85.214.91.47

Regular View Raw Data
Last Seen: 2024-04-17

GeneralInformation

Hostnames auto55.be
h2253777.stratoserver.net
Domains auto55.be stratoserver.net 
Country Germany
City Berlin
Organization Strato Rechenzentrum, Berlin
ISP Strato AG
ASN AS6724
Operating System Unix

WebTechnologies

Advertising
Cookie compliance
JavaScript frameworks
JavaScript libraries
Security

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-1938 7.5When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible.
CVE-2020-11023 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2015-9251 6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
2005312899 | 2024-04-17T22:50:30.518628
  
21 / tcp
490283957 | 2024-03-22T23:01:19.323955
  
25 / tcp
-186294972 | 2024-04-15T12:23:05.023913
  
80 / tcp
1969172110 | 2024-04-15T17:34:50.888062
  
443 / tcp
-2084771602 | 2024-03-31T09:30:40.482207
  
465 / tcp
-1341452413 | 2024-04-03T12:05:52.204673
  
587 / tcp
-1633001339 | 2024-04-08T11:37:46.180373
  
993 / tcp
-224050052 | 2024-04-17T17:58:22.860749
  
995 / tcp
1001801738 | 2024-04-16T15:29:24.431792
  
8009 / tcp
-1813364305 | 2024-04-16T16:42:10.296211
  
8080 / tcp
-1829493130 | 2024-04-16T20:20:06.865436
  
8443 / tcp
-884058403 | 2024-03-22T07:52:07.407948
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved