61.160.210.8

Regular View Raw Data Timeline
Last Seen: 2025-03-12

GeneralInformation

Hostnames api.wangnian.cc
Domains wangnian.cc 
Country China
City Shanghai
Organization CHINANET jiangsu province network
ISP CHINATELECOM Jiangsu province Changzhou 5G network
ASN AS140293

WebTechnologies

JavaScript libraries
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2021(1)
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
443 / tcp
448628184 | 2025-03-09T05:48:40.543611
3306 / tcp
493370898 | 2025-03-11T04:45:22.966588
6379 / tcp
-1927723706 | 2025-03-09T21:22:15.984413
8060 / tcp
-1500110387 | 2025-03-11T09:03:06.815539
8081 / tcp
-1492244242 | 2025-03-05T18:05:37.695873
8085 / tcp
1913094852 | 2025-03-12T15:12:55.542749
9000 / tcp
1303420644 | 2025-02-28T09:27:59.235828
9100 / tcp
-1391197597 | 2025-03-07T12:53:46.529123
9191 / tcp
606626611 | 2025-03-10T17:33:56.296935
9200 / tcp
1110848602 | 2025-02-28T02:11:22.548647
15672 / tcp
-1347322994 | 2025-02-15T04:40:22.007454



Contact Us

Shodan ® - All rights reserved