Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

177.67.81.100

SummaryCVE DetailsRaw Data
21 Jul 2025, 01:54:22 UTC
{
  "scan_id": 1752774106,
  "ip": "177.67.81.100",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "177.67.81.96/28",
    "postal_code": "02715",
    "coordinates": {
      "latitude": "-23.5475",
      "longitude": "-46.6361"
    },
    "geo_point": "-23.5475, -46.6361",
    "locale_code": "en",
    "continent": "South America",
    "country_code": "BR",
    "country_name": "Brazil",
    "city": "São Paulo"
  },
  "location_updated_at": "2025-07-18T11:34:06Z",
  "asn": {
    "number": "AS53013",
    "organization": "W I X NET DO BRASIL LTDA - ME",
    "country_code": "BR"
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "",
    "organization": "",
    "descr": "",
    "_encoding": {
      "raw": ""
    }
  },
  "whois_updated_at": "0001-01-01T00:00:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-07-18T11:34:06Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-07-18T13:31:40Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-07-18T11:34:06Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "ftp",
      "version": "",
      "product": "Pure-FTPd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:pureftpd:pure-ftpd",
          "part": "a",
          "vendor": "pureftpd",
          "product": "pure\\-ftpd",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ftp": {
          "banner": "220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\r\n220-You are user number 1 of 50 allowed.\r\n220-Local time is now 11:22. Server port: 21.\r\n220-This is a private system - No anonymous login\r\n220-IPv6 connections are also welcome on this server.\r\n220 You will be disconnected after 15 minutes of inactivity.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "aa18c330bbbd1b7248d3f245f057212947a07f3d",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "aa18c330bbbd1b7248d3f245f057212947a07f3d"
            },
            "fingerprint_md5": "7B60BAB854AFD271DF0894371413E0F8",
            "fingerprint_sha1": "5906CE0A22EFC10EF6B6A6868843B2B9BEF3378A",
            "fingerprint_sha256": "A9EAA20641B1FB326C9CE7E615DB2260E10AEB8E0C9595E7DAA87AE4B6E25A81",
            "issuer": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "9227573772",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "NDQ4ODZlODdjNmQ0YzVmZjgxZDEzZjBjMWNlMzQyMjI4ZDhlYmQ4NWJhYzljY2NmOTQxNzYwYTZkMzNhYzZiZjRiNDU2MTgwM2I3NWNiNGU5Y2Y3ZTZjMmUzYTAzOWEyOTNlNTE5N2E5YjFlOTI2YmIwY2RjYWM1ZTk4MmQzYWIxNTIxZjA0MGQ2MGY0YWZkZjJkMDNiZGRhODQ5NTM5YWJlODdjY2M2ZjZkNDIzZmUwZTZmMjNhMWQ3ZWQ2YzhhNjVlNWUzZjFmN2I4ZTE0YWYyNjViZjdiYWU2MDVkNjk0N2MzMDFmNzYxYTUyZTk3ZjA3OWI1OGU2OWJhZWZkMzFkNjJjZTg0YTg2NzExY2U0YTZlMGQwMjYyZDAwMGYwNzk4OTczNTE3MTI1Zjk4MjBhNjk1MjgyYzg1ODFhMDdkZmNlN2Q1M2Q3NTk1NTI0MzlmOWQ5NTdlODA4ZDk1Njk3YWVjOWRhZjFjNmM1OTNjMjBlZDZiZTNmNmI4ZTA5NzhhYTE5ZTVjN2Y5ZGQ1NjIwMmJiMmY2YzExMmJhM2ExMGJkMGEzOWE1OGRhYjlmYWFiMjFjODJlNTBiMjg4OTA2ZjU0ODI4OWE5NTBiYTM5Y2YwY2Q4YjI4MTM2NmFjMWIxMjU4ZDQyY2YzMmRiNWMxZDQwMmZlNmQ1NDU5NzM="
            },
            "subject": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "serv5-cpanel.qnax.io"
              ],
              "extended_dns_names": [
                {
                  "domain": "qnax",
                  "fld": "qnax.io",
                  "subdomain": "serv5-cpanel",
                  "tld": "io"
                }
              ]
            },
            "subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "32d97c3bb492f1e316e5b6f1132c3d548fc1821364d9974f303cc2ad9d2bcd6d",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "4c829a394f8040772b6ceb5e2d41d0a183c75c935aca3b56e702461a01f9af16",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2025-04-02T01:53:45",
              "not_before": "2024-04-02T01:53:45"
            },
            "version": 2
          },
          "fingerprint_sha256": "A9EAA20641B1FB326C9CE7E615DB2260E10AEB8E0C9595E7DAA87AE4B6E25A81",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-20T20:56:15.677Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache httpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<html><head><META HTTP-EQUIV=\"Cache-control\" CONTENT=\"no-cache\"><META HTTP-EQUIV=\"refresh\" CONTENT=\"0;URL=/cgi-sys/defaultwebpage.cgi\"></head><body></body></html>\n",
