84.201.182.38

Regular View Raw Data
Last Seen: 2024-05-02
Tags:
cloudeol-os

GeneralInformation

Hostnames gorodrabot.ru
Domains gorodrabot.ru 
Cloud Provider Yandex
Country Russian Federation
City Moscow
Organization Yandex.Cloud LLC
ISP Yandex.Cloud LLC
ASN AS200350

WebTechnologies

Font scripts
JavaScript frameworks
JavaScript graphics
JavaScript libraries
Miscellaneous
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

OpenPorts

2117593881 | 2024-04-24T16:24:19.084622
  
22 / tcp
-189519813 | 2024-04-19T05:55:41.609269
  
9001 / tcp
-189519813 | 2024-05-01T14:41:09.167705
  
9002 / tcp
-84955724 | 2024-05-02T17:31:00.186506
  
9090 / tcp
-1836465485 | 2024-04-25T01:23:45.024213
  
9100 / tcp



Contact Us

Shodan ® - All rights reserved