Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

177.73.177.49

SummaryCVE DetailsRaw Data
22 Jun 2025, 16:22:54 UTC
{
  "scan_id": 1750239192,
  "ip": "177.73.177.49",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "177.73.177.0/24",
    "postal_code": "75000",
    "coordinates": {
      "latitude": "-16.2886",
      "longitude": "-49.0164"
    },
    "geo_point": "-16.2886, -49.0164",
    "locale_code": "en",
    "continent": "South America",
    "country_code": "BR",
    "country_name": "Brazil",
    "city": "Anápolis"
  },
  "location_updated_at": "2025-06-20T16:41:32Z",
  "asn": {
    "number": "AS262572",
    "organization": "SOTHIS TECNOLOGIA E SERVICOS DE TELECOMUNICACOES L",
    "country_code": "BR"
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "",
    "organization": "",
    "descr": "",
    "_encoding": {
      "raw": ""
    }
  },
  "whois_updated_at": "0001-01-01T00:00:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-06-20T16:41:32Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-06-20T17:50:37Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-06-20T16:41:32Z"
    }
  ],
  "hostnames": [
    {
      "name": "177-73-177-49.sothis.com.br",
      "last_updated_at": "2025-06-22T17:27:01.361095052Z"
    }
  ],
  "services": [
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.56",
      "product": "Apache httpd",
      "extra_info": "(Debian)",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.56",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.56",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n  <head>\n    <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n    <title>Apache2 Debian Default Page: It works</title>\n    <style type=\"text/css\" media=\"screen\">\n  * {\n    margin: 0px 0px 0px 0px;\n    padding: 0px 0px 0px 0px;\n  }\n\n  body, html {\n    padding: 3px 3px 3px 3px;\n\n    background-color: #D8DBE2;\n\n    font-family: Verdana, sans-serif;\n    font-size: 11pt;\n    text-align: center;\n  }\n\n  div.main_page {\n    position: relative;\n    display: table;\n\n    width: 800px;\n\n    margin-bottom: 3px;\n    margin-left: auto;\n    margin-right: auto;\n    padding: 0px 0px 0px 0px;\n\n    border-width: 2px;\n    border-color: #212738;\n    border-style: solid;\n\n    background-color: #FFFFFF;\n\n    text-align: center;\n  }\n\n  div.page_header {\n    height: 99px;\n    width: 100%;\n\n    background-color: #F5F6F7;\n  }\n\n  div.page_header span {\n    margin: 15px 0px 0px 50px;\n\n    font-size: 180%;\n    font-weight: bold;\n  }\n\n  div.page_header img {\n    margin: 3px 0px 0px 40px;\n\n    border: 0px 0px 0px;\n  }\n\n  div.table_of_contents {\n    clear: left;\n\n    min-width: 200px;\n\n    margin: 3px 3px 3px 3px;\n\n    background-color: #FFFFFF;\n\n    text-align: left;\n  }\n\n  div.table_of_contents_item {\n    clear: left;\n\n    width: 100%;\n\n    margin: 4px 0px 0px 0px;\n\n    background-color: #FFFFFF;\n\n    color: #000000;\n    text-align: left;\n  }\n\n  div.table_of_contents_item a {\n    margin: 6px 0px 0px 6px;\n  }\n\n  div.content_section {\n    margin: 3px 3px 3px 3px;\n\n    background-color: #FFFFFF;\n\n    text-align: left;\n  }\n\n  div.content_section_text {\n    padding: 4px 8px 4px 8px;\n\n    color: #000000;\n    font-size: 100%;\n  }\n\n  div.content_section_text pre {\n    margin: 8px 0px 8px 0px;\n    padding: 8px 8px 8px 8px;\n\n    border-width: 1px;\n    border-style: dotted;\n    border-color: #000000;\n\n    background-color: #F5F6F7;\n\n    font-style: italic;\n  }\n\n  div.content_section_text p {\n    margin-bottom: 6px;\n  }\n\n  div.content_section_text ul, div.content_section_text li {\n    padding: 4px 8px 4px 16px;\n  }\n\n  div.section_header {\n    padding: 3px 6px 3px 6px;\n\n    background-color: #8E9CB2;\n\n    color: #FFFFFF;\n    font-weight: bold;\n    font-size: 112%;\n    text-align: center;\n  }\n\n  div.section_header_red {\n    background-color: #CD214F;\n  }\n\n  div.section_header_grey {\n    background-color: #9F9386;\n  }\n\n  .floating_element {\n    