          "body_murmur": -1507725539,
          "body_sha256": "9278d16ed2fdcd5dc651615b0b8adc6b55fb667a9d106a9891b861d4561d9a24",
          "component": [
            "Apache HTTP Server"
          ],
          "content_length": 163,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "cache_control": [
              "no-cache, no-store, must-revalidate"
            ],
            "content_length": [
              "163"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 19 Jul 2025 01:39:38 GMT"
            ],
            "expires": [
              "0"
            ],
            "last_modified": [
              "Thu, 12 Dec 2024 17:26:56 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "Apache"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "177.67.81.100",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0070",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1199",
          "score": 10,
          "severity": "high"
        },
        {
          "id": "CVE-2023-25690",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "http://177.67.81.100/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-19T01:39:39.568Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Dovecot pop3d",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "pop3": {
          "banner": "+OK Dovecot ready.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7"
            },
            "fingerprint_md5": "4D369243112299EEA823C0337161D741",
            "fingerprint_sha1": "E99A591A6F5AD65F4067CA02B909E6D7A69CC42A",
            "fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
            "issuer": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "7809096918",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "MjkwN2NhZmU3MzhjMmU4NDgyNmU0MzI2NmVlNzM1NTJhYmM4ZmUwMmFiNWNmNTQ3NmU2Nzk5NDI2NWNhYzg0ZWJjZmJmYzM2MjcwOGM4YzM0MzEwYzk1NzMyNmE4YTI1ZTY0NDlmYTE5ZTNkZjViOWE5NWRmYmFjYzk0ZjE0MmY0YTMwNWExM2M0ZTA4YWM0YjBmYWY0OWYxNWMwMDM2NWRjMDgyYmE5MWZiOWUyZjQ1NWM1NzQxMDIxMjZjMGNkMzBiNmMyZGNkYzM3MDYyOTVhMmFkZTA1ODQyMDRhMmE5ZTlmMzQyZDI0YTIyNGI5ZWVkNjhhNTQxM2QyZWQ0NTA1ZDViMTg2NTlhOGQ4OTlmMDM0YzhlOGY4YzJlYmU0ZjBhMGFhODIwMGQ4NTFjMDE0ZWIyMDFjYWFiMDJkY2RhOGU4NGE0ZjczZTg5OGYwM2M2NDFmMmYyY2FhYTU2N2JmN2M4MGI2ZTRmM2QwZGE2YjI4MGQ4NDA4ZTdkMGRhNmMzOTJjOWVmYWU3ZWQwYjRjOTNkMTk4OTMyNGY5NjBkM2IyNzBlYjhjNjNhMzVmYzM2ZDA0ZGY1OTI5NDAwYjk5ODgwZDk2YTRhNDNhODVjMjhlY2VjZWE2ZjVmOTU3ODk3MmFhMDVmYzk3OTNlZjBhZDAwNjdhY2ViZGFjZDQ="
            },
            "subject": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "serv5-cpanel.qnax.io"
              ],
              "extended_dns_names": [
                {
                  "domain": "qnax",
                  "fld": "qnax.io",
                  "subdomain": "serv5-cpanel",
                  "tld": "io"
                }
              ]
            },
            "subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "28fa94f76c5b12edc528893ccf42e00556fdae725e519d3654ffa3f117fdf2cd",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "c8071aa70518665db24892f38dd5d164750eaf7af6cf6f9e1148f4752686ec97",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-04-02T01:54:43",
              "not_before": "2025-04-02T01:54:43"
            },
            "version": 2
          },
          "fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-19T16:52:50.367Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "imap",
      "version": "",
      "product": "Dovecot imapd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "imap": {
          "banner": "* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "a67069355b31614a5a7f03d3b3f99a9b641e8ef7"
            },
            "fingerprint_md5": "4D369243112299EEA823C0337161D741",
            "fingerprint_sha1": "E99A591A6F5AD65F4067CA02B909E6D7A69CC42A",
            "fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
