185.60.226.55

Regular View Raw Data
Last Seen: 2024-05-07

GeneralInformation

Hostnames fs.antur.com.tr
www.antur.com.tr
fs.argosincappadocia.com
fs.bizistanbul.com.tr
fs.borsarestaurants.com
d-ream.com.tr
fs.dmarisbay.com
dhrgcalisanportali.dogushrg.com
emutabakat.dogushrg.com
testworkflow.dogushrg.com
fs.dresortgocek.com
fs.lacivertrestaurant.com
fs.masarestaurant.com.tr
fs.masarestaurants.com.tr
fs.mezzaluna.com.tr
fs.parleistanbul.com
fs.thepopulist.com.tr
torchbrewery.com
fs.torchbrewery.com
www.torchbrewery.com
Domains antur.com.tr argosincappadocia.com bizistanbul.com.tr borsarestaurants.com d-ream.com.tr dmarisbay.com dogushrg.com dresortgocek.com lacivertrestaurant.com masarestaurant.com.tr masarestaurants.com.tr mezzaluna.com.tr parleistanbul.com thepopulist.com.tr torchbrewery.com 
Country Turkey
City Istanbul
Organization Dogus Bilgi Islem ve Teknoloji Hizmetleri A.S
ISP Dogus Bilgi Islem ve Teknoloji Hizmetleri A.S
ASN AS201160

WebTechnologies

JavaScript libraries
Security

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

OpenPorts

173221746 | 2024-05-07T04:06:31.978595
  
80 / tcp
-194591584 | 2024-04-08T21:32:45.315171
  
443 / tcp



Contact Us

Shodan ® - All rights reserved