67.23.255.138

Regular View Raw Data
Last Seen: 2024-04-14
Tags:
starttls

GeneralInformation

Hostnames grupovanauto.com.mx
www.grupovanauto.com.mx
srvhdlnx.netcommerce.mx
srvlnxhd.netcommerce.mx
polizavanguardia.com
mail.polizavanguardia.com
www.polizavanguardia.com
polizavanguardia.com.mx
mail.polizavanguardia.com.mx
www.polizavanguardia.com.mx
polizavanguardia.mx
mail.polizavanguardia.mx
www.polizavanguardia.mx
segurosvanguardia.com
mail.segurosvanguardia.com
www.segurosvanguardia.com
segurosvanguardia.com.mx
www.segurosvanguardia.com.mx
segurosvanguardia.mx
mail.segurosvanguardia.mx
www.segurosvanguardia.mx
Domains grupovanauto.com.mx netcommerce.mx polizavanguardia.com polizavanguardia.com.mx polizavanguardia.mx segurosvanguardia.com segurosvanguardia.com.mx segurosvanguardia.mx 
Country United States
City Winter Springs
Organization BARRACUDA LABS
ISP HostDime.com, Inc.
ASN AS33182

WebTechnologies

JavaScript libraries
Security
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
1295291421 | 2024-04-13T00:02:21.595845
  
80 / tcp
1952082069 | 2024-04-09T02:26:16.599632
  
110 / tcp
1559185454 | 2024-03-31T04:50:40.197926
  
143 / tcp
-2008001322 | 2024-04-12T11:39:48.563377
  
443 / tcp
-1132241830 | 2024-04-03T02:02:16.624963
  
993 / tcp
-1001764030 | 2024-03-31T16:16:44.289758
  
995 / tcp
81823357 | 2024-03-26T10:34:07.146106
  
2082 / tcp
-1488796486 | 2024-04-14T06:45:55.660197
  
2083 / tcp
2136795141 | 2024-04-03T23:26:37.415111
  
2086 / tcp
-847130696 | 2024-03-24T12:52:08.645265
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved