74.208.146.221

Regular View Raw Data
Last Seen: 2024-04-16

GeneralInformation

Hostnames u20665467.onlinehome-server.com
Domains onlinehome-server.com 
Country United States
City Kansas City
Organization IONOS Inc.
ISP IONOS SE
ASN AS8560

WebTechnologies

JavaScript frameworks
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-11023 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2014-4078 The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability."
-370734890 | 2024-04-16T04:27:01.105898
  
21 / tcp
228762908 | 2024-04-10T11:50:13.027391
  
25 / tcp
-631767606 | 2024-04-15T05:39:20.220307
  
80 / tcp
-471102630 | 2024-04-13T23:52:20.232974
  
110 / tcp
1962969907 | 2024-03-26T17:31:48.054755
  
135 / tcp
217083131 | 2024-04-13T17:31:33.280591
  
137 / udp
-156484464 | 2024-04-16T08:59:44.081199
  
143 / tcp
1688663994 | 2024-03-29T05:24:03.558617
  
445 / tcp
-2070329383 | 2024-04-15T07:04:54.710118
  
1515 / tcp
-1659821242 | 2024-04-11T04:31:34.012662
  
1801 / tcp
-1554465028 | 2024-03-21T16:03:37.519730
  
2020 / tcp
-370734890 | 2024-04-02T14:51:05.371092
  
2121 / tcp
-69902757 | 2024-04-11T22:43:26.755143
  
3333 / tcp
183731473 | 2024-04-15T20:29:07.006913
  
3389 / tcp
1309724226 | 2024-04-14T20:31:30.763172
  
8880 / tcp
1427157949 | 2024-04-14T01:05:48.084556
  
8888 / tcp
1483465987 | 2024-04-09T04:39:28.370098
  
9000 / tcp
919129962 | 2024-04-11T01:40:33.694529
  
9091 / tcp
-348035486 | 2024-04-13T18:32:47.036048
  
9595 / tcp



Contact Us

Shodan ® - All rights reserved