            "issuer": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "7809096918",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "MjkwN2NhZmU3MzhjMmU4NDgyNmU0MzI2NmVlNzM1NTJhYmM4ZmUwMmFiNWNmNTQ3NmU2Nzk5NDI2NWNhYzg0ZWJjZmJmYzM2MjcwOGM4YzM0MzEwYzk1NzMyNmE4YTI1ZTY0NDlmYTE5ZTNkZjViOWE5NWRmYmFjYzk0ZjE0MmY0YTMwNWExM2M0ZTA4YWM0YjBmYWY0OWYxNWMwMDM2NWRjMDgyYmE5MWZiOWUyZjQ1NWM1NzQxMDIxMjZjMGNkMzBiNmMyZGNkYzM3MDYyOTVhMmFkZTA1ODQyMDRhMmE5ZTlmMzQyZDI0YTIyNGI5ZWVkNjhhNTQxM2QyZWQ0NTA1ZDViMTg2NTlhOGQ4OTlmMDM0YzhlOGY4YzJlYmU0ZjBhMGFhODIwMGQ4NTFjMDE0ZWIyMDFjYWFiMDJkY2RhOGU4NGE0ZjczZTg5OGYwM2M2NDFmMmYyY2FhYTU2N2JmN2M4MGI2ZTRmM2QwZGE2YjI4MGQ4NDA4ZTdkMGRhNmMzOTJjOWVmYWU3ZWQwYjRjOTNkMTk4OTMyNGY5NjBkM2IyNzBlYjhjNjNhMzVmYzM2ZDA0ZGY1OTI5NDAwYjk5ODgwZDk2YTRhNDNhODVjMjhlY2VjZWE2ZjVmOTU3ODk3MmFhMDVmYzk3OTNlZjBhZDAwNjdhY2ViZGFjZDQ="
            },
            "subject": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "serv5-cpanel.qnax.io"
              ],
              "extended_dns_names": [
                {
                  "domain": "qnax",
                  "fld": "qnax.io",
                  "subdomain": "serv5-cpanel",
                  "tld": "io"
                }
              ]
            },
            "subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "28fa94f76c5b12edc528893ccf42e00556fdae725e519d3654ffa3f117fdf2cd",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "MHhjYmY1NzMzODlmZjYxYTllNmE2ZjkxYWU2MGViZmZlNDg4MzIzODRlZGI4NTgzNWRiNDQ5YWIzNGFkZGUyNTQ5ZDc4MDYzOTUyYjcyZjdmNGQ1NGRiZThiODhkNjg4MDZkYTQyYjA2ZWFlZGFkOWYwMzY4ZmMxZjI2MGU0Yzg4NjU1MjlkYzJmOTU2NjJiNmFhYjI1ZDZlMzM2YTRiOTY1ZWI3NGQ4NDc3NDg1M2VhZjAyYmEzZGM3YTc4NWUyZjc2MDQwZmZkZjg4MzRjY2JkNzljNDA0MzIzNjI4ZGFlZTM1NTJlYWI0YzZlY2I5YzY2MjUxMzJkYTQ3N2FjMDJiYzFmMDgzYjk4MDY1NmEzZjMwYTQxYTMzMDM1YmJlMjNmNzEwMGEzMjNlMzE5Y2I5Y2RmNDMxNDA3MDBlNjcxMjJmYTFiZDIzOTg0ODg5MmFlNzc3MzY1NTFkMDFkMDczN2E0MDc4OGI4ZmI3YmFhYjFhYzAzMTI0NzMzYjM4NmYxY2ZmZDgyYTU5MTE3NzFkYjI2ZWExYWQ4MGM4MWYyMjYyNmNkNjZhYzI2MmM3N2E1MmIzNmU5NGM4NGRmNzA5ZjE3MmEyZWU0ZjJkY2E3YTZlMDg5MWQ3Y2NhYjFhYTcxNWZhNjczMzg1ZmEzMDQyNzMxZTE1ODIxMmYwNjBhNQ=="
              }
            },
            "tbs_fingerprint": "c8071aa70518665db24892f38dd5d164750eaf7af6cf6f9e1148f4752686ec97",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-04-02T01:54:43",
              "not_before": "2025-04-02T01:54:43"
            },
            "version": 2
          },
          "fingerprint_sha256": "472422E1DF9FF4C259BCBCD808DA0A21298DFB6FF1F1A0DB12BF46D2726B09C6",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-18T03:37:46.145Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache httpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<html><head><META HTTP-EQUIV=\"Cache-control\" CONTENT=\"no-cache\"><META HTTP-EQUIV=\"refresh\" CONTENT=\"0;URL=/cgi-sys/defaultwebpage.cgi\"></head><body></body></html>\n",
          "body_murmur": -1507725539,
          "body_sha256": "9278d16ed2fdcd5dc651615b0b8adc6b55fb667a9d106a9891b861d4561d9a24",
          "component": [
            "Apache HTTP Server"
          ],
          "content_length": 163,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "cache_control": [
              "no-cache, no-store, must-revalidate"
            ],
            "content_length": [
              "163"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 18 Jul 2025 12:07:58 GMT"
            ],
            "expires": [
              "0"
            ],
            "last_modified": [
              "Thu, 12 Dec 2024 17:26:56 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "Apache"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "177.67.81.100",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "3272ff0543d0f59bb21584a9d11078c00c845c14",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "3272ff0543d0f59bb21584a9d11078c00c845c14"
            },
            "fingerprint_md5": "766B84AEAC7AA4327F165DA237D7C688",
            "fingerprint_sha1": "7E2CDBC5A35CF189CE60C925A2AEC2E4357ECA5A",
            "fingerprint_sha256": "DB8F9A533CCF8FD5D15BEC1FE650CE3989010ECF2AA83CEF7C7141E9B0CAF879",
            "issuer": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "issuer_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "jarm": "25d3fd00025d25d00025d3fd25d25dbabc3637e9ad820e5c83b58a633fe7bb",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "5933641372",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "serv5-cpanel.qnax.io"
