66.154.14.246

Regular View Raw Data
Last Seen: 2024-06-15

GeneralInformation

Hostnames dev.vintageandrare.com
server.vintageandrare.com
Domains vintageandrare.com 
Country United States
City Atlanta
Organization Cyber Wurx
ISP Subhosting Innovations Pvt Ltd
ASN AS141518

WebTechnologies

JavaScript libraries
Miscellaneous
Widgets

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

-1991361329 | 2024-06-14T15:31:19.154299
  
21 / tcp
-1206572118 | 2024-06-12T13:39:23.164175
  
53 / tcp
-1206572118 | 2024-05-20T06:31:20.031041
  
53 / udp
-1395725102 | 2024-06-03T19:41:36.511044
  
80 / tcp
1952082069 | 2024-06-09T03:56:09.241799
  
110 / tcp
1559185454 | 2024-06-13T05:37:25.446077
  
143 / tcp
-1848726046 | 2024-06-14T15:19:54.966593
  
443 / tcp
378645143 | 2024-06-12T23:36:55.021496
  
465 / tcp
777111812 | 2024-06-12T02:46:10.591239
  
587 / tcp
-1132241830 | 2024-06-15T03:34:45.167398
  
993 / tcp
-1001764030 | 2024-06-12T10:39:09.311138
  
995 / tcp
861261205 | 2024-05-24T11:47:56.904293
  
2082 / tcp
1887351164 | 2024-06-04T02:34:38.397890
  
2083 / tcp
-2112980737 | 2024-05-23T07:42:54.202647
  
2086 / tcp
-61314731 | 2024-06-12T22:38:32.551485
  
2087 / tcp
875034548 | 2024-06-10T12:40:42.918023
  
2095 / tcp
-1472968941 | 2024-06-10T12:40:45.153497
  
2096 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[443],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false},"CVE-2011-4969":{"cvss":4.3,"ports":[443],"summary":"Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();