177.67.81.100
{
"scan_id": 1752774106,
"ip": "177.67.81.100",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "177.67.81.96/28",
"postal_code": "02715",
"coordinates": {
"latitude": "-23.5475",
"longitude": "-46.6361"
},
"geo_point": "-23.5475, -46.6361",
"locale_code": "en",
"continent": "South America",
"country_code": "BR",
"country_name": "Brazil",
"city": "São Paulo"
},
"location_updated_at": "2025-07-18T11:34:06Z",
"asn": {
"number": "AS53013",
"organization": "W I X NET DO BRASIL LTDA - ME",
"country_code": "BR"
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "",
"organization": "",
"descr": "",
"_encoding": {
"raw": ""
}
},
"whois_updated_at": "0001-01-01T00:00:00Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-07-18T11:34:06Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-07-18T13:31:40Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-07-18T11:34:06Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "",
"product": "Pure-FTPd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:pureftpd:pure-ftpd",
"part": "a",
"vendor": "pureftpd",
"product": "pure\\-ftpd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\r\n220-You are user number 1 of 50 allowed.\r\n220-Local time is now 11:22. Server port: 21.\r\n220-This is a private system - No anonymous login\r\n220-IPv6 connections are also welcome on this server.\r\n220 You will be disconnected after 15 minutes of inactivity.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "aa18c330bbbd1b7248d3f245f057212947a07f3d",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "aa18c330bbbd1b7248d3f245f057212947a07f3d"
},
"fingerprint_md5": "7B60BAB854AFD271DF0894371413E0F8",
"fingerprint_sha1": "5906CE0A22EFC10EF6B6A6868843B2B9BEF3378A",
"fingerprint_sha256": "A9EAA20641B1FB326C9CE7E615DB2260E10AEB8E0C9595E7DAA87AE4B6E25A81",
"issuer": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "9227573772",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"subject_alt_name": {
"dns_names": [
"serv5-cpanel.qnax.io"
],
"extended_dns_names": [
{
"domain": "qnax",
"fld": "qnax.io",
"subdomain": "serv5-cpanel",
"tld": "io"
}
]
},
"subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "32d97c3bb492f1e316e5b6f1132c3d548fc1821364d9974f303cc2ad9d2bcd6d",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "4c829a394f8040772b6ceb5e2d41d0a183c75c935aca3b56e702461a01f9af16",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2025-04-02T01:53:45",
"not_before": "2024-04-02T01:53:45"
},
"version": 2
},
"fingerprint_sha256": "A9EAA20641B1FB326C9CE7E615DB2260E10AEB8E0C9595E7DAA87AE4B6E25A81",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-20T20:56:15.677Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><META HTTP-EQUIV=\"Cache-control\" CONTENT=\"no-cache\"><META HTTP-EQUIV=\"refresh\" CONTENT=\"0;URL=/cgi-sys/defaultwebpage.cgi\"></head><body></body></html>\n",
"body_murmur": -1507725539,
"body_sha256": "9278d16ed2fdcd5dc651615b0b8adc6b55fb667a9d106a9891b861d4561d9a24",
"component": [
"Apache HTTP Server"
],
"content_length": 163,
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache, no-store, must-revalidate"
],
"content_length": [
"163"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 19 Jul 2025 01:39:38 GMT"
],
"expires": [
"0"
],
"last_modified": [
"Thu, 12 Dec 2024 17:26:56 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "177.67.81.100",
"path": "",
"scheme": "http"
}
},
"status_code": 200
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "http://177.67.81.100/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-19T01:39:39.568Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Dovecot pop3d",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"pop3": {
"banner": "+OK Dovecot ready.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7"
},
"fingerprint_md5": "4D369243112299EEA823C0337161D741",
"fingerprint_sha1": "E99A591A6F5AD65F4067CA02B909E6D7A69CC42A",
"fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
"issuer": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "7809096918",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"subject_alt_name": {
"dns_names": [
"serv5-cpanel.qnax.io"
],
"extended_dns_names": [
{
"domain": "qnax",
"fld": "qnax.io",
"subdomain": "serv5-cpanel",
"tld": "io"
}
]
},
"subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "28fa94f76c5b12edc528893ccf42e00556fdae725e519d3654ffa3f117fdf2cd",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "c8071aa70518665db24892f38dd5d164750eaf7af6cf6f9e1148f4752686ec97",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2026-04-02T01:54:43",
"not_before": "2025-04-02T01:54:43"
},
"version": 2
},
"fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-19T16:52:50.367Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Dovecot imapd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"imap": {
