177.38.224.88

Regular View Raw Data Timeline
Last Seen: 2025-03-31
Tags:
starttls

GeneralInformation

Hostnames abup.com.br
88.abup.com.br
abup2024.abup.com.br
autoconfig.abup2024.abup.com.br
autodiscover.abup2024.abup.com.br
cpanel.abup2024.abup.com.br
cpcalendars.abup2024.abup.com.br
cpcontacts.abup2024.abup.com.br
ipv6.abup2024.abup.com.br
mail.abup2024.abup.com.br
webdisk.abup2024.abup.com.br
webmail.abup2024.abup.com.br
whm.abup2024.abup.com.br
www.abup2024.abup.com.br
Domains abup.com.br 
Country Brazil
City São Paulo
Organization Host One Servicos de Internet Ltda
ISP Host One Servicos de Internet Ltda
ASN AS28216

WebTechnologies

Cookie compliance
Databases
Form builders
JavaScript frameworks
Marketing automation
Programming languages
Security
Tag managers
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
21 / tcp
-1296905138 | 2025-03-28T01:08:25.118795
53 / tcp
-2012586919 | 2025-03-14T08:20:47.663275
53 / udp
-2012586919 | 2025-03-17T01:50:44.261868
80 / tcp
1414114281 | 2025-03-31T16:17:11.858936
110 / tcp
1952082069 | 2025-03-31T15:14:07.538536
443 / tcp
-34047496 | 2025-03-29T02:56:53.267967
993 / tcp
-1132241830 | 2025-03-19T17:15:56.509562
995 / tcp
-1001764030 | 2025-03-14T02:01:57.648447
2082 / tcp
905873302 | 2025-03-22T04:44:33.174695
2083 / tcp
688777749 | 2025-03-29T00:50:19.674915
2086 / tcp
58846031 | 2025-03-22T04:14:06.649082
2087 / tcp
-1976676657 | 2025-03-31T14:30:04.521154



Contact Us

Shodan ® - All rights reserved