213.238.183.33

Regular View Raw Data
Last Seen: 2024-05-16
Tags:
starttls

GeneralInformation

Hostnames adiyamanbluwhite.com
33.183.238.213.static.cenuta.com
servername.co
Domains adiyamanbluwhite.com cenuta.com servername.co 
Country Turkey
City Bayraklı
Organization Cenuta Telekomunikasyon Anonim Sirketi
ISP Cenuta Telekomunikasyon Anonim Sirketi
ASN AS213252

WebTechnologies

JavaScript libraries
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51766 Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2022-37452 Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2021-38371 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
CVE-2019-8331 4.3In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
CVE-2018-20677 4.3In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
CVE-2018-20676 4.3In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
CVE-2018-14042 4.3In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CVE-2018-14040 4.3In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
CVE-2016-10735 4.3In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
-318554527 | 2024-05-10T14:21:29.503280
  
21 / tcp
1460327190 | 2024-05-07T22:33:28.267962
  
53 / tcp
1460327190 | 2024-05-16T01:20:40.986370
  
53 / udp
-1983076966 | 2024-05-15T06:47:05.080531
  
80 / tcp
1952082069 | 2024-05-02T12:11:39.661823
  
110 / tcp
-1345205424 | 2024-05-09T16:52:11.084301
  
111 / tcp
-1345205424 | 2024-04-20T11:34:07.552156
  
111 / udp
1311963756 | 2024-05-16T19:27:35.116779
  
443 / tcp
667377118 | 2024-05-16T18:05:59.468488
  
465 / tcp
-825784153 | 2024-05-14T18:39:06.073720
  
587 / tcp
-1132241830 | 2024-04-24T01:04:35.075003
  
993 / tcp
-1001764030 | 2024-04-24T06:12:44.769513
  
995 / tcp
491601490 | 2024-05-11T06:44:11.645763
  
2082 / tcp
1700542011 | 2024-05-11T06:44:13.605848
  
2083 / tcp
-1142496638 | 2024-05-15T07:16:11.870674
  
2086 / tcp
1210270377 | 2024-05-14T15:23:38.814573
  
2087 / tcp



Contact Us

Shodan ® - All rights reserved