              ],
              "extended_dns_names": [
                {
                  "domain": "qnax",
                  "fld": "qnax.io",
                  "subdomain": "serv5-cpanel",
                  "tld": "io"
                }
              ]
            },
            "subject_dn": "/[email protected]/CN=serv5-cpanel.qnax.io",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "b0945f0987365f14a272f603c1342fa6a8dc789bef358658eaf191cbf83f7c9b",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "f4c12e3540f3801b23d552c1addb02662dcb81b863784dc7b0e145397c93ddfa",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-04-02T01:54:32",
              "not_before": "2025-04-02T01:54:32"
            },
            "version": 2
          },
          "fingerprint_sha256": "DB8F9A533CCF8FD5D15BEC1FE650CE3989010ECF2AA83CEF7C7141E9B0CAF879",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0070",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1199",
          "score": 10,
          "severity": "high"
        },
        {
          "id": "CVE-2023-25690",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "https://177.67.81.100/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-18T12:08:03.118Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.92",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.92",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.92",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "cve": [
        {
          "id": "CVE-2019-13917",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2019-15846",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2019-16928",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-20T01:02:48.997Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.92",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.92",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.92",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220-serv5-cpanel.qnax.io ESMTP Exim 4.92 #2 Sun, 20 Jul 2025 16:48:32 -0300 \r\n220-We do not authorize the use of this system to transport unsolicited, \r\n220 and/or bulk e-mail.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "492c46cd64ca8a3fb7ed4a98cccbfca55b2bb875",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "492c46cd64ca8a3fb7ed4a98cccbfca55b2bb875"
            },
            "fingerprint_md5": "077546C3BB3C5D2D38D70A9BA2173904",
            "fingerprint_sha1": "0C3F065FC44F44EE33B554D5560E0F3B6354ADBE",
            "fingerprint_sha256": "B8B1579CEF089E66C098ED8A861926C771C58F7DE0EFC377D102361163586233",
            "issuer": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "issuer_dn": "/CN=serv5-cpanel.qnax.io/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "3687737743",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "OTY3MjViOTczYWQ3NmE4NjMwODI0YjI3YjZkMmQzZTFiMzljNmVmZGFhNThkMTkxYzBlOTRmN2MwYjRiNDUyYjI4YjYyYTE4NjVmYzQ1NWM0NDZlNzNiMTBiMGEwOTA5MDI2ZjlmYmIyNTYxZTdlY2M0YTRhZTcyY2Q1NWQ2MzM4MTU1NzRiZWI0N2NiMWY5YjRhMGQ1YzljMzI0ODkxZDJjN2Q0M2Q0OTk1NzQzZDljNWFmZDZiMGIzYTg4MjhlZWQ4NjFmMDRjZjFiYTVkZWQ5OGJmZGY3MDQ5ZGE4MzRlNjJlOWZkNTgzZGYxZGEwY2JhMDhiODgwMDc1MjNiOWI0YTczMzg1NGVjOThiYzgxY2MzMTA2MGFmMWFjZjM2ZmE2MjQ4MWJjMTBmOWEyMTI2Yzg1ZDNjMWNjMzkzN2U5ZTY0NDIyNGMyMThiYjM2MjRkMWNiYzYzYzY1NDAwZWVkZmJjM2NiZjViMTY1ZjdjODI0ZWJhNjkyYTE5NWVlMWM3ZjY5NjU3MDE1MDU2YTVjMDQ5OGVjMzhkMmExZmE1ZmJiODNjOWI3N2NmNDVjN2YwNDUyY2YzZGZhOWVkNjdiMmYwYTRlNDEzZGZmMGZhY2I2NTg3NGM3ODFiZWY1ZGI3NmI2YzQ0MjMxNmNmMTEwYjI4MTQ1NDliMDEyZGE="
            },
            "subject": {
              "common_name": [
                "serv5-cpanel.qnax.io"
              ],
              "email_address": [
                "[email protected]"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "serv5-cpanel.qnax.io"
              ],
              "extended_dns_names": [
                {
                  "domain": "qnax",
                  "fld": "qnax.io",
                  "subdomain": "serv5-cpanel",
                  "tld": "io"
                }
              ]
            },