"banner": "* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7"
},
"fingerprint_md5": "4D369243112299EEA823C0337161D741",
"fingerprint_sha1": "E99A591A6F5AD65F4067CA02B909E6D7A69CC42A",
"fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
"issuer": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "7809096918",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"subject_alt_name": {
"dns_names": [
"serv5-cpanel.qnax.io"
],
"extended_dns_names": [
{
"domain": "qnax",
"fld": "qnax.io",
"subdomain": "serv5-cpanel",
"tld": "io"
}
]
},
"subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "28fa94f76c5b12edc528893ccf42e00556fdae725e519d3654ffa3f117fdf2cd",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "c8071aa70518665db24892f38dd5d164750eaf7af6cf6f9e1148f4752686ec97",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2026-04-02T01:54:43",
"not_before": "2025-04-02T01:54:43"
},
"version": 2
},
"fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-18T03:37:46.145Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><META HTTP-EQUIV=\"Cache-control\" CONTENT=\"no-cache\"><META HTTP-EQUIV=\"refresh\" CONTENT=\"0;URL=/cgi-sys/defaultwebpage.cgi\"></head><body></body></html>\n",
"body_murmur": -1507725539,
"body_sha256": "9278d16ed2fdcd5dc651615b0b8adc6b55fb667a9d106a9891b861d4561d9a24",
"component": [
"Apache HTTP Server"
],
"content_length": 163,
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache, no-store, must-revalidate"
],
"content_length": [
"163"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 18 Jul 2025 12:07:58 GMT"
],
"expires": [
"0"
],
"last_modified": [
"Thu, 12 Dec 2024 17:26:56 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "177.67.81.100",
"path": "",
"scheme": "https"
}
},
"status_code": 200
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "3272ff0543d0f59bb21584a9d11078c00c845c14",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "3272ff0543d0f59bb21584a9d11078c00c845c14"
},
"fingerprint_md5": "766B84AEAC7AA4327F165DA237D7C688",
"fingerprint_sha1": "7E2CDBC5A35CF189CE60C925A2AEC2E4357ECA5A",
"fingerprint_sha256": "DB8F9A533CCF8FD5D15BEC1FE650CE3989010ECF2AA83CEF7C7141E9B0CAF879",
"issuer": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"jarm": "25d3fd00025d25d00025d3fd25d25dbabc3637e9ad820e5c83b58a633fe7bb",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5933641372",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"subject_alt_name": {
"dns_names": [
"serv5-cpanel.qnax.io"
],
"extended_dns_names": [
{
"domain": "qnax",
"fld": "qnax.io",
"subdomain": "serv5-cpanel",
"tld": "io"
}
]
},
"subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b0945f0987365f14a272f603c1342fa6a8dc789bef358658eaf191cbf83f7c9b",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "f4c12e3540f3801b23d552c1addb02662dcb81b863784dc7b0e145397c93ddfa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2026-04-02T01:54:32",
"not_before": "2025-04-02T01:54:32"
},
"version": 2
},
"fingerprint_sha256": "DB8F9A533CCF8FD5D15BEC1FE650CE3989010ECF2AA83CEF7C7141E9B0CAF879",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://177.67.81.100/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-18T12:08:03.118Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "4.92",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.92",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.92",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2019-13917",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2019-15846",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2019-16928",
"score": 9.8,
"severity": "critical"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-20T01:02:48.997Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "4.92",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.92",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.92",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220-serv5-cpanel.qnax.io ESMTP Exim 4.92 #2 Sun, 20 Jul 2025 16:48:32 -0300 \r\n220-We do not authorize the use of this system to transport unsolicited, \r\n220 and/or bulk e-mail.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "492c46cd64ca8a3fb7ed4a98cccbfca55b2bb875",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "492c46cd64ca8a3fb7ed4a98cccbfca55b2bb875"
},
"fingerprint_md5": "077546C3BB3C5D2D38D70A9BA2173904",
"fingerprint_sha1": "0C3F065FC44F44EE33B554D5560E0F3B6354ADBE",
"fingerprint_sha256": "B8B1579CEF089E66C098ED8A861926C771C58F7DE0EFC377D102361163586233",
"issuer": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"issuer_dn": "/CN=serv5-cpanel.qnax.io/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3687737743",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"serv5-cpanel.qnax.io"
],
"email_address": [
"[email protected]"
]
},
"subject_alt_name": {
"dns_names": [
"serv5-cpanel.qnax.io"
],
"extended_dns_names": [
{
"domain": "qnax",
"fld": "qnax.io",
"subdomain": "serv5-cpanel",
"tld": "io"
}
]
},
"subject_dn": "/CN=serv5-cpanel.qnax.io/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "48d50b1a4e7754a0eb1703a48ab752d7ff2670458d0048e8406ec547508cc0e2",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHhkZTNhZmQ2YjFlOTQwYWE3MGNiN2YzNWQ2ZTk3NmQ2YWFiYTQ1YzMwMjIzN2RhNjk0YjNmYzYwZWY4ZDBiM2IyN2VjMWM0MTRjNGRmZWU2MTJiYmJjYmU5NzRmZTRkMzAxODdhMWU5NmRiOWUxMzAxZmFiMWEyMzYzNDA1OWI5Yjc4ZTUyMDYxZWRhNDFjOTU5NzVhMDEwOTM5MjZhNjJjMGYyMzZjNTk4YzkxMTkxNTAxMGJhOTQ4NDk3ZTQ5N2YyMWYxY2NhNjc4MzE4ZGQwOWNlZjFhMjMzZDVjM2NlYjAyNGEzMzFhM2U3MTc5ZjlmNTA5Y2EzZWFhOTkwZTdhMGYyM2YwYzAxZDk4YmQ1ZmI2ZGZlOGE1ZTgxMjkwYTg4MmMwODJmZTFiYTUwZDRlN2RhNTM3MDZlZjU3M2ZlOWNjNzYyM2Y2ZGFlMmQzMjQ0MGNiYzk4M2U5ZTU1YzE1YzI1YzdiOGE1OWQ0Y2RlOWViMTAwOGQzN2IwZTk2YTkwMTdkNWUyMGQ2M2Y4ZGUzMmJjNTdiZDA3NTBjYjM0OWZlYWM5ODFhYmUyYjJmMWIzNzgzMDU3ZDE0NmJhMzM4MmJmZmQ5ZDI5OTk5ZTM4NjZhZTJlYzlhZjkxYjQ0MjM3YjA4NmI1ZDg4NTE0Njg2YmY4NTBmMWYwZWJlY2VkMw=="
}
},
"tbs_fingerprint": "e341438a7dedf1f871dd74bd097e698da46771083c04a37542480b7a2aa37db8",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2026-04-02T01:54:44",
"not_before": "2025-04-02T01:54:44"
},
"version": 2
},
"fingerprint_sha256": "B8B1579CEF089E66C098ED8A861926C771C58F7DE0EFC377D102361163586233",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2019-13917",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2019-15846",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2019-16928",
"score": 9.8,
"severity": "critical"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-21T01:54:22.848Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-20T02:53:09.083Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-17T22:20:17.139Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "",
"product": "MySQL",
"extra_info": "unauthorized",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-20T03:07:16.479Z"
}
],
"services_hash": "3bf2210e86d03ae5e605c9bb0041647608cb169ab11dcbe35799e71c290326d7",
"last_updated_at": "2025-07-21T01:54:22.848Z",
"banner": [
"ftp",
"tls",
"http",
"pop3",
"imap",
"smtp"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0070": {
"id": "CVE-1999-0070",
"references": [
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "test-cgi program allows an attacker to list files on the server.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-1999-1199": {
"id": "CVE-1999-1199",
"references": [
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 10,
"services": [
"80/http"
],
"severity": "high",
"summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2019-13917": {
"id": "CVE-2019-13917",
"references": [
"http://exim.org/static/doc/security/CVE-2019-13917.txt",
"http://www.openwall.com/lists/oss-security/2019/07/26/5",
"https://seclists.org/bugtraq/2019/Jul/51",
"https://security.gentoo.org/glsa/201909-06",
"https://www.debian.org/security/2019/dsa-4488",
"http://exim.org/static/doc/security/CVE-2019-13917.txt",
"http://www.openwall.com/lists/oss-security/2019/07/26/5",
"https://seclists.org/bugtraq/2019/Jul/51",
"https://security.gentoo.org/glsa/201909-06",
"https://www.debian.org/security/2019/dsa-4488"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-19"
},
"CVE-2019-15846": {
"id": "CVE-2019-15846",
"references": [
"http://exim.org/static/doc/security/CVE-2019-15846.txt",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
"http://www.openwall.com/lists/oss-security/2019/09/06/2",
"http://www.openwall.com/lists/oss-security/2019/09/06/4",
"http://www.openwall.com/lists/oss-security/2019/09/06/5",
"http://www.openwall.com/lists/oss-security/2019/09/06/6",
"http://www.openwall.com/lists/oss-security/2019/09/06/8",
"http://www.openwall.com/lists/oss-security/2019/09/07/1",
"http://www.openwall.com/lists/oss-security/2019/09/07/2",
"http://www.openwall.com/lists/oss-security/2019/09/08/1",
"http://www.openwall.com/lists/oss-security/2019/09/09/1",
"https://exim.org/static/doc/security/CVE-2019-15846.txt",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
"https://seclists.org/bugtraq/2019/Sep/13",
"https://security.gentoo.org/glsa/201909-06",
"https://usn.ubuntu.com/4124-1/",
"https://usn.ubuntu.com/4124-2/",
"https://www.debian.org/security/2019/dsa-4517",
"https://www.kb.cert.org/vuls/id/672565",
"https://www.openwall.com/lists/oss-security/2019/09/06/1",
"http://exim.org/static/doc/security/CVE-2019-15846.txt",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
"http://www.openwall.com/lists/oss-security/2019/09/06/2",
"http://www.openwall.com/lists/oss-security/2019/09/06/4",
"http://www.openwall.com/lists/oss-security/2019/09/06/5",
"http://www.openwall.com/lists/oss-security/2019/09/06/6",
