182.131.21.103
{
"scan_id": 1770705095,
"ip": "182.131.21.103",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.131.16.0/21",
"postal_code": "",
"coordinates": {
"latitude": "34.7732",
"longitude": "113.722"
},
"geo_point": "34.7732, 113.722",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": ""
},
"location_updated_at": "2026-02-11T00:18:24Z",
"asn": {
"number": "AS38283",
"organization": "CHINANET SiChuan Telecom Internet Data Center",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.128.0.0/12",
"organization": "CHINANET Sichuan province network",
"descr": "CHINANET Sichuan province network,\nData Communication Division,\nChina Telecom",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:03:50Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-02-11T00:18:24Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-02-11T00:31:15Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-02-11T00:18:24Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T14:43:50.963Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-02T00:42:35.964Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T00:49:57.44Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
"body_murmur": 1489525118,
"body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
"component": [
"Microsoft HTTPAPI:2.0"
],
"content_length": 315,
"headers": {
"content_length": [
"315"
],
"content_type": [
"text/html; charset=us-ascii"
],
"date": [
"Mon, 26 Jan 2026 03:13:36 GMT"
],
"server": [
"Microsoft-HTTPAPI/2.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.131.21.103",
"path": "",
"scheme": "http"
}
},
"status_code": 404,
"title": "Not Found"
}
},
"url": "http://182.131.21.103/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-03T23:52:12.701Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-20T22:29:03.223Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T12:01:55.186Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA"
],
"ocsp_urls": [
"http://ocsp.digicert.com"
]
},
"authority_key_id": "78df91905feedeacf6c575ebd54c5553ef244ab6",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"http://www.digicert.com/CPS"
],
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n Timestamp : Feb 6 02:48:24.748 2026 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:E0:D5:65:02:A1:37:91:E2:24:F0:B0:\n 3A:06:80:F7:B3:CA:97:D3:51:9E:03:9C:B8:19:6D:1E:\n F0:E2:09:1B:B7:02:21:00:93:57:09:E0:4D:B7:5B:B9:\n E3:DD:08:D7:E0:AC:9C:7D:B8:A0:5B:90:65:82:03:F7:\n 2F:CF:9D:31:39:E7:CC:AC\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 16:83:2D:AB:F0:A9:25:0F:0F:F0:3A:A5:45:FF:C8:BF:\n C8:23:D0:87:4B:F6:04:29:27:F8:E7:1F:33:13:F5:FA\n Timestamp : Feb 6 02:48:24.735 2026 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:FE:D3:36:0B:D5:58:76:27:8D:C3:CA:\n 13:D1:E4:71:B8:9A:F5:08:1F:A8:01:ED:68:1F:FF:3E:\n C6:A0:0B:F4:72:02:20:0E:88:FD:93:E6:88:5F:DC:9A:\n 85:DA:1F:20:D6:21:84:A8:00:F2:7A:E8:6D:73:59:FF:\n 4A:36:2F:F4:7E:16:F1\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n Timestamp : Feb 6 02:48:24.763 2026 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:7E:DF:A1:17:9B:3B:48:EF:13:65:32:3E:\n 7F:7C:D9:F3:BF:7C:88:80:22:35:5F:DD:E1:D1:B3:19:\n 48:8D:E3:A7:02:21:00:89:96:55:99:3E:01:39:22:4C:\n EB:3F:34:24:7E:2C:0D:83:B7:90:B8:D2:B2:04:15:2D:\n CD:FC:85:C2:36:78:47",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"auth.jzhy.com.cn"
]
},
"subject_key_id": "cd01f6f42f773c6c4de4a390248c03dfa22f94eb"
},
"fingerprint_md5": "B7B9B4AEF4933A00DFE9C13B40D61026",
"fingerprint_sha1": "71EEDCD5ECE30D8CE5074092492EEE0DF6B558CF",
"fingerprint_sha256": "AE8C9087121FEC0DB077F5DA42F0A8EBF8EAC71DA10CC1E695C2F27171A1A639",
"issuer": {
"common_name": [
