107.149.126.241

Regular View Raw Data Timeline
Last Seen: 2025-03-17

GeneralInformation

Hostnames 86xingqiu.com
www.86xingqiu.com
cdwzsh.com
www.cdwzsh.com
dzhongshu.com
www.dzhongshu.com
fhgzz.com
www.fhgzz.com
gdgangcai.com
www.gdgangcai.com
hnhouji.com
www.hnhouji.com
hnkuangdu.com
www.hnkuangdu.com
maidiantv.com
www.maidiantv.com
mdsff.com
www.mdsff.com
meitijuka.com
www.meitijuka.com
nqkcxx.com
www.nqkcxx.com
qwfpp.com
www.qwfpp.com
sanyusan.com
www.sanyusan.com
scgelan.com
www.scgelan.com
shhuajiu.com
www.shhuajiu.com
taochongjie.com
www.taochongjie.com
tongxutang168.com
www.tongxutang168.com
xjjdmgcjx.com
www.xjjdmgcjx.com
xjythbz.com
www.xjythbz.com
youyihs.com
www.youyihs.com
zqyza.com
www.zqyza.com
Domains 86xingqiu.com cdwzsh.com dzhongshu.com fhgzz.com gdgangcai.com hnhouji.com hnkuangdu.com maidiantv.com mdsff.com meitijuka.com nqkcxx.com qwfpp.com sanyusan.com scgelan.com shhuajiu.com taochongjie.com tongxutang168.com xjjdmgcjx.com xjythbz.com youyihs.com zqyza.com 
Country United States
City San Jose
Organization PEG TECH INC
ISP PEG TECH INC
ASN AS54600

WebTechnologies

JavaScript libraries
Tag managers

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

OpenPorts

21 / tcp
592896600 | 2025-03-17T18:08:16.802560
80 / tcp
1765360226 | 2025-03-14T09:05:21.438635
443 / tcp
852419302 | 2025-03-13T04:34:24.674553



Contact Us

Shodan ® - All rights reserved