75.103.79.186

Regular View Raw Data Timeline
Last Seen: 2025-03-21
Tags:
starttls

GeneralInformation

Hostnames drcstiles.com
www.drcstiles.com
cloudwebx4.newtekwebhosting.com
Domains drcstiles.com newtekwebhosting.com 
Country United States
City Phoenix
Organization Newtek Technology Solutions, Inc
ISP NewtekOne, Inc.
ASN AS14992

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(2)
CVE-2024-9944
5.3The WooCommerce plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 9.0.2. This is due to the plugin not properly neutralizing HTML elements from submitted order forms. This makes it possible for unauthenticated attackers to inject arbitrary HTML that will render when the administrator views order form submissions.
CVE-2024-6484
6.4A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an <a> tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser.
2023(1)
CVE-2023-52222
4.3Cross-Site Request Forgery (CSRF) vulnerability in Automattic WooCommerce.This issue affects WooCommerce: from n/a through 8.2.2.
2022(2)
CVE-2022-2099
4.8The WooCommerce WordPress plugin before 6.6.0 is vulnerable to stored HTML injection due to lack of escaping and sanitizing in the payment gateway titles
CVE-2022-0775
4.3The WooCommerce WordPress plugin before 6.2.1 does not have proper authorisation check when deleting reviews, which could allow any authenticated users, such as subscriber to delete arbitrary comment
2021(2)
CVE-2021-32790
4.9Woocommerce is an open source eCommerce plugin for WordPress. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce plugin between version 3.3.0 and 3.3.6. Malicious actors (already) having admin access, or API keys to the WooCommerce site can exploit vulnerable endpoints of `/wp-json/wc/v3/webhooks`, `/wp-json/wc/v2/webhooks` and other webhook listing API. Read-only SQL queries can be executed using this exploit, while data will not be returned, by carefully crafting `search` parameter information can be disclosed using timing and related attacks. Version 3.3.6 is the earliest version of Woocommerce with a patch for this vulnerability. There are no known workarounds other than upgrading.
CVE-2021-24323
4.8When taxes are enabled, the "Additional tax classes" field was not properly sanitised or escaped before being output back in the admin dashboard, allowing high privilege users such as admin to use XSS payloads even when the unfiltered_html is disabled
2019(1)
CVE-2019-8331
6.1In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
2018(4)
CVE-2018-20677
6.1In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
CVE-2018-20676
6.1In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
CVE-2018-14042
6.1In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CVE-2018-14040
6.1In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
2016(1)
CVE-2016-10735
6.1In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
80 / tcp
0 | 2025-03-14T01:16:21.545936
110 / tcp
1952082069 | 2025-03-21T01:44:34.411610
143 / tcp
1559185454 | 2025-03-18T07:44:24.523606
443 / tcp
-1548776280 | 2025-03-14T01:16:29.000390
465 / tcp
2053239630 | 2025-03-20T11:56:40.056101
587 / tcp
1856690967 | 2025-03-13T11:13:04.852653
993 / tcp
-1132241830 | 2025-03-18T16:04:10.618294
2083 / tcp
-1338694683 | 2025-03-16T17:59:29.519886
2095 / tcp
93917604 | 2025-03-13T06:58:41.179063



Contact Us

Shodan ® - All rights reserved