Last Seen: 2025-04-22
Tags:
self-signed

GeneralInformation

sim-sports.es
    www.sim-sports.es

WebTechnologies

JavaScript graphics
Photo galleries
UI frameworks
Web frameworks
21 / tcp
-370734890 | 2025-04-15T02:06:42.179513
135 / tcp
-1309854408 | 2025-04-12T16:21:08.031087
139 / tcp
-757264002 | 2025-04-17T12:07:08.846034
443 / tcp
1895319013 | 2025-04-17T11:32:31.737571
445 / tcp
-1166656618 | 2025-04-19T01:58:54.492218
3389 / tcp
1531454363 | 2025-04-22T22:14:38.688957
5357 / tcp
-1684583448 | 2025-04-21T22:14:39.255804
5985 / tcp
1489525118 | 2025-04-22T18:14:15.247504

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(3)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-0796
10A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.



Contact Us

Shodan ® - All rights reserved