93.115.112.13

Regular View Raw Data Timeline
Last Seen: 2025-04-12
Tags:
starttls

GeneralInformation

Hostnames amfostacolo.ro
cpanel.amfostacolo.ro
cpcalendars.amfostacolo.ro
cpcontacts.amfostacolo.ro
test.amfostacolo.ro
vps.amfostacolo.ro
webdisk.amfostacolo.ro
webmail.amfostacolo.ro
www.amfostacolo.ro
forum-hotel.ro
super-last-minute.ro
superlastminute.ro
vacanta-in-bulgaria.ro
vacanta-in-grecia.ro
vacanta-in-turcia.ro
Domains amfostacolo.ro forum-hotel.ro super-last-minute.ro superlastminute.ro vacanta-in-bulgaria.ro vacanta-in-grecia.ro vacanta-in-turcia.ro 
Country Romania
City Ploieşti
Organization Cyber_Folks SRL
ISP GTS Telecom SRL
ASN AS5606

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
21 / tcp
846436303 | 2025-04-11T22:46:14.138834
26 / tcp
1798933744 | 2025-04-11T19:29:49.963500
53 / tcp
672911699 | 2025-03-18T10:41:26.783151
53 / udp
672911699 | 2025-04-02T11:00:35.623886
80 / tcp
-620360137 | 2025-04-11T02:40:17.799568
110 / tcp
1952082069 | 2025-04-08T03:28:14.874462
143 / tcp
1559185454 | 2025-04-12T11:52:46.380281
443 / tcp
-1992429535 | 2025-04-11T02:40:21.958340
465 / tcp
284926578 | 2025-03-19T20:54:21.657061
587 / tcp
-1253291284 | 2025-03-20T13:05:51.981352
993 / tcp
-1132241830 | 2025-04-07T21:04:47.454135
995 / tcp
-1001764030 | 2025-04-11T20:26:35.563216
2077 / tcp
-1429820646 | 2025-03-25T10:38:30.915820
2079 / tcp
-1429820646 | 2025-04-06T06:38:50.959340
2082 / tcp
405239616 | 2025-04-12T17:45:15.324376
2083 / tcp
1434983647 | 2025-04-04T15:14:27.084454
2086 / tcp
445478591 | 2025-04-03T19:57:16.923478
2087 / tcp
2112749948 | 2025-04-03T16:13:09.280736
2096 / tcp
1158972878 | 2025-03-14T23:53:24.851211
7080 / tcp
0 | 2025-04-07T05:12:50.787389



Contact Us

Shodan ® - All rights reserved