            "subject_dn": "/CN=serv5-cpanel.qnax.io/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "48d50b1a4e7754a0eb1703a48ab752d7ff2670458d0048e8406ec547508cc0e2",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "e341438a7dedf1f871dd74bd097e698da46771083c04a37542480b7a2aa37db8",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-04-02T01:54:44",
              "not_before": "2025-04-02T01:54:44"
            },
            "version": 2
          },
          "fingerprint_sha256": "B8B1579CEF089E66C098ED8A861926C771C58F7DE0EFC377D102361163586233",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2019-13917",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2019-15846",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2019-16928",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-21T01:54:22.848Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-20T02:53:09.083Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-17T22:20:17.139Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "",
      "product": "MySQL",
      "extra_info": "unauthorized",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-20T03:07:16.479Z"
    }
  ],
  "services_hash": "3bf2210e86d03ae5e605c9bb0041647608cb169ab11dcbe35799e71c290326d7",
  "last_updated_at": "2025-07-21T01:54:22.848Z",
  "banner": [
    "ftp",
    "tls",
    "http",
    "pop3",
    "imap",
    "smtp"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0070": {
      "id": "CVE-1999-0070",
      "references": [
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "test-cgi program allows an attacker to list files on the server.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-1999-1199": {
      "id": "CVE-1999-1199",
      "references": [
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 10,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2019-13917": {
      "id": "CVE-2019-13917",
      "references": [
        "http://exim.org/static/doc/security/CVE-2019-13917.txt",
        "http://www.openwall.com/lists/oss-security/2019/07/26/5",
        "https://seclists.org/bugtraq/2019/Jul/51",
        "https://security.gentoo.org/glsa/201909-06",
        "https://www.debian.org/security/2019/dsa-4488",
        "http://exim.org/static/doc/security/CVE-2019-13917.txt",
        "http://www.openwall.com/lists/oss-security/2019/07/26/5",
        "https://seclists.org/bugtraq/2019/Jul/51",
        "https://security.gentoo.org/glsa/201909-06",
        "https://www.debian.org/security/2019/dsa-4488"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-19"
    },
    "CVE-2019-15846": {
      "id": "CVE-2019-15846",
      "references": [
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1",
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-16928": {
      "id": "CVE-2019-16928",
      "references": [
        "http://www.openwall.com/lists/oss-security/2019/09/28/1",
        "http://www.openwall.com/lists/oss-security/2019/09/28/2",
        "http://www.openwall.com/lists/oss-security/2019/09/28/3",
        "http://www.openwall.com/lists/oss-security/2019/09/28/4",
        "https://bugs.exim.org/show_bug.cgi?id=2449",
        "https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
        "https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/",
        "https://seclists.org/bugtraq/2019/Sep/60",
        "https://security.gentoo.org/glsa/202003-47",
        "https://usn.ubuntu.com/4141-1/",
        "https://www.debian.org/security/2019/dsa-4536",
        "http://www.openwall.com/lists/oss-security/2019/09/28/1",
        "http://www.openwall.com/lists/oss-security/2019/09/28/2",
        "http://www.openwall.com/lists/oss-security/2019/09/28/3",
        "http://www.openwall.com/lists/oss-security/2019/09/28/4",
        "https://bugs.exim.org/show_bug.cgi?id=2449",
        "https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
        "https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/",
        "https://seclists.org/bugtraq/2019/Sep/60",
        "https://security.gentoo.org/glsa/202003-47",
        "https://usn.ubuntu.com/4141-1/",
        "https://www.debian.org/security/2019/dsa-4536"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-12783": {
      "id": "CVE-2020-12783",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28007": {
      "id": "CVE-2020-28007",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2020-28008": {