"http://www.openwall.com/lists/oss-security/2019/09/06/8",
"http://www.openwall.com/lists/oss-security/2019/09/07/1",
"http://www.openwall.com/lists/oss-security/2019/09/07/2",
"http://www.openwall.com/lists/oss-security/2019/09/08/1",
"http://www.openwall.com/lists/oss-security/2019/09/09/1",
"https://exim.org/static/doc/security/CVE-2019-15846.txt",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
"https://seclists.org/bugtraq/2019/Sep/13",
"https://security.gentoo.org/glsa/201909-06",
"https://usn.ubuntu.com/4124-1/",
"https://usn.ubuntu.com/4124-2/",
"https://www.debian.org/security/2019/dsa-4517",
"https://www.kb.cert.org/vuls/id/672565",
"https://www.openwall.com/lists/oss-security/2019/09/06/1"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-16928": {
"id": "CVE-2019-16928",
"references": [
"http://www.openwall.com/lists/oss-security/2019/09/28/1",
"http://www.openwall.com/lists/oss-security/2019/09/28/2",
"http://www.openwall.com/lists/oss-security/2019/09/28/3",
"http://www.openwall.com/lists/oss-security/2019/09/28/4",
"https://bugs.exim.org/show_bug.cgi?id=2449",
"https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
"https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/",
"https://seclists.org/bugtraq/2019/Sep/60",
"https://security.gentoo.org/glsa/202003-47",
"https://usn.ubuntu.com/4141-1/",
"https://www.debian.org/security/2019/dsa-4536",
"http://www.openwall.com/lists/oss-security/2019/09/28/1",
"http://www.openwall.com/lists/oss-security/2019/09/28/2",
"http://www.openwall.com/lists/oss-security/2019/09/28/3",
"http://www.openwall.com/lists/oss-security/2019/09/28/4",
"https://bugs.exim.org/show_bug.cgi?id=2449",
"https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
"https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/",
"https://seclists.org/bugtraq/2019/Sep/60",
"https://security.gentoo.org/glsa/202003-47",
"https://usn.ubuntu.com/4141-1/",
"https://www.debian.org/security/2019/dsa-4536"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-12783": {
"id": "CVE-2020-12783",
"references": [
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"https://bugs.exim.org/show_bug.cgi?id=2571",
"https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
"https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
"https://usn.ubuntu.com/4366-1/",
"https://www.debian.org/security/2020/dsa-4687",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"https://bugs.exim.org/show_bug.cgi?id=2571",
"https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
"https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
"https://usn.ubuntu.com/4366-1/",
"https://www.debian.org/security/2020/dsa-4687"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-28007": {
"id": "CVE-2020-28007",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2020-28008": {
"id": "CVE-2020-28008",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-269"
},
"CVE-2020-28009": {
"id": "CVE-2020-28009",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-28010": {
"id": "CVE-2020-28010",
"references": [
"http://www.openwall.com/lists/oss-security/2021/07/22/7",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
"http://www.openwall.com/lists/oss-security/2021/07/22/7",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28011": {
"id": "CVE-2020-28011",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28012": {
"id": "CVE-2020-28012",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28013": {
"id": "CVE-2020-28013",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28014": {
"id": "CVE-2020-28014",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt"
],
"score": 6.1,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"weakness": "CWE-269"
},
"CVE-2020-28015": {
"id": "CVE-2020-28015",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28016": {
"id": "CVE-2020-28016",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28017": {
"id": "CVE-2020-28017",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-28018": {
"id": "CVE-2020-28018",
"references": [
"http://www.openwall.com/lists/oss-security/2021/05/11/14",
"http://www.openwall.com/lists/oss-security/2021/05/11/15",
"http://www.openwall.com/lists/oss-security/2021/05/11/17",
"http://www.openwall.com/lists/oss-security/2021/05/11/5",
"http://www.openwall.com/lists/oss-security/2021/05/11/6",
"http://www.openwall.com/lists/oss-security/2021/05/12/2",
"http://www.openwall.com/lists/oss-security/2021/05/12/3",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt",
"http://www.openwall.com/lists/oss-security/2021/05/11/14",
"http://www.openwall.com/lists/oss-security/2021/05/11/15",
"http://www.openwall.com/lists/oss-security/2021/05/11/17",
"http://www.openwall.com/lists/oss-security/2021/05/11/5",