position: relative;\n    float: left;\n  }\n\n  div.table_of_contents_item a,\n  div.content_section_text a {\n    text-decoration: none;\n    font-weight: bold;\n  }\n\n  div.table_of_contents_item a:link,\n  div.table_of_contents_item a:visited,\n  div.table_of_contents_item a:active {\n    color: #000000;\n  }\n\n  div.table_of_contents_item a:hover {\n    background-color: #000000;\n\n    color: #FFFFFF;\n  }\n\n  div.content_section_text a:link,\n  div.content_section_text a:visited,\n   div.content_section_text a:active {\n    background-color: #DCDFE6;\n\n    color: #000000;\n  }\n\n  div.content_section_text a:hover {\n    background-color: #000000;\n\n    color: #DCDFE6;\n  }\n\n  div.validator {\n  }\n    </style>\n  </head>\n  <body>\n    <div class=\"main_page\">\n      <div class=\"page_header floating_element\">\n        <img src=\"/icons/openlogo-75.png\" alt=\"Debian Logo\" class=\"floating_element\"/>\n        <span class=\"floating_element\">\n          Apache2 Debian Default Page\n        </span>\n      </div>\n<!--      <div class=\"table_of_contents floating_element\">\n        <div class=\"section_header section_header_grey\">\n          TABLE OF CONTENTS\n        </div>\n        <div class=\"table_of_contents_item floating_element\">\n          <a href=\"#about\">About</a>\n        </div>\n        <div class=\"table_of_contents_item floating_element\">\n          <a href=\"#changes\">Changes</a>\n        </div>\n        <div class=\"table_of_contents_item floating_element\">\n          <a href=\"#scope\">Scope</a>\n        </div>\n        <div class=\"table_of_contents_item floating_element\">\n          <a href=\"#files\">Config files</a>\n        </div>\n      </div>\n-->\n      <div class=\"content_section floating_element\">\n\n\n        <div class=\"section_header section_header_red\">\n          <div id=\"about\"></div>\n          It works!\n        </div>\n        <div class=\"content_section_text\">\n          <p>\n                This is the default welcome page used to test the correct \n                operation of the Apache2 server after installation on Debian systems.\n                If you can read this page, it means that the Apache HTTP server installed at\n                this site is working properly. You should <b>replace this file</b> (located at\n                <tt>/var/www/html/index.html</tt>) before continuing to operate your HTTP server.\n          </p>\n\n\n          <p>\n                If you are a normal user of this web site and don't know what this page is\n                about, this probably means that the site is currently unavailable due to\n                maintenance.\n                If the problem persists, please contact the site's administrator.\n          </p>\n\n        </div>\n        <div class=\"section_header\">\n          <div id=\"changes\"></div>\n                Configuration Overview\n        </div>\n        <div class=\"content_section_text\">\n          <p>\n                Debian's Apache2 default configuration is different from the\n                upstream default configuration, and split into several files optimized for\n                interaction with Debian tools. The configuration system is\n                <b>fully documented in\n                /usr/share/doc/apache2/README.Debian.gz</b>. Refer to this for the full\n                documentation. Documentation for the web server itself can be\n                found by accessing the <a href=\"/manual\">manual</a> if the <tt>apache2-doc</tt>\n                package was installed on this server.\n\n          </p>\n          <p>\n                The configuration layout for an Apache2 web server installation on Debian systems is as follows:\n          </p>\n          <pre>\n/etc/apache2/\n|-- apache2.conf\n|       `--  ports.conf\n|-- mods-enabled\n|       |-- *.load\n|       `-- *.conf\n|-- conf-enabled\n|       `-- *.conf\n|-- sites-enabled\n|       `-- *.conf\n          </pre>\n          <ul>\n                        <li>\n                           <tt>apache2.conf</tt> is the main configuration\n                           file. It puts the pieces together by including all remaining configuration\n                           files when starting up the web server.