      "id": "CVE-2020-28008",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28009": {
      "id": "CVE-2020-28009",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28010": {
      "id": "CVE-2020-28010",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28011": {
      "id": "CVE-2020-28011",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28012": {
      "id": "CVE-2020-28012",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28013": {
      "id": "CVE-2020-28013",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28014": {
      "id": "CVE-2020-28014",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt"
      ],
      "score": 6.1,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28015": {
      "id": "CVE-2020-28015",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28016": {
      "id": "CVE-2020-28016",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28017": {
      "id": "CVE-2020-28017",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28018": {
      "id": "CVE-2020-28018",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/05/11/14",
        "http://www.openwall.com/lists/oss-security/2021/05/11/15",
        "http://www.openwall.com/lists/oss-security/2021/05/11/17",
        "http://www.openwall.com/lists/oss-security/2021/05/11/5",
        "http://www.openwall.com/lists/oss-security/2021/05/11/6",
        "http://www.openwall.com/lists/oss-security/2021/05/12/2",
        "http://www.openwall.com/lists/oss-security/2021/05/12/3",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt",
        "http://www.openwall.com/lists/oss-security/2021/05/11/14",
        "http://www.openwall.com/lists/oss-security/2021/05/11/15",
        "http://www.openwall.com/lists/oss-security/2021/05/11/17",
        "http://www.openwall.com/lists/oss-security/2021/05/11/5",
        "http://www.openwall.com/lists/oss-security/2021/05/11/6",
        "http://www.openwall.com/lists/oss-security/2021/05/12/2",
        "http://www.openwall.com/lists/oss-security/2021/05/12/3",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2020-28019": {
      "id": "CVE-2020-28019",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-665"
    },
    "CVE-2020-28021": {
      "id": "CVE-2020-28021",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt"
      ],
      "score": 8.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28022": {
      "id": "CVE-2020-28022",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28023": {
      "id": "CVE-2020-28023",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28024": {
      "id": "CVE-2020-28024",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28025": {
      "id": "CVE-2020-28025",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28026": {
      "id": "CVE-2020-28026",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-8015": {
      "id": "CVE-2020-8015",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183",
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183"
      ],
      "score": 8.4,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2021-27216": {
      "id": "CVE-2021-27216",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 6.3,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-362"
    },
    "CVE-2021-38371": {
      "id": "CVE-2021-38371",
      "references": [
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt",
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2022-37451": {
      "id": "CVE-2022-37451",
      "references": [
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1",
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-763"
    },
    "CVE-2022-37452": {
      "id": "CVE-2022-37452",
      "references": [
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8",
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-27522": {
      "id": "CVE-2023-27522",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2023-51766": {
      "id": "CVE-2023-51766",
      "references": [
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To",
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To"
      ],
      "score": 5.3,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-345"
    }
  }
}