72.52.242.48

Regular View Raw Data
Last Seen: 2024-05-17
Tags:
starttls

GeneralInformation

Hostnames host.advancedconfucius.net
autoconfig.host.advancedconfucius.net
autodiscover.host.advancedconfucius.net
cpanel.host.advancedconfucius.net
cpcalendars.host.advancedconfucius.net
cpcontacts.host.advancedconfucius.net
ipv6.host.advancedconfucius.net
mail.host.advancedconfucius.net
webdisk.host.advancedconfucius.net
webmail.host.advancedconfucius.net
whm.host.advancedconfucius.net
www.host.advancedconfucius.net
brucediamond.com
mail.brucediamond.com
www.brucediamond.com
Domains advancedconfucius.net brucediamond.com 
Country United States
City Lansing
Organization Liquid Web, L.L.C
ISP Liquid Web, L.L.C
ASN AS32244

WebTechnologies

Authentication
Editors
JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
-1441201284 | 2024-05-05T14:27:39.804189
  
21 / tcp
1265193400 | 2024-05-01T04:35:10.839056
  
26 / tcp
964259887 | 2024-05-07T02:46:55.780239
  
53 / tcp
964259887 | 2024-05-14T10:45:38.932058
  
53 / udp
-1575284432 | 2024-05-17T13:38:35.674036
  
80 / tcp
1098206132 | 2024-05-09T07:10:33.060193
  
110 / tcp
1315965377 | 2024-05-12T19:09:56.079831
  
143 / tcp
-813962502 | 2024-05-17T03:28:06.608264
  
443 / tcp
-1647731522 | 2024-05-17T09:13:34.781265
  
465 / tcp
-738473395 | 2024-05-09T15:55:56.297092
  
587 / tcp
-1132241830 | 2024-05-07T05:32:12.538139
  
993 / tcp
-1001764030 | 2024-05-08T02:19:52.618759
  
995 / tcp
-1762582095 | 2024-05-16T00:04:40.274572
  
2082 / tcp
-2006097334 | 2024-05-16T00:04:43.326717
  
2083 / tcp
1933472117 | 2024-05-15T04:37:44.553375
  
2086 / tcp
-1691940611 | 2024-05-15T04:37:46.537482
  
2087 / tcp
1733718369 | 2024-04-19T21:35:04.585542
  
8080 / tcp



Contact Us

Shodan ® - All rights reserved