99.86.74.49

Regular View Raw Data
Last Seen: 2024-05-10
Tags:
cdncloud

GeneralInformation

Hostnames status.acrolinx.cloud
status.bcs-hr.com
status.bronco.ai
status.cleartrace.io
server-99-86-74-49.iah50.r.cloudfront.net
status.crosoftware.com
status.crowdbotics.com
status.dconnect365.nl
status.disco.co
status-http.esputnik.com
status.euroe.com
status.extole.com
status.formlabs.com
getsquirestatus.com
status.getweave.com
trust.govskope.us
status.huntflow.ru
status.huntress.com
status.kinectcommunications.com
status.linc-ed.com
status.medsender.com
status.motionstatus.nl
foundry-usc-1.status.palantir.com
status.qintel.com
status.rewardgateway.net
status.rinteria.net
status5.securiti.ai
status.sixty.app
status.skybloxsystems.com
status.smokeball.co.uk
status.syndica.io
status.salesplanning.varicent.com
status.vcec.cloud
status.vintrace.com
status.youngplatform.com
status.connect.youversion.com
Domains acrolinx.cloud bcs-hr.com bronco.ai cleartrace.io cloudfront.net crosoftware.com crowdbotics.com dconnect365.nl disco.co esputnik.com euroe.com extole.com formlabs.com getsquirestatus.com getweave.com govskope.us huntflow.ru huntress.com kinectcommunications.com linc-ed.com medsender.com motionstatus.nl palantir.com qintel.com rewardgateway.net rinteria.net securiti.ai sixty.app skybloxsystems.com smokeball.co.uk syndica.io varicent.com vcec.cloud vintrace.com youngplatform.com youversion.com 
Cloud Provider Amazon
Cloud Region GLOBAL
Cloud Service CLOUDFRONT
Country United States
City Houston
Organization Amazon.com, Inc.
ISP Amazon.com, Inc.
ASN AS16509

WebTechnologies

Security
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

OpenPorts

619994757 | 2024-05-10T02:48:44.113971
  
80 / tcp
-332642361 | 2024-05-10T06:54:21.541517
  
443 / tcp



Contact Us

Shodan ® - All rights reserved