198.46.147.226

Regular View Raw Data Timeline
Last Seen: 2025-02-28

GeneralInformation

Hostnames blogtalk.org
www.blogtalk.org
198-46-147-226-host.colocrossing.com
Domains blogtalk.org colocrossing.com 
Country United States
City Los Angeles
Organization RackNerd LLC
ISP HostPapa
ASN AS36352

WebTechnologies

Ecommerce
JavaScript libraries
Message boards
Programming languages
UI frameworks
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024
CVE-2024-47772
6.5Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.
CVE-2024-45297
5.3Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-45051
8.2Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-43789
7.5Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-6484
6.4A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an <a> tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
2019
CVE-2019-8331
6.1In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
2018
CVE-2018-20677
6.1In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
CVE-2018-20676
6.1In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
CVE-2018-14042
6.1In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CVE-2018-14040
6.1In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
2016
CVE-2016-10735
6.1In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
21 / tcp
-402356431 | 2025-02-17T19:00:12.656006
80 / tcp
1637199859 | 2025-02-23T22:33:58.357482
443 / tcp
-1748190409 | 2025-02-24T05:05:15.897080
5000 / tcp
0 | 2025-02-28T12:11:59.138778
6000 / tcp
-1871644766 | 2025-02-26T00:08:54.709250
7001 / tcp
-1246004407 | 2025-02-27T12:59:45.377000
8080 / tcp
-910325710 | 2025-02-11T08:24:04.987314
8111 / tcp
-1647376167 | 2025-02-11T00:27:22.985059
11371 / tcp
-854575691 | 2025-02-18T19:11:13.890561



Contact Us

Shodan ® - All rights reserved