96.126.123.64

Regular View Raw Data
Last Seen: 2024-05-17

GeneralInformation

Hostnames ip-96-126-123-64.cloudezapp.io
mail.johnnyshamburgueria.com.br
mail.pingodaguaegoteirinha.com.br
www.mail.pingodaguaegoteirinha.com.br
mail.quinteiroslanches.com.br
www.mail.quinteiroslanches.com.br
mail.ritabrigadeiros.com.br
mail.salgadinhoswak.com.br
www.mail.salgadinhoswak.com.br
mail.shogaholl.com.br
www.mail.shogaholl.com.br
mail.varandadaplanta.com.br
www.mail.varandadaplanta.com.br
Domains cloudezapp.io johnnyshamburgueria.com.br pingodaguaegoteirinha.com.br quinteiroslanches.com.br ritabrigadeiros.com.br salgadinhoswak.com.br shogaholl.com.br varandadaplanta.com.br 
Cloud Provider Linode
Cloud Region us-tx
Country United States
City Richardson
Organization Linode
ISP Akamai Connected Cloud
ASN AS63949

WebTechnologies

JavaScript libraries
Miscellaneous
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
947922109 | 2024-05-15T07:12:46.739653
  
22 / tcp
1703344295 | 2024-05-03T19:12:56.116716
  
25 / tcp
-362566066 | 2024-04-18T17:00:33.028714
  
80 / tcp
871556360 | 2024-05-13T05:57:27.299523
  
110 / tcp
-2126519490 | 2024-05-14T23:12:04.712408
  
143 / tcp
509609200 | 2024-05-13T12:10:46.575783
  
443 / tcp
1922052903 | 2024-05-12T18:25:52.521413
  
465 / tcp
-762531063 | 2024-05-04T02:10:00.422236
  
587 / tcp
1511057577 | 2024-05-14T13:08:33.484749
  
993 / tcp
-312069296 | 2024-05-06T17:01:59.852872
  
995 / tcp
947922109 | 2024-05-17T14:13:12.193624
  
2222 / tcp



Contact Us

Shodan ® - All rights reserved