68.66.248.7

Regular View Raw Data
Last Seen: 2024-04-12
Tags:
starttls

GeneralInformation

Hostnames change-accountants.com
cpanel.change-accountants.com
cpcalendars.change-accountants.com
cpcontacts.change-accountants.com
mail.change-accountants.com
webdisk.change-accountants.com
webmail.change-accountants.com
www.change-accountants.com
cloudcertitude.com
cpanel.cloudcertitude.com
cpcalendars.cloudcertitude.com
cpcontacts.cloudcertitude.com
mail.cloudcertitude.com
webdisk.cloudcertitude.com
webmail.cloudcertitude.com
www.cloudcertitude.com
nl1-sr1.supercp.com
Domains change-accountants.com cloudcertitude.com supercp.com 
Country Netherlands
City Amsterdam
Organization A2 Hosting, Inc.
ISP A2 Hosting, Inc.
ASN AS55293

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 6.1Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-1294280279 | 2024-04-12T19:57:07.610095
  
21 / tcp
-1919137757 | 2024-04-02T12:48:43.525770
  
25 / tcp
-1444728075 | 2024-04-12T22:38:41.542760
  
80 / tcp
1952082069 | 2024-03-30T18:44:10.346040
  
110 / tcp
1559185454 | 2024-04-01T22:26:45.554095
  
143 / tcp
-1444728075 | 2024-04-12T20:54:33.719543
  
443 / tcp
2116967525 | 2024-04-12T20:01:50.879745
  
587 / tcp
-1132241830 | 2024-04-12T21:12:34.627801
  
993 / tcp
-1001764030 | 2024-04-12T21:10:21.523553
  
995 / tcp
1448276401 | 2024-04-10T23:30:04.608349
  
2080 / tcp



Contact Us

Shodan ® - All rights reserved