176.61.149.217

Regular View Raw Data Timeline
Last Seen: 2025-03-28

GeneralInformation

Hostnames amadeosouza-cardoso.pt
dis-connect.pt
live-place.com
www.live-place.com
server.thesign.pt
autoconfig.server.thesign.pt
autodiscover.server.thesign.pt
cpanel.server.thesign.pt
cpcalendars.server.thesign.pt
cpcontacts.server.thesign.pt
ipv6.server.thesign.pt
mail.server.thesign.pt
webdisk.server.thesign.pt
webmail.server.thesign.pt
whm.server.thesign.pt
www.server.thesign.pt
servidor.thesign.pt
autoconfig.servidor.thesign.pt
autodiscover.servidor.thesign.pt
cpanel.servidor.thesign.pt
cpcalendars.servidor.thesign.pt
cpcontacts.servidor.thesign.pt
ipv6.servidor.thesign.pt
mail.servidor.thesign.pt
webdisk.servidor.thesign.pt
webmail.servidor.thesign.pt
whm.servidor.thesign.pt
www.servidor.thesign.pt
Domains amadeosouza-cardoso.pt dis-connect.pt live-place.com thesign.pt 
Country Portugal
City Faro
Organization Dominios.pt Dedicated Servers
ISP DMNS - DOMINIOS, S.A.
ASN AS33876

WebTechnologies

JavaScript libraries
Live chat
Miscellaneous
Tag managers
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2007(1)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
80 / tcp
-1483799287 | 2025-03-13T11:30:43.273023
443 / tcp
-260234625 | 2025-03-28T16:48:09.827464
2082 / tcp
110553246 | 2025-03-12T21:37:54.551868
2083 / tcp
110553246 | 2025-03-05T03:21:56.494608
2087 / tcp
159116086 | 2025-03-25T02:27:27.609543
2095 / tcp
-613509102 | 2025-03-10T01:43:45.389951



Contact Us

Shodan ® - All rights reserved