\n                        </li>\n\n                        <li>\n                           <tt>ports.conf</tt> is always included from the\n                           main configuration file. It is used to determine the listening ports for\n                           incoming connections, and this file can be customized anytime.\n                        </li>\n\n                        <li>\n                           Configuration files in the <tt>mods-enabled/</tt>,\n                           <tt>conf-enabled/</tt> and <tt>sites-enabled/</tt> directories contain\n                           particular configuration snippets which manage modules, global configuration\n                           fragments, or virtual host configurations, respectively.\n                        </li>\n\n                        <li>\n                           They are activated by symlinking available\n                           configuration files from their respective\n                           *-available/ counterparts. These should be managed\n                           by using our helpers\n                           <tt>\n                                a2enmod,\n                                a2dismod,\n                           </tt>\n                           <tt>\n                                a2ensite,\n                                a2dissite,\n                            </tt>\n                                and\n                           <tt>\n                                a2enconf,\n                                a2disconf\n                           </tt>. See their respective man pages for detailed information.\n                        </li>\n\n                        <li>\n                           The binary is called apache2. Due to the use of\n                           environment variables, in the default configuration, apache2 needs to be\n                           started/stopped with <tt>/etc/init.d/apache2</tt> or <tt>apache2ctl</tt>.\n                           <b>Calling <tt>/usr/bin/apache2</tt> directly will not work</b> with the\n                           default configuration.\n                        </li>\n          </ul>\n        </div>\n\n        <div class=\"section_header\">\n            <div id=\"docroot\"></div>\n                Document Roots\n        </div>\n\n        <div class=\"content_section_text\">\n            <p>\n                By default, Debian does not allow access through the web browser to\n                <em>any</em> file apart of those located in <tt>/var/www</tt>,\n                <a href=\"http://httpd.apache.org/docs/2.4/mod/mod_userdir.html\" rel=\"nofollow\">public_html</a>\n                directories (when enabled) and <tt>/usr/share</tt> (for web\n                applications). If your site is using a web document root\n                located elsewhere (such as in <tt>/srv</tt>) you may need to whitelist your\n                document root directory in <tt>/etc/apache2/apache2.conf</tt>.\n            </p>\n            <p>\n                The default Debian document root is <tt>/var/www/html</tt>. You\n                can make your own virtual hosts under /var/www. This is different\n                to previous releases which provides better security out of the box.\n            </p>\n        </div>\n\n        <div class=\"section_header\">\n          <div id=\"bugs\"></div>\n                Reporting Problems\n        </div>\n        <div class=\"content_section_text\">\n          <p>\n                Please use the <tt>reportbug</tt> tool to report bugs in the\n                Apache2 package with Debian. However, check <a\n                href=\"http://bugs.debian.org/cgi-bin/pkgreport.cgi?ordering=normal;archive=0;src=apache2;repeatmerged=0\"\n                rel=\"nofollow\">existing bug reports</a> before reporting a new bug.\n          </p>\n          <p>\n                Please report bugs specific to modules (such as PHP and others)\n                to respective packages, not to the web server itself.\n          </p>\n        </div>\n\n\n\n\n      </div>\n    </div>\n    <div class=\"validator\">\n    </div>\n  </body>\n</html>\n\n",
