77.235.62.132

Regular View Raw Data
Last Seen: 2024-04-26
Tags:
starttls

GeneralInformation

Hostnames indexoflebanon.com
cpanel.indexoflebanon.com
cpcalendars.indexoflebanon.com
cpcontacts.indexoflebanon.com
mail.indexoflebanon.com
webdisk.indexoflebanon.com
webmail.indexoflebanon.com
www.indexoflebanon.com
server.lotoholic.com
cpanel.server.lotoholic.com
cpcalendars.server.lotoholic.com
cpcontacts.server.lotoholic.com
mail.server.lotoholic.com
webmail.server.lotoholic.com
whm.server.lotoholic.com
www.server.lotoholic.com
Domains indexoflebanon.com lotoholic.com 
Country Netherlands
City Amsterdam
Organization EUROVPS-VMC
ISP LeaseWeb Netherlands B.V.
ASN AS60781

WebTechnologies

JavaScript libraries
Miscellaneous

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
-2101998512 | 2024-04-23T14:11:29.644797
  
21 / tcp
1021608144 | 2024-04-04T00:23:39.853546
  
53 / tcp
1021608144 | 2024-04-18T13:24:11.526460
  
53 / udp
1076477574 | 2024-04-20T07:41:28.926423
  
80 / tcp
1952082069 | 2024-03-28T14:06:18.280670
  
110 / tcp
1559185454 | 2024-04-19T16:24:26.024575
  
143 / tcp
-2102615924 | 2024-04-25T22:43:12.581184
  
443 / tcp
2064295472 | 2024-04-16T22:05:44.102857
  
465 / tcp
433669984 | 2024-04-22T11:02:23.741454
  
587 / tcp
-1132241830 | 2024-04-24T22:33:15.600730
  
993 / tcp
-1001764030 | 2024-04-25T00:44:58.715843
  
995 / tcp
2103144559 | 2024-04-24T20:01:41.592261
  
2082 / tcp
-265186615 | 2024-04-24T20:01:43.999791
  
2083 / tcp
661823076 | 2024-04-02T23:07:03.984788
  
2086 / tcp
244968535 | 2024-04-26T01:21:42.681906
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved