Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

118.70.133.137

SummaryCVE DetailsRaw Data
{
  "scan_id": 1752774106,
  "ip": "118.70.133.137",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "118.70.132.0/22",
    "postal_code": "100000",
    "coordinates": {
      "latitude": "21.0184",
      "longitude": "105.8461"
    },
    "geo_point": "21.0184, 105.8461",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "VN",
    "country_name": "Vietnam",
    "city": "Hanoi"
  },
  "location_updated_at": "2025-07-18T16:47:30Z",
  "asn": {
    "number": "AS18403",
    "organization": "FPT Telecom Company",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "118.70.133.0/24",
    "organization": "Vietnam Internet Network Information Center (VNNIC)",
    "descr": "Vietnam Internet Network Information Center (VNNIC),\n18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam,\n10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:27:04Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-07-18T16:47:30Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-07-18T18:42:30Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-07-18T16:47:30Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.24.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.24\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
          "body_murmur": 1637199859,
          "body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
          "component": [
            "Nginx:1.24.0",
            "Ubuntu"
          ],
          "content_length": -1,
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 21 Jul 2025 03:39:31 GMT"
            ],
            "etag": [
              "W/\"66b20ad6-267\""
            ],
            "last_modified": [
              "Tue, 06 Aug 2024 11:36:54 GMT"
            ],
            "server": [
              "nginx/1.24.0 (Ubuntu)"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "118.70.133.137",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "Welcome to nginx!",
          "transfer_encoding": [
            "chunked"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "score": 2.1,
          "severity": "low"
        }
      ],
      "url": "http://118.70.133.137/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-21T03:39:31.737Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "https",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "ssl",
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n\n<head>\n    <meta charset=\"utf-8\">\n    <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n    <meta name=\"robots\" content=\"noindex, nofollow\">\n\n            <meta name=\"viewport\" content=\"width=device-width,initial-scale=1\"/>\n    <title>Login to IEM</title>\n    <link rel=\"icon\" href=\"/auth/resources/nasof/login/custom/img/favicon.ico\" />\n            <link href=\"/auth/resources/nasof/login/custom/css/styles.css\" rel=\"stylesheet\" />\n            <link href=\"/auth/resources/nasof/login/custom/css/ix-icons.css\" rel=\"stylesheet\" />\n            <script src=\"/auth/resources/nasof/login/custom/js/show-hide-password.js\" type=\"text/javascript\"></script>\n    <script type=\"module\" src=\"/osbar/iema-os-bar/iema-os-bar.esm.js\"></script>\n    <link rel=\"stylesheet\" href=\"/osbar/iema-os-bar/iema-os-bar.css\"/>\n</head>\n\n<body class=\"difads theme-brand-light\">\n    <iema-os-bar app-info=\"/auth/resources/nasof/login/custom/assets/app-info.json\" language=\"en\"></iema-os-bar>\n    <div class=\"wrapper\">        \n        <div class=\"layout\">\n            <div class=\"layout__left\">\n                <div class=\"layout__leftContainer\">\n                    <header>\n                                <p class=\"font--xxlarge font--bold\" id=\"kc-page-title\">        We are sorry...\n</p>\n                    </header>\n                    <div id=\"kc-content\">\n                        <div id=\"kc-content-wrapper\">\n\n        <div class=\"systemmessage systemmessage--error\">\n            <h1 class=\"systemmessage__title\"></h1>\n            <div class=\"systemmessage__content\"><p>Invalid parameter: redirect_uri</p></div>\n        </div>\n\n\n\n                        </div>\n                    </div>\n                </div>\n            </div>\n\n            <div class=\"layout__right\">\n            </div>\n        </div>\n    </div>\n</body>\n</html>\n",
          "body_murmur": -1001983392,
          "body_sha256": "f8f1d42b83874e8390ea2a035cfed93f81de012c4ebf011061edd83da8421888",
          "content_length": 1852,
          "favicon": {
            "md5_hash": "a586e37636a42008eedc8c6c17c534ad",
            "murmur_hash": 261439797,
            "path": "https://edge.swoc.pisa.vn:443/auth/resources/nasof/login/custom/img/favicon.ico",
            "size": 4286
          },
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_language": [
              "en"
            ],
            "content_length": [
              "1852"
            ],
            "content_security_policy": [
              "default-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; font-src 'self' data:; frame-ancestors 'self';"
            ],
            "content_type": [
              "text/html;charset=utf-8"
            ],
            "set_cookie": [
              "KC_STATE_CHECKER=eyJhbGciOiJIUzUxMiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlYjc1NDJiNC0yYmJmLTRhZGMtYWNhYy0xMzliZjFlNzE1YTkifQ.eyJta3kiOiJpbnZhbGlkUGFyYW1ldGVyTWVzc2FnZSIsIm10eSI6IkVSUk9SIiwibXBhciI6WyJyZWRpcmVjdF91cmkiXSwic3RhdCI6NDAwLCJjbGlkIjoiYmJmYzhkMGEtNTA1OS00MjdhLWE2N2UtZDI5MTcwOWJlNDE1Iiwic3QyIjoiNzYxNGFmODctMmU4ZS00ZDgyLTgyZTctOGM0OTYxNjE4MzUxIn0.hJYdud4rqaK655TYKIyHenMqWfjdHGD3Ay-dwQ_MDwrMKC_OxNnB8ceiEAEfxXvR0llb5VVQHp9DvtiqURr6KQ;Version=1;Path=/auth/realms/customer/;Max-Age=300;Secure;HttpOnly"
            ],
            "strict_transport_security": [
              "max-age=63072000; includeSubDomains; preload"
            ],
            "unknown": [
              {
                "key": "x_robots_tag",
                "value": [
                  "none"
                ]
              },
              {
                "key": "referrer_policy",
                "value": [
                  "no-referrer"
                ]
              }
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "SAMEORIGIN"
            ],
            "x_xss_protection": [
              "0"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "body": "<html>\r\n<head><title>302 Found</title></head>\r\n<body>\r\n<center><h1>302 Found</h1></center>\r\n</body>\r\n</html>\r\n",
              "body_murmur": -9616316,
              "body_sha256": "075f0fd7eeb4bfec31816d61be72b064d4899853b224bd5f380041d7dd0b1d19",
              "content_length": 110,
              "headers": {
                "cache_control": [
                  "no-cache, no-store, max-age=0"
                ],
                "connection": [
                  "keep-alive"
                ],
                "content_length": [
                  "110"
                ],
                "content_type": [
                  "text/html"
                ],
                "date": [
                  "Sun, 20 Jul 2025 16:05:48 GMT"
                ],
                "location": [
                  "https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e"
                ],
                "set_cookie": [
                  "session=r588A5yOun6KRlrW_7OScA|1753031148|gWZiCYSR_hQwfSnb_EbI1ZQrV4FTnhd58qgALcoSwkLNNt-SKDve_3XihmlDarli69NZfXFBkrfR3WGosQwIseQUnF26ch0w3u6K-md4iBg49jnLHRuz5DKNIGbS4mlD4SfuNjYgmNVJOntKB6zGwOzwp2M55rHBM5JtS1sB4CMaUgMftF0-AT2wlxJxjbjD|oXhxR8yOPY1Tlb8VTorWT6urlfY; Path=/; SameSite=Lax; Secure; HttpOnly"
                ],
                "strict_transport_security": [
                  "max-age=63072000; includeSubDomains; preload"
                ],
                "unknown": [
                  {
                    "key": "referrer_policy",
                    "value": [
                      "strict-origin"
                    ]
                  }
                ],
                "x_content_type_options": [
                  "nosniff"
                ],
                "x_frame_options": [
                  "SAMEORIGIN"
                ],
                "x_xss_protection": [
                  "0"
                ]
              },
              "location": "https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e",
              "protocol": "HTTP/1.1",
              "status_code": 302,
              "status_line": "302 Moved Temporarily"
            }
          ],
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "referer": [
                "https://118.70.133.137"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "edge.swoc.pisa.vn",
              "path": "/auth/realms/customer/protocol/openid-connect/auth",
              "raw_query": "response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e",
              "scheme": "https"
            }
          },
          "status_code": 400,
          "title": "Login to IEM"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt"
                ],
                "ocsp_urls": [
                  "http://status.rapidssl.com"
                ]
              },
              "authority_key_id": "0cdb6c82490f4a670ab814ee7ac4485288eb5638",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "cps": [
                    "http://www.digicert.com/CPS"
                  ],
