43.252.175.147

Regular View Raw Data Timeline
Last Seen: 2025-03-23

GeneralInformation

Country Hong Kong
City Tseung Kwan O
Organization Large Bright
ISP Dimension Network & Communication Limited
ASN AS59371
Operating System Windows

WebTechnologies

JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(3)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-7656
6.1jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
2012(1)
CVE-2012-6708
6.1jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
21 / tcp
-940868192 | 2025-03-22T07:03:04.455328
80 / tcp
651182209 | 2025-03-20T17:59:56.770306
443 / tcp
651182209 | 2025-03-23T12:06:09.703179
20000 / tcp
746446718 | 2025-03-17T01:15:30.454149
20020 / tcp
-23674247 | 2025-03-06T20:23:29.395481
20050 / tcp
-23674247 | 2025-02-25T04:28:26.108142
20053 / tcp
-23674247 | 2025-02-26T03:08:20.514822
20107 / tcp
-23674247 | 2025-03-22T02:29:09.824843
20151 / tcp
-23674247 | 2025-03-05T10:03:25.332181
20200 / tcp
-23674247 | 2025-03-16T10:01:20.661474
20256 / tcp
-1896734312 | 2025-03-18T19:55:15.204075
20440 / tcp
-23674247 | 2025-03-20T20:23:02.952990
20600 / tcp
-23674247 | 2025-03-12T15:22:39.491795
20800 / tcp
-23674247 | 2025-03-04T22:28:42.427253
20880 / tcp
1628629604 | 2025-03-18T15:10:45.713894
20892 / tcp
-23674247 | 2025-03-14T18:28:43.822976
20900 / tcp
-23674247 | 2025-03-17T17:24:55.113663
21002 / tcp
-23674247 | 2025-02-28T16:25:31.142921
21025 / tcp
-23674247 | 2025-03-20T19:49:25.624851
21240 / tcp
-23674247 | 2025-03-14T13:33:36.866726
21245 / tcp
-23674247 | 2025-02-23T08:45:34.114839
21246 / tcp
-23674247 | 2025-02-25T03:18:55.568987
21257 / tcp
-23674247 | 2025-03-14T07:20:43.423585
21261 / tcp
-23674247 | 2025-03-22T08:12:24.589022
21264 / tcp
-23674247 | 2025-03-05T03:01:37.379279
21265 / tcp
-23674247 | 2025-03-05T12:07:27.669895
21277 / tcp
-23674247 | 2025-02-28T04:59:05.665132
21278 / tcp
-23674247 | 2025-03-23T12:06:07.436002
21282 / tcp
-23674247 | 2025-03-08T15:11:22.192989
21283 / tcp
-23674247 | 2025-02-23T08:59:02.104488
21291 / tcp
-23674247 | 2025-03-11T15:35:03.695031
21297 / tcp
-23674247 | 2025-02-23T04:26:57.518473
21298 / tcp
-23674247 | 2025-03-12T01:35:22.589231
21303 / tcp
-23674247 | 2025-03-20T14:43:56.202995
21304 / tcp
-23674247 | 2025-03-10T10:23:55.381219
21306 / tcp
-23674247 | 2025-02-27T14:48:28.887490
21312 / tcp
-23674247 | 2025-03-20T12:51:02.080361
21314 / tcp
-23674247 | 2025-02-28T15:14:37.617539
21315 / tcp
-23674247 | 2025-03-19T01:12:10.785114
21317 / tcp
-23674247 | 2025-03-21T21:45:32.506611
21319 / tcp
-23674247 | 2025-03-09T21:53:08.933842
21326 / tcp
-23674247 | 2025-03-16T08:03:23.900665
21379 / tcp
-234250530 | 2025-03-23T00:34:31.217177
21400 / tcp
-23674247 | 2025-03-04T12:39:48.932844
22022 / tcp
-23674247 | 2025-02-24T06:15:08.221212
22703 / tcp
-23674247 | 2025-03-05T11:02:27.275662
23023 / tcp
-2112541340 | 2025-03-23T22:18:41.441972
23424 / tcp
-23674247 | 2025-03-18T18:29:04.660096
24181 / tcp
-23674247 | 2025-03-04T20:03:57.250340
24245 / tcp
-2112541340 | 2025-03-14T14:08:40.794626
24442 / tcp
-23674247 | 2025-03-15T02:17:02.051811
24472 / tcp
-23674247 | 2025-03-11T10:40:51.751377
24510 / tcp
-23674247 | 2025-03-19T03:56:41.726080
25002 / tcp
-23674247 | 2025-03-23T06:41:19.689022
25003 / tcp
-23674247 | 2025-02-28T10:10:47.571650
25006 / tcp
-23674247 | 2025-03-12T04:03:20.697889
25105 / tcp
-2112541340 | 2025-03-22T20:06:58.641991
25565 / tcp
1756909834 | 2025-03-07T06:39:39.890354
26656 / tcp
-2112541340 | 2025-03-13T05:52:28.500494
26657 / tcp
-2112541340 | 2025-03-12T02:01:22.096562
27015 / tcp
797521439 | 2025-03-12T21:33:22.740334
27017 / tcp
-23674247 | 2025-03-23T07:49:13.018156



Contact Us

Shodan ® - All rights reserved