          "body_murmur": -567627901,
          "body_sha256": "f14e8167f12be74330c1b881b5aa3df95f5bd66d26f42cc03b87a7c38946c571",
          "component": [
            "Debian",
            "Apache HTTP Server:2.4.56"
          ],
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sun, 22 Jun 2025 09:31:09 GMT"
            ],
            "etag": [
              "\"29cd-5d6804f744deb-gzip\""
            ],
            "last_modified": [
              "Wed, 26 Jan 2022 18:24:20 GMT"
            ],
            "server": [
              "Apache/2.4.56 (Debian)"
            ],
            "vary": [
              "Accept-Encoding"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "177.73.177.49",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "Apache2 Debian Default Page: It works"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://certificates.starfieldtech.com/repository/sfig2.crt"
                ],
                "ocsp_urls": [
                  "http://ocsp.starfieldtech.com/"
                ]
              },
              "authority_key_id": "254581685026383d3b2d2cbecd6ad9b63db36663",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "cps": [
                    "http://certificates.starfieldtech.com/repository/"
                  ],
                  "id": "2.16.840.1.114414.1.7.23.1"
                },
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://crl.starfieldtech.com/sfig2s1-784.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:\n                DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21\n    Timestamp : Dec  5 03:42:30.579 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:FD:11:95:00:8E:4E:07:4D:60:88:2C:\n                E3:CE:53:9E:07:0B:34:BC:55:56:67:A1:7F:58:C5:B3:\n                AA:78:48:A7:5D:02:20:0E:A0:32:26:7A:60:56:99:87:\n                62:5F:7F:E7:36:70:12:23:75:06:E4:7A:D4:47:F2:48:\n                77:85:6D:92:FE:EB:86\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n                4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n    Timestamp : Dec  5 03:42:30.719 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:DD:72:92:F5:99:E1:CF:7F:78:0A:BF:\n                1C:E3:2C:30:26:43:C1:95:03:89:13:9A:20:81:F9:4E:\n                62:0D:D2:76:75:02:20:27:CF:A0:AF:F3:FC:AE:4D:9B:\n                98:55:24:83:62:40:77:EA:56:39:77:B6:E9:06:DD:C0:\n                54:89:B4:8D:B2:03:A2\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:\n                F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7\n    Timestamp : Dec  5 03:42:30.823 2024 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:98:EA:88:A6:65:84:9D:7B:0E:1B:21:\n                3F:D5:59:54:D5:47:AA:6F:DE:75:8B:8B:DF:1C:02:E7:\n                86:02:B1:9F:21:02:20:2F:83:03:1F:B2:B2:AE:98:E6:\n                71:B6:13:57:AE:D2:81:91:47:05:81:9C:68:CF:24:5B:\n                38:39:C5:C1:3A:4F:9D",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "br-voip.jcdecaux.com.br",
                  "www.br-voip.jcdecaux.com.br"
                ]
              },
              "subject_key_id": "15d1b9a43bfc884f870bc05feef9bec7a64c9fa7"
            },
            "fingerprint_md5": "4998A341EE63ED37CC4DF77371A7E7C8",
            "fingerprint_sha1": "37CCC34FFF2D5CE156831BFA2E9091CE37903DD5",
            "fingerprint_sha256": "E57024CF4382F24795C613D28D206FC5E81AF48D61458F1906D249FB2C0D71AF",
            "issuer": {
              "common_name": [
                "Starfield Secure Certificate Authority - G2"
              ],
              "country": [
                "US"
              ],
              "locality": [
                "Scottsdale"
              ],
              "organization": [
                "Starfield Technologies, Inc."
