Last Seen: 2025-04-26

GeneralInformation

5sigmaeducation.com
    m.5sigmaeducation.com
    www.5sigmaeducation.com
cswopu.com
    m.cswopu.com
    www.cswopu.com
gzhzsw.com
    m.gzhzsw.com
    www.gzhzsw.com
hbrgjd.com
    m.hbrgjd.com
    www.hbrgjd.com
junlongqiche.com
    m.junlongqiche.com
    www.junlongqiche.com
kiriclean.com
    m.kiriclean.com
    www.kiriclean.com
naarobot.com
    m.naarobot.com
    www.naarobot.com
qdctzl.com
    m.qdctzl.com
    www.qdctzl.com
sgdibang.com
    m.sgdibang.com
    www.sgdibang.com
sxyfjdsb.com
    m.sxyfjdsb.com
    www.sxyfjdsb.com
yssc1688.com
    m.yssc1688.com
    www.yssc1688.com
zgjuanlianji.com
    m.zgjuanlianji.com
    www.zgjuanlianji.com

WebTechnologies

JavaScript libraries

OpenPorts

80 / tcp
617769728 | 2025-04-24T17:51:13.397959
443 / tcp
2048388070 | 2025-04-26T04:24:41.644047

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.



Contact Us

Shodan ® - All rights reserved