162.241.130.99

Regular View Raw Data Timeline
Last Seen: 2025-02-28

GeneralInformation

Hostnames 3difica.com
www.i.3difica.com
vpsmx.3difica.com
autoconfig.vpsmx.3difica.com
autodiscover.vpsmx.3difica.com
cpanel.vpsmx.3difica.com
cpcalendars.vpsmx.3difica.com
cpcontacts.vpsmx.3difica.com
ipv6.vpsmx.3difica.com
mail.vpsmx.3difica.com
webdisk.vpsmx.3difica.com
webmail.vpsmx.3difica.com
whm.vpsmx.3difica.com
www.vpsmx.3difica.com
Domains 3difica.com 
Country United States
City Atlanta
Organization Unified Layer
ISP Network Solutions, LLC
ASN AS19871

WebTechnologies

JavaScript frameworks
JavaScript graphics
JavaScript libraries
Security
UI frameworks
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
21 / tcp
1862491157 | 2025-02-28T20:03:59.643411
26 / tcp
1472401191 | 2025-02-25T01:54:37.498375
53 / udp
-97323406 | 2025-02-26T09:22:06.906642
80 / tcp
-1541489074 | 2025-02-12T18:30:06.492347
110 / tcp
1952082069 | 2025-02-27T21:40:25.245304
143 / tcp
1559185454 | 2025-02-25T03:00:35.424732
443 / tcp
-832013128 | 2025-02-28T17:55:05.267975
465 / tcp
-1638533647 | 2025-02-23T08:39:48.423433
587 / tcp
1329126510 | 2025-02-22T16:35:01.673148
993 / tcp
-1132241830 | 2025-02-15T20:12:30.085548
2082 / tcp
-1840607907 | 2025-02-26T22:22:53.315334
2083 / tcp
-262483239 | 2025-02-28T03:53:25.917528
2086 / tcp
-1115274254 | 2025-02-28T23:56:27.686080
2087 / tcp
1342385748 | 2025-02-20T06:40:46.765727
3306 / tcp
2052265769 | 2025-02-19T04:55:05.098205



Contact Us

Shodan ® - All rights reserved