              ],
              "organizational_unit": [
                "http://certs.starfieldtech.com/repository/"
              ],
              "province": [
                "Arizona"
              ]
            },
            "issuer_dn": "/C=US/ST=Arizona/L=Scottsdale/O=Starfield Technologies, Inc./OU=http:\\/\\/certs.starfieldtech.com\\/repository\\//CN=Starfield Secure Certificate Authority - G2",
            "jarm": "07d19d1ad21d21d07c42d43d0000009424803a662b126a748cf4f90707a33c",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-06-28T12:07:50",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-06-26T09:07:08",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "10911637650714334004",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100fd1195008e4e074d60882ce3ce539e070b34bc555667a17f58c5b3aa7848a75d02200ea032267a60569987625f7fe7367012237506e47ad447f24877856d92feeb86"
                },
                "timestamp": "2024-12-05T03:42:30.579000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100dd7292f599e1cf7f780abf1ce32c302643c1950389139a2081f94e620dd27675022027cfa0aff3fcae4d9b98552483624077ea563977b6e906ddc05489b48db203a2"
                },
                "timestamp": "2024-12-05T03:42:30.719000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "cb38f715897c84a1445f5bc1ddfbc96ef29a59cd470a690585b0cb14c31458e7",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502210098ea88a665849d7b0e1b213fd55954d547aa6fde758b8bdf1c02e78602b19f2102202f83031fb2b2ae98e671b61357aed281914705819c68cf245b3839c5c13a4f9d"
                },
                "timestamp": "2024-12-05T03:42:30.823000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "br-voip.jcdecaux.com.br"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "br-voip.jcdecaux.com.br",
                "www.br-voip.jcdecaux.com.br"
              ],
              "extended_dns_names": [
                {
                  "domain": "jcdecaux",
                  "fld": "jcdecaux.com.br",
                  "subdomain": "br-voip",
                  "tld": "com.br"
                },
                {
                  "domain": "jcdecaux",
                  "fld": "jcdecaux.com.br",
                  "subdomain": "www.br-voip",
                  "tld": "com.br"
                }
              ]
            },
            "subject_dn": "/CN=br-voip.jcdecaux.com.br",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "955e7a23ffe83f109b254570f582b368b56f91fc3f8b1cc77d94954000b68614",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "054a4ed5d0d598a3676ba55d85fab43eb4e5627a98fcb91b431db7a45bf5d53c",
            "tbs_noct_fingerprint": "9a3fce90740ad1f6ef54e1472f6b57c414c89fdf870a9893da29f35254e6a10e",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 34300800,
              "not_after": "2026-01-06T03:42:30",
              "not_before": "2024-12-05T03:42:30"
            },
            "version": 2
          },
          "fingerprint_sha256": "E57024CF4382F24795C613D28D206FC5E81AF48D61458F1906D249FB2C0D71AF",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2023-31122",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2023-43622",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2023-45802",
          "score": 5.9,
          "severity": "medium"
        }
      ],
      "url": "https://177.73.177.49/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-22T16:22:54.603Z"
    }
  ],
  "services_hash": "5cc0608b15f9790e2724cd17d912767f24441bfd173efc5149354b730d8ffa46",
  "last_updated_at": "2025-06-22T16:22:54.603Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2023-31122": {
      "id": "CVE-2023-31122",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2023-43622": {
      "id": "CVE-2023-43622",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known \"slow loris\" attack pattern.nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.nnThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.nn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2023-45802": {
      "id": "CVE-2023-45802",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 5.9,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2024-27316": {
      "id": "CVE-2024-27316",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Jul/18",
        "http://www.openwall.com/lists/oss-security/2024/04/04/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://support.apple.com/kb/HT214119",
        "https://www.openwall.com/lists/oss-security/2024/04/03/16"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2024-38474": {
      "id": "CVE-2024-38474",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-116"
    },
    "CVE-2024-38476": {
      "id": "CVE-2024-38476",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-829"
    },
    "CVE-2024-38477": {
      "id": "CVE-2024-38477",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/10",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2024-40898": {
      "id": "CVE-2024-40898",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2024/07/17/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240808-0006/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-918"
    }
  }
}