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:\n                F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A\n    Timestamp : Sep  6 08:24:38.209 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:22:E0:9F:42:F5:C3:83:D7:13:73:4C:16:\n                0E:1F:1A:01:7F:55:E4:25:BD:A8:84:F6:3D:6B:C7:53:\n                CD:EC:61:9D:02:20:08:2A:81:2F:26:58:1D:C1:90:EB:\n                C9:3C:99:B0:34:BD:DD:B5:66:D4:89:4E:62:8D:D5:BC:\n                43:F6:41:C9:DC:B6\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:\n                87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8\n    Timestamp : Sep  6 08:24:38.165 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:D1:7B:34:58:54:15:41:B8:D0:21:FB:\n                27:6C:4C:5D:F5:6E:8A:A8:3A:06:A9:3A:D0:BC:0F:C2:\n                14:12:10:4E:94:02:20:16:5C:AE:D0:40:AD:BB:3B:A9:\n                BE:9C:DA:A1:14:85:5D:EE:78:A1:FD:B3:DA:A1:29:3C:\n                1C:A6:F0:7A:83:24:E9\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:\n                D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50\n    Timestamp : Sep  6 08:24:38.179 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:C2:C4:E6:F0:B2:28:D4:34:C9:0D:1C:\n                45:FC:09:70:0D:4C:16:65:94:CD:B5:C8:B0:40:6E:5E:\n                80:DF:78:9F:A5:02:21:00:E4:CF:79:6D:42:E5:39:9A:\n                EE:E5:FF:E2:B0:F9:BE:2C:28:24:AC:78:A1:64:35:F2:\n                A5:02:F0:83:44:C5:5E:38",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "edge.swoc.pisa.vn",
                  "www.edge.swoc.pisa.vn"
                ]
              },
              "subject_key_id": "c360abfdf1653321860aaefe868fe5edeb52e139"
            },
            "fingerprint_md5": "9AE4FCAA592D45E46FC8BF61D8248F73",
            "fingerprint_sha1": "28DA73489AD76475E239E3FDAE265DBBD361FBC1",
            "fingerprint_sha256": "8679E5D737B0747332750998014CFE2C67FF1911BE3403518404D78D5977CDC1",
            "issuer": {
              "common_name": [
                "RapidSSL TLS RSA CA G1"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "DigiCert Inc"
              ],
              "organizational_unit": [
                "www.digicert.com"
              ]
            },
            "issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=RapidSSL TLS RSA CA G1",
            "jarm": "15d3fd16d29d29d00042d43d00000041ad16ead50175e1e575f5579aa6b5c8",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-07-27T20:09:15",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-07-27T04:57:01",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1562589652247475164359053793586285988",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "12f14e34bd53724c840619c38f3f7a13f8e7b56287889c6d300584ebe586263a",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3044022022e09f42f5c383d713734c160e1f1a017f55e425bda884f63d6bc753cdec619d0220082a812f26581dc190ebc93c99b034bdddb566d4894e628dd5bc43f641c9dcb6"
                },
                "timestamp": "2024-09-06T08:24:38.209000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "7d591e12e1782a7b1c61677c5efdf8d0875c14a04e959eb9032fd90e8c2e79b8",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100d17b3458541541b8d021fb276c4c5df56e8aa83a06a93ad0bc0fc21412104e940220165caed040adbb3ba9be9cdaa114855dee78a1fdb3daa1293c1ca6f07a8324e9"
                },
                "timestamp": "2024-09-06T08:24:38.165000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "e6d2316340778cc1104106d771b9cec1d240f6968486fbba87321dfd1e378e50",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c2c4e6f0b228d434c90d1c45fc09700d4c166594cdb5c8b0406e5e80df789fa5022100e4cf796d42e5399aeee5ffe2b0f9be2c2824ac78a16435f2a502f08344c55e38"
                },
                "timestamp": "2024-09-06T08:24:38.179000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "edge.swoc.pisa.vn"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "edge.swoc.pisa.vn",
                "www.edge.swoc.pisa.vn"
              ],
              "extended_dns_names": [
                {
                  "domain": "pisa",
                  "fld": "pisa.vn",
                  "subdomain": "edge.swoc",
                  "tld": "vn"
                },
                {
                  "domain": "pisa",
                  "fld": "pisa.vn",
                  "subdomain": "www.edge.swoc",
                  "tld": "vn"
                }
              ]
            },
            "subject_dn": "/CN=edge.swoc.pisa.vn",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "bbe8de7d9d3aaa58de1c8c7dcd8c4b99ccdc57a40cf0cf0c88fcf1db0338d9be",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "7349714aa7427728a2c62ca27021fd5d59232a20043c49676c9f0a3859d56905",
            "tbs_noct_fingerprint": "2e4efccd30b7eace4df0f83ea105095892cb7e0ed3c300df8e44c9a6d3c496a1",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2025-09-05T23:59:59",
              "not_before": "2024-09-06T00:00:00"
            },
            "version": 2
          },
          "fingerprint_sha256": "8679E5D737B0747332750998014CFE2C67FF1911BE3403518404D78D5977CDC1",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://118.70.133.137/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-20T22:36:33.245Z"
    }
  ],
  "services_hash": "e0510fe06f50a47c4cd3edccbfbf5c5f7d31986c88da5b12df701699d129a842",
  "last_updated_at": "2025-07-21T03:39:31.737Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "80/http"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    }
  }
}
21 Jul 2025, 03:39:31 UTC