1836948808 | 2024-04-27T10:49:18.387288
  
5555 / tcp
743919099 | 2024-05-16T05:23:19.889215
  
5560 / tcp
1767221707 | 2024-05-21T08:11:37.675917
  
5601 / tcp
-341435575 | 2024-05-13T13:05:50.762491
  
5672 / tcp
-978337524 | 2024-05-11T12:18:59.969701
  
5900 / tcp
-1945959658 | 2024-05-20T21:26:15.221374
  
5985 / tcp
-53051860 | 2024-05-19T10:49:00.794173
  
6000 / tcp
-462713433 | 2024-05-17T18:48:58.031218
  
6001 / tcp
-150998337 | 2024-05-16T03:29:52.539488
  
6080 / tcp
792257289 | 2024-05-12T20:54:31.471229
  
6443 / tcp
-290659171 | 2024-04-24T12:06:07.558893
  
7001 / tcp
342084888 | 2024-05-18T12:56:29.347938
  
7071 / tcp
1697738557 | 2024-05-19T15:09:43.879431
  
7171 / tcp
764935242 | 2024-05-11T00:15:52.264185
  
7443 / tcp
-587281517 | 2024-05-20T23:42:11.661584
  
7474 / tcp
-1929147404 | 2024-05-21T08:49:09.665203
  
7547 / tcp
-1029519125 | 2024-05-19T13:37:42.376456
  
7548 / tcp
447729679 | 2024-05-20T16:11:07.067892
  
7777 / tcp
363958684 | 2024-05-07T15:48:14.495378
  
7779 / tcp
1739061528 | 2024-05-18T06:57:55.955882
  
8000 / tcp
843199837 | 2024-05-21T10:07:28.307088
  
8001 / tcp
-395380807 | 2024-05-13T10:10:24.585055
  
8008 / tcp
-555272407 | 2024-05-12T16:26:00.314389
  
8009 / tcp
-779246490 | 2024-05-21T11:09:20.453821
  
8010 / tcp
2134395152 | 2024-05-18T18:42:46.171390
  
8060 / tcp
-1589012243 | 2024-05-09T19:06:49.026083
  
8069 / tcp
1341004139 | 2024-05-14T11:39:38.374642
  
8080 / tcp
969830072 | 2024-05-13T15:52:50.960305
  
8081 / tcp
1886506685 | 2024-05-03T02:33:31.704551
  
8082 / tcp
1518879327 | 2024-05-03T07:15:49.864440
  
8083 / tcp
1468741970 | 2024-05-12T00:22:17.010090
  
8085 / tcp
66633618 | 2024-04-30T07:54:41.490364
  
8086 / tcp
-1675262488 | 2024-05-16T20:20:39.075803
  
8089 / tcp
-1512516773 | 2024-05-18T12:21:11.783163
  
8090 / tcp
1032519110 | 2024-05-20T21:52:27.202871
  
8098 / tcp
1602275593 | 2024-05-19T16:52:14.489986
  
8112 / tcp
1025229346 | 2024-05-19T21:44:29.855698
  
8123 / tcp
988089958 | 2024-05-08T20:59:12.290086
  
8126 / tcp
-1758869408 | 2024-05-18T03:50:46.578281
  
8139 / tcp
-2142532475 | 2024-05-19T10:18:28.228761
  
8140 / tcp
1378500875 | 2024-05-18T06:44:06.349713
  
8181 / tcp
2050292847 | 2024-05-10T09:26:37.308064
  
8200 / tcp
114479578 | 2024-05-19T23:00:56.477178
  
8443 / tcp
735377062 | 2024-04-23T10:20:37.072488
  
8800 / tcp
713406695 | 2024-05-21T07:10:40.912789
  
8834 / tcp
-1728921718 | 2024-05-12T17:46:01.546494
  
8880 / tcp
-156772856 | 2024-05-19T20:04:26.147924
  
8888 / tcp
122699725 | 2024-05-14T23:41:59.185391
  
8889 / tcp
-769957325 | 2024-05-16T13:07:39.086405
  
9000 / tcp
1155858224 | 2024-05-16T02:59:56.224253
  
9001 / tcp
-688915245 | 2024-05-06T15:09:19.947187
  
9002 / tcp
-1208652924 | 2024-05-18T00:31:45.094520
  
9009 / tcp
614045624 | 2024-05-14T23:58:20.944397
  
9080 / tcp
-534490694 | 2024-05-11T12:47:45.804826
  
9090 / tcp
-459636775 | 2024-05-13T12:58:43.875932
  
9091 / tcp
-526364582 | 2024-05-05T06:44:43.766108
  
9095 / tcp
-656197638 | 2024-05-17T00:02:57.111999
  
9100 / tcp
-1571205935 | 2024-05-14T15:00:48.485963
  
9200 / tcp
1093087703 | 2024-05-13T13:05:12.308184
  
9306 / tcp
-140161648 | 2024-04-27T15:31:03.386878
  
9443 / tcp
-840206374 | 2024-05-21T11:05:24.687675
  
9876 / tcp
-1022928503 | 2024-05-15T04:54:53.835936
  
9943 / tcp
1774309096 | 2024-05-18T19:00:41.255021
  
9998 / tcp
-2107051384 | 2024-05-16T11:17:47.477306
  
9999 / tcp
-1648024085 | 2024-05-19T09:04:18.396748
  
10000 / tcp
588540544 | 2024-05-17T17:34:08.299764
  
10001 / tcp
-2067028711 | 2024-05-13T16:19:53.038005
  
10134 / tcp
-986789624 | 2024-05-17T23:51:21.518856
  
10443 / tcp
-1314950676 | 2024-05-17T01:10:08.528887
  
12345 / tcp
-260303809 | 2024-05-20T00:17:32.860292
  
13579 / tcp
-54081746 | 2024-05-15T21:35:33.211517
  
14265 / tcp
2083787431 | 2024-05-18T08:54:57.608605
  
16010 / tcp
1725032622 | 2024-05-15T09:02:04.005498
  
16030 / tcp
1679720192 | 2024-05-19T23:57:49.035838
  
20000 / tcp
-1222606207 | 2024-05-17T23:05:23.102583
  
31337 / tcp
-907899074 | 2024-05-16T17:40:05.506151
  
50000 / tcp
1004081546 | 2024-05-19T12:17:44.720222
  
55000 / tcp
-1434736433 | 2024-05-14T07:14:51.933832
  
55443 / tcp
1275766106 | 2024-05-17T13:38:27.783758
  
60001 / tcp



Contact Us

Shodan ® - All rights reserved