108.160.154.52

Regular View Raw Data
Last Seen: 2024-09-12
Tags:
starttls

GeneralInformation

Hostnames babooncreation.com
host.baboonserver.com
autoconfig.host.baboonserver.com
autodiscover.host.baboonserver.com
cpanel.host.baboonserver.com
cpcalendars.host.baboonserver.com
cpcontacts.host.baboonserver.com
ipv6.host.baboonserver.com
mail.host.baboonserver.com
webdisk.host.baboonserver.com
webmail.host.baboonserver.com
whm.host.baboonserver.com
www.host.baboonserver.com
Domains babooncreation.com baboonserver.com 
Country United States
City Atlanta
Organization PrivateSystems Networks GA
ISP PrivateSystems Networks
ASN AS63410

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

1976561173 | 2024-09-04T10:48:29.076805
  
21 / tcp
-1803911318 | 2024-09-04T03:15:06.946761
  
26 / tcp
-1075080651 | 2024-08-28T11:16:27.592371
  
53 / udp
1428979498 | 2024-09-12T11:42:39.241760
  
80 / tcp
1952082069 | 2024-09-06T17:43:31.291599
  
110 / tcp
1559185454 | 2024-08-22T13:28:51.646525
  
143 / tcp
81891052 | 2024-09-11T01:16:46.788810
  
443 / tcp
-2128606719 | 2024-09-09T19:16:22.688395
  
465 / tcp
-1946805093 | 2024-09-12T05:24:16.311936
  
587 / tcp
-1132241830 | 2024-09-12T06:53:17.105033
  
993 / tcp
-1001764030 | 2024-09-12T09:56:14.904890
  
995 / tcp
-690366734 | 2024-08-27T21:36:08.121526
  
2082 / tcp
-1382433944 | 2024-08-20T21:59:48.597911
  
2086 / tcp
1591505268 | 2024-09-07T16:09:53.602590
  
2087 / tcp
-1529224596 | 2024-08-14T06:00:06.807153
  
7080 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[443],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();