"Encryption Everywhere DV TLS CA - G2"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Encryption Everywhere DV TLS CA - G2",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2026-02-15T15:22:44",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13998554122832282276708218275337705357",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100e0d56502a13791e224f0b03a0680f7b3ca97d3519e039cb8196d1ef0e2091bb7022100935709e04db75bb9e3dd08d7e0ac9c7db8a05b90658203f72fcf9d3139e7ccac"
},
"timestamp": "2026-02-06T02:48:24.748000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "16832dabf0a9250f0ff03aa545ffc8bfc823d0874bf6042927f8e71f3313f5fa",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100fed3360bd55876278dc3ca13d1e471b89af5081fa801ed681fff3ec6a00bf47202200e88fd93e6885fdc9a85da1f20d62184a800f27ae86d7359ff4a362ff47e16f1"
},
"timestamp": "2026-02-06T02:48:24.735000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502207edfa1179b3b48ef1365323e7f7cd9f3bf7c888022355fdde1d1b319488de3a7022100899655993e0139224ceb3f34247e2c0d83b790b8d2b204152dcdfc85c2367847"
},
"timestamp": "2026-02-06T02:48:24.763000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"auth.jzhy.com.cn"
]
},
"subject_alt_name": {
"dns_names": [
"auth.jzhy.com.cn"
],
"extended_dns_names": [
{
"domain": "jzhy",
"fld": "jzhy.com.cn",
"subdomain": "auth",
"tld": "com.cn"
}
]
},
"subject_dn": "/CN=auth.jzhy.com.cn",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "ce2e4397d3ec64152439ee04f94f716af902be6e08293d0b704ffa9412323f30",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHhiNWQxOGQzZTUzMTI1NDlhN2U0ODk2YTk4ZWRlMWY1YzM2ODUxMmEwYzQ3OWRiY2Q3NzVjYWNhNzE2N2VmNWU3NDMwMzgzZjE4M2Y4MDcyMzZjNDViOTVkOTAyZTJlZTNhZGE3ZDMxMDM1ZTMxZGNjYTgxNjI1NjVjMDdjZTkxNDFlNDcwNmRlNTU3MWU3MTQyY2U1YzcyYjhkMDhiZmQ1M2JhNjAzMGEzMjU1MjEyOWEwYjU4MTg2ZGIyNzk2N2U5M2RlMmFlMDAwNTJkNzljYzIzMzM0NTE3MjA4OWQ0ODdkYWUwYWEzYWQzOTIzYzcxYzc2ZTA3YzhiYmFiOWExYTYwYmZjODQ0ZjQ1MDlkMTcxZWRlNDYyYmQ0ZjZjMmE4NWUwNWY4YzJmYTYwNzExMDY1ZmU2ZGUyYjYzYjdjMTU5ZGVlNjRmMDMwYjcyOGE3NWUxODUwZjU4OTY4ZjZkZjdkMzM1MWFmZDQxOGJkMjYzODRjMzg0NDFiNDY5NDk5YWRiMTU3YjIzNDMxMjNhM2E1ODZlZWQyMWU3MmJhYmQxNmZlMjVjZmE1Njk3MTgxMjc2YzkxMTIzODI5ODljNjZlMDY2OTg2ODdhMWE4NjM3ODJlYjgyZTAyNDFkNzUzNmM5OTNiZWYxYmNiMWI3MWFmNTE0ZTFlZDk0NzJkZg=="
}
},
"tbs_fingerprint": "6d84dc11f7a7b9d8f6d8f8a46eb44c0f116fb46a71943bd87bf06b2a5ee96b40",
"tbs_noct_fingerprint": "238f77a552f52f19a9ebe25f0bbef1e8a0e666f9957a4da59305fe05c4d6ad6a",
"validation_level": "DV",
"validity": {
"length_seconds": 7689599,
"not_after": "2026-05-05T23:59:59",
"not_before": "2026-02-06T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "AE8C9087121FEC0DB077F5DA42F0A8EBF8EAC71DA10CC1E695C2F27171A1A639",
"precert": false,
"raw": "MIIF+TCCBOGgAwIBAgIQCogGATvlHkafZHl46QGXjTANBgkqhkiG9w0BAQsFADBuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMS0wKwYDVQQDEyRFbmNyeXB0aW9uIEV2ZXJ5d2hlcmUgRFYgVExTIENBIC0gRzIwHhcNMjYwMjA2MDAwMDAwWhcNMjYwNTA1MjM1OTU5WjAbMRkwFwYDVQQDExBhdXRoLmp6aHkuY29tLmNuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtdGNPlMSVJp+SJapjt4fXDaFEqDEedvNd1yspxZ+9edDA4Pxg/gHI2xFuV2QLi7jrafTEDXjHcyoFiVlwHzpFB5HBt5VcecULOXHK40Iv9U7pgMKMlUhKaC1gYbbJ5Z+k94q4ABS15zCMzRRcgidSH2uCqOtOSPHHHbgfIu6uaGmC/yET0UJ0XHt5GK9T2wqheBfjC+mBxEGX+beK2O3wVne5k8DC3KKdeGFD1iWj2330zUa/UGL0mOEw4RBtGlJmtsVeyNDEjo6WG7tIecrq9Fv4lz6VpcYEnbJESOCmJxm4GaYaHoahjeC64LgJB11NsmTvvG8sbca9RTh7ZRy3wIDAQABo4IC5DCCAuAwHwYDVR0jBBgwFoAUeN+RkF/u3qz2xXXr1UxVU+8kSrYwHQYDVR0OBBYEFM0B9vQvdzxsTeSjkCSMA9+iL5TrMBsGA1UdEQQUMBKCEGF1dGguanpoeS5jb20uY24wPgYDVR0gBDcwNTAzBgZngQwBAgEwKTAnBggrBgEFBQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgYAGCCsGAQUFBwEBBHQwcjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEoGCCsGAQUFBzAChj5odHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRW5jcnlwdGlvbkV2ZXJ5d2hlcmVEVlRMU0NBLUcyLmNydDAMBgNVHRMBAf8EAjAAMIIBfwYKKwYBBAHWeQIEAgSCAW8EggFrAWkAdwCWl2S/VViXrfdDh2g3CEJ36fA61fak8zZuRqQ/D8qpxgAAAZww2cesAAAEAwBIMEYCIQDg1WUCoTeR4iTwsDoGgPezypfTUZ4DnLgZbR7w4gkbtwIhAJNXCeBNt1u5490I1+CsnH24oFuQZYID9y/PnTE558ysAHYAFoMtq/CpJQ8P8DqlRf/Iv8gj0IdL9gQpJ/jnHzMT9foAAAGcMNnHnwAABAMARzBFAiEA/tM2C9VYdieNw8oT0eRxuJr1CB+oAe1oH/8+xqAL9HICIA6I/ZPmiF/cmoXaHyDWIYSoAPJ66G1zWf9KNi/0fhbxAHYAZBHEbKQS7KeJHKICLgC8q08oB9QeNSer6v7VA8l9zfAAAAGcMNnHuwAABAMARzBFAiB+36EXmztI7xNlMj5/fNnzv3yIgCI1X93h0bMZSI3jpwIhAImWVZk+ATkiTOs/NCR+LA2Dt5C40rIEFS3N/IXCNnhHMA0GCSqGSIb3DQEBCwUAA4IBAQAgB61BLFtZBU6d5XdFF8Y4TIYVv+N0umWgrO8qDXQtxqWVYucBowi1c2PhHXpixd95JtzSX0iJhwcUsQ76EK1eXz4kUaAvpe5DIc6WkpPzg9yaCt/rKEiB7eDg9UXToDKG8hw+pXs87HCb43Z3Fa2UcGnXuxd/uR/evgQEePI4bw2w/RtU+IUn7xBcZs1DWuz7Xw3ELVairg90w5Cqp1XoaRc54HuDpFPYSLliJKKuHqUC9qPSIUDdfqCLJqQifmVFNEzhbsVz+o3b62PtcWe64qPnuN9r/SScYc/vrWSFQX6LW2qgPVBm5fGQOfpPxrWYwiMM1rxga5ALpxH9RcM8",
"tags": [
"dv",
"trusted"
]
}
},
"url": "http://182.131.21.103:443/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T22:01:14.997Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-31T13:46:31.676Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-28T07:32:23.839Z"
},
{
"port": 631,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T19:18:22.958Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T22:11:23.02Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T09:16:03.106Z"
},
{
"port": 1234,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T20:25:34.76Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "12.00.6024",
"product": "Microsoft SQL Server 2014",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2014",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2014",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_ON",
"instance_name": "",
"version": "12.0.6024"
}
},
"cve": [
{
"id": "CVE-2015-1761",
"score": 6.5,
"severity": "medium"
},
{
"id": "CVE-2015-1762",
"score": 7.1,
"severity": "high"
},
{
"id": "CVE-2015-1763",
"score": 8.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T13:07:59.784Z"
},
{
"port": 1434,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-06T08:37:02.492Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-05T21:42:23.038Z"
},
{
"port": 1911,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T00:35:27.256Z"
},
{
"port": 2181,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-06T08:09:38.215Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T04:39:14.541Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "8.0.33",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:8.0.33",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "8\\.0\\.33",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "8.0.33"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
}
},
"fingerprint_md5": "4CF8A443756736ED31598508D70C67C7",
"fingerprint_sha1": "6760F49E8E920587E56E374F985E054BBB594976",
"fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
"issuer": {
"common_name": [
"MySQL_Server_8.0.33_Auto_Generated_CA_Certificate"
]
},
"issuer_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_CA_Certificate",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
]
},
"subject_alt_name": {
"dns_names": [
"MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
],
"extended_dns_names": []
},
"subject_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_Server_Certificate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "43110fcf3d1cf0e99d7f103e8612e665ef8de017107b770f2e1d9ded956fb942",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "ca1abaa28d5a7173892e527c183b6f924d0886a8f2565a4d2cf2b75c2d073dc6",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2033-09-03T06:30:29",
"not_before": "2023-09-06T06:30:29"
},
"version": 2
},
"fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T16:17:06.614Z"
},
{
"port": 4891,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T15:08:03.741Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T13:52:43.693Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T05:18:38.619Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T11:04:55.882Z"
},
{
"port": 5671,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T16:49:32.713Z"
},
{
"port": 5984,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T09:52:54.419Z"
},
{
"port": 6000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T19:17:41.35Z"
},
{
"port": 6379,
"protocol": "tcp",
"name": "redis",
"version": "3.2.100",
"product": "Redis key-value store",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:redislabs:redis:3.2.100",
"part": "a",
"vendor": "redislabs",
"product": "redis",
"version": "3\\.2\\.100",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"redis": {
"arch_bits": "64",
"build_id": "dd26f1f93c5130ee",
"gcc_version": "",
"git_sha1": "00000000",
"info_response": "# Server\r\nredis_version:3.2.100\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:dd26f1f93c5130ee\r\nredis_mode:standalone\r\nos:Windows \r\narch_bits:64\r\nmultiplexing_api:WinSock_IOCP\r\nprocess_id:2432\r\nrun_id:031f691e80dc1ee32eb2d7555ea08adb1a163166\r\ntcp_port:6379\r\nuptime_in_seconds:1993471\r\nuptime_in_days:23\r\nhz:10\r\nlru_clock:9106498\r\nexecutable:D:\\Program Files\\Redis\\\"D:\\Program Files\\Redis\\redis-server.exe\"\r\nconfig_file:D:\\Program Files\\Redis\\redis.windows-service.conf\r\n\r\n# Clients\r\nconnected_clients:44\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:4\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:2166408\r\nused_memory_human:2.07M\r\nused_memory_rss:2128496\r\nused_memory_rss_human:2.03M\r\nused_memory_peak:5920392\r\nused_memory_peak_human:5.65M\r\ntotal_system_memory:0\r\ntotal_system_memory_human:0B\r\nused_memory_lua:47104\r\nused_memory_lua_human:46.00K\r\nmaxmemory:0\r\nmaxmemory_human:0B\r\nmaxmemory_policy:noeviction\r\nmem_fragmentation_ratio:0.98\r\nmem_allocator:jemalloc-3.6.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:64\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1770714057\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:1\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\naof_last_write_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:61958\r\ntotal_commands_processed:3290986\r\ninstantaneous_ops_per_sec:2\r\ntotal_net_input_bytes:292535296\r\ntotal_net_output_bytes:2881209947\r\ninstantaneous_input_kbps:0.04\r\ninstantaneous_output_kbps:1.39\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:89349\r\nevicted_keys:0\r\nkeyspace_hits:524993\r\nkeyspace_misses:73677\r\npubsub_channels:1\r\npubsub_patterns:0\r\nlatest_fork_usec:593\r\nmigrate_cached_sockets:0\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:17.75\r\nused_cpu_user:24.69\r\nused_cpu_sys_children:0.00\r\nused_cpu_user_children:0.00\r\n\r\n# Cluster\r\ncluster_enabled:0\r\n\r\n# Keyspace\r\ndb0:keys=212,expires=204,avg_ttl=20712806\r\ndb10:keys=15,expires=5,avg_ttl=2590594432\r\n",
"major": 3,
"mem_allocator": "jemalloc-3.6.0",
"minor": 2,
"mode": "standalone",
"nonexistent_response": "(Error: ERR unknown command 'NONEXISTENT')",
"os": "Windows ",
"patchlevel": 100,
"ping_response": "PONG",
"quit_response": "OK",
"total_commands_processed": 3290986,
"total_connections_received": 61958,
"uptime_in_seconds": 1993471,
"used_memory": 2166408,
"version": "3.2.100"
}
},
"cve": [
{
"id": "CVE-2018-12326",
"score": 8.4,
"severity": "high"
},
{
"id": "CVE-2018-12453",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2020-14147",
"score": 7.7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T09:02:59.371Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T15:44:54.115Z"