"http://www.openwall.com/lists/oss-security/2021/05/11/6",
"http://www.openwall.com/lists/oss-security/2021/05/12/2",
"http://www.openwall.com/lists/oss-security/2021/05/12/3",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2020-28019": {
"id": "CVE-2020-28019",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-665"
},
"CVE-2020-28021": {
"id": "CVE-2020-28021",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt"
],
"score": 8.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28022": {
"id": "CVE-2020-28022",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28023": {
"id": "CVE-2020-28023",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-28024": {
"id": "CVE-2020-28024",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28025": {
"id": "CVE-2020-28025",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-28026": {
"id": "CVE-2020-28026",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-8015": {
"id": "CVE-2020-8015",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1154183",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1154183"
],
"score": 8.4,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2021-27216": {
"id": "CVE-2021-27216",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
],
"score": 6.3,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"weakness": "CWE-362"
},
"CVE-2021-38371": {
"id": "CVE-2021-38371",
"references": [
"https://nostarttls.secvuln.info",
"https://www.exim.org",
"https://www.exim.org/static/doc/security/CVE-2021-38371.txt",
"https://nostarttls.secvuln.info",
"https://www.exim.org",
"https://www.exim.org/static/doc/security/CVE-2021-38371.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-74"
},
"CVE-2022-37451": {
"id": "CVE-2022-37451",
"references": [
"https://cwe.mitre.org/data/definitions/762.html",
"https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
"https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_invalid_free",
"https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/1",
"https://cwe.mitre.org/data/definitions/762.html",
"https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
"https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_invalid_free",
"https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/1"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-763"
},
"CVE-2022-37452": {
"id": "CVE-2022-37452",
"references": [
"https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
"https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_overflow",
"https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/8",
"https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
"https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_overflow",
"https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/8"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2023-51766": {
"id": "CVE-2023-51766",
"references": [
"http://www.openwall.com/lists/oss-security/2023/12/24/1",
"http://www.openwall.com/lists/oss-security/2023/12/25/1",
"http://www.openwall.com/lists/oss-security/2023/12/29/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/1",
"http://www.openwall.com/lists/oss-security/2024/01/01/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/3",
"https://bugs.exim.org/show_bug.cgi?id=3063",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
"https://exim.org/static/doc/security/CVE-2023-51766.txt",
"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
"https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
"https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
"https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
"https://lwn.net/Articles/956533/",
"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
"https://www.openwall.com/lists/oss-security/2023/12/23/2",
"https://www.youtube.com/watch?v=V8KPV96g1To",
"http://www.openwall.com/lists/oss-security/2023/12/24/1",
"http://www.openwall.com/lists/oss-security/2023/12/25/1",
"http://www.openwall.com/lists/oss-security/2023/12/29/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/1",
"http://www.openwall.com/lists/oss-security/2024/01/01/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/3",
"https://bugs.exim.org/show_bug.cgi?id=3063",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
"https://exim.org/static/doc/security/CVE-2023-51766.txt",
"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
"https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
"https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
"https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
"https://lwn.net/Articles/956533/",
"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
"https://www.openwall.com/lists/oss-security/2023/12/23/2",
"https://www.youtube.com/watch?v=V8KPV96g1To"
],
"score": 5.3,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-345"
}
}
}