93.93.119.72

Regular View Raw Data Timeline
Last Seen: 2025-03-13

GeneralInformation

Hostnames edicionesobelisco.com
www.edicionesobelisco.com
ip93-93-119-72.pbiaas.com
Domains edicionesobelisco.com pbiaas.com 
Country Spain
City La Línea de la Concepción
Organization ARSYS INTERNET S.L.U.
ISP IONOS SE
ASN AS8560

WebTechnologies

Databases
Photo galleries
Programming languages
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2020(2)
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
2019(1)
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
2015(1)
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

OpenPorts

21 / tcp
1169494367 | 2025-03-13T06:01:40.163144
80 / tcp
-567627901 | 2025-03-10T01:09:02.813288
443 / tcp
1933054140 | 2025-03-11T20:26:42.915866
8080 / tcp
1864151577 | 2025-03-12T22:06:24.027536



Contact Us

Shodan ® - All rights reserved