},
{
"port": 7574,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T08:06:03.806Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T22:26:05.983Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T03:15:12.515Z"
},
{
"port": 8086,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-02T03:40:47.193Z"
},
{
"port": 8087,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T20:57:30.226Z"
},
{
"port": 8500,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T02:08:04.579Z"
},
{
"port": 8883,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T09:14:27.796Z"
},
{
"port": 8983,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-05T20:33:14.214Z"
},
{
"port": 9042,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-11T01:04:47.145Z"
},
{
"port": 9092,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T12:32:55.567Z"
},
{
"port": 9093,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T16:12:56.733Z"
},
{
"port": 9200,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T10:15:37.408Z"
},
{
"port": 10250,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T11:05:55.816Z"
},
{
"port": 11211,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T13:09:41.87Z"
},
{
"port": 11434,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T13:20:27.692Z"
},
{
"port": 15671,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T10:26:33.835Z"
},
{
"port": 15672,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T09:21:44.527Z"
},
{
"port": 18789,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T21:54:24.948Z"
},
{
"port": 20000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T16:13:19.241Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T05:53:18.332Z"
},
{
"port": 27018,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T06:48:11.982Z"
},
{
"port": 27019,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T01:46:30.814Z"
},
{
"port": 29092,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T10:21:41.175Z"
}
],
"services_hash": "a13bced1c47eccdf896b79bd34e2542829a90320d18e003b08a0e5f5a624c94c",
"last_updated_at": "2026-02-11T01:04:47.145Z",
"banner": [
"redis",
"tls",
"mssql",
"mysql",
"http"
],
"is_vuln": true,
"cveDetails": {
"CVE-2015-1761": {
"id": "CVE-2015-1761",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
],
"score": 6.5,
"services": [
"1433/ms-sql-s"
],
"severity": "medium",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "CWE-284"
},
"CVE-2015-1762": {
"id": "CVE-2015-1762",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 7.1,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"weakness": "CWE-74"
},
"CVE-2015-1763": {
"id": "CVE-2015-1763",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 8.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"weakness": "CWE-284"
},
"CVE-2018-12326": {
"id": "CVE-2018-12326",
"references": [
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/"
],
"score": 8.4,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2018-12453": {
"id": "CVE-2018-12453",
"references": [
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/",
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-704"
},
"CVE-2020-14147": {
"id": "CVE-2020-14147",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 7.7,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-32761": {
"id": "CVE-2021-32761",
"references": [
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001",
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-125"
},
"CVE-2021-3470": {
"id": "CVE-2021-3470",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
],
"score": 5.3,
"services": [
"6379/redis"
],
"severity": "medium",
"summary": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-119"
}
}
}