Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.131.21.103

SummaryCVE DetailsRaw Data
25 Dec 2025, 13:59:28 UTC
{
  "scan_id": 1766556008,
  "ip": "182.131.21.103",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.131.16.0/21",
    "postal_code": "",
    "coordinates": {
      "latitude": "34.7732",
      "longitude": "113.722"
    },
    "geo_point": "34.7732, 113.722",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "CN",
    "country_name": "China",
    "city": ""
  },
  "location_updated_at": "2025-12-23T00:44:24Z",
  "asn": {
    "number": "AS38283",
    "organization": "CHINANET SiChuan Telecom Internet Data Center",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.128.0.0/12",
    "organization": "CHINANET Sichuan province network",
    "descr": "CHINANET Sichuan province network,\nData Communication Division,\nChina Telecom",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:50Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-12-23T00:44:24Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-12-23T07:28:01Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-12-23T00:44:24Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T17:09:01.304Z"
    },
    {
      "port": 22,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T23:19:44.522Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T08:53:29.748Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "2.0",
      "product": "Microsoft HTTPAPI httpd",
      "extra_info": "SSDP/UPnP",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
          "body_murmur": 1489525118,
          "body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
          "component": [
            "Microsoft HTTPAPI:2.0"
          ],
          "content_length": 315,
          "headers": {
            "content_length": [
              "315"
            ],
            "content_type": [
              "text/html; charset=us-ascii"
            ],
            "date": [
              "Wed, 24 Dec 2025 23:34:47 GMT"
            ],
            "server": [
              "Microsoft-HTTPAPI/2.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.131.21.103",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 404,
          "title": "Not Found"
        }
      },
      "url": "http://182.131.21.103/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T23:34:49.111Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T07:19:27.995Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-20T12:11:14.372Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.0",
      "product": "Microsoft HTTPAPI httpd",
      "extra_info": "SSDP/UPnP",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA"
                ],
                "ocsp_urls": [
                  "http://ocsp.digicert.com"
                ]
              },
              "authority_key_id": "78df91905feedeacf6c575ebd54c5553ef244ab6",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "cps": [
                    "http://www.digicert.com/CPS"
                  ],
                  "id": "2.23.140.1.2.1"
                }
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n                E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n    Timestamp : Nov  6 03:18:22.267 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:7E:9F:9F:8D:7C:AE:34:99:20:3D:C5:B2:\n                69:70:F4:46:F4:17:8A:8C:0B:87:67:60:E3:D8:AA:4C:\n                1A:C8:DE:92:02:21:00:FA:04:E0:58:0B:5B:E7:1B:26:\n                E0:DF:34:CF:93:D6:9F:F3:13:2C:4D:2B:91:CE:CA:42:\n                41:83:BF:A2:AA:89:2B\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n                4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n    Timestamp : Nov  6 03:18:22.260 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:3E:DF:59:16:2D:0E:3D:FC:7F:95:D6:1C:\n                35:7D:1A:DE:0D:C1:23:0A:9E:47:EE:55:FC:25:D4:04:\n                F4:25:59:62:02:21:00:91:98:15:ED:F4:CE:D2:99:1F:\n                1E:ED:9A:9E:47:F6:12:B8:5A:F7:D3:CD:AA:83:F9:24:\n                96:97:5D:C3:90:F0:4F\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:\n                5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3\n    Timestamp : Nov  6 03:18:22.278 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:28:56:65:08:37:79:53:16:8E:AF:26:6D:\n                BD:10:52:15:2C:5F:FD:F6:0A:EE:3B:94:8C:36:3A:A4:\n                0B:6B:30:3F:02:20:36:7C:D7:35:1B:35:6A:FF:5F:5E:\n                08:A9:65:BD:F5:EF:BE:94:AD:46:DA:9B:D7:61:0D:19:\n                6A:49:7D:85:5E:24",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "auth.jzhy.com.cn"
                ]
              },
              "subject_key_id": "b3749f8f4ef98369affb8f802eaf3ed709bf6648"
            },
            "fingerprint_md5": "7BD762B574A5156026AE74D12C2C9926",
            "fingerprint_sha1": "3A1CAD55DBDC4EB0325DC85920D78124CA862311",
            "fingerprint_sha256": "11A9E9C16994D53B0A763D77A858709A97CC0449E6EE37DC3F75FCC119158070",
            "issuer": {
              "common_name": [
                "Encryption Everywhere DV TLS CA - G2"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "DigiCert Inc"
              ],
              "organizational_unit": [
                "www.digicert.com"
              ]
            },
            "issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Encryption Everywhere DV TLS CA - G2",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "next_update": "2025-12-27T09:09:00",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "10001795749153806261943129322400133956",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502207e9f9f8d7cae3499203dc5b26970f446f4178a8c0b876760e3d8aa4c1ac8de92022100fa04e0580b5be71b26e0df34cf93d69ff3132c4d2b91ceca424183bfa2aa892b"
                },
                "timestamp": "2025-11-06T03:18:22.267000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502203edf59162d0e3dfc7f95d61c357d1ade0dc1230a9e47ee55fc25d404f4255962022100919815edf4ced2991f1eed9a9e47f612b85af7d3cdaa83f92496975dc390f04f"
                },
                "timestamp": "2025-11-06T03:18:22.260000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "499c9b69de1d7cecfc36decd8764a6b85baf0a878019d15552fbe9eb29ddf8c3",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3044022028566508377953168eaf266dbd1052152c5ffdf60aee3b948c363aa40b6b303f0220367cd7351b356aff5f5e08a965bdf5efbe94ad46da9bd7610d196a497d855e24"
                },
                "timestamp": "2025-11-06T03:18:22.278000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "auth.jzhy.com.cn"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "auth.jzhy.com.cn"
              ],
              "extended_dns_names": [
                {
                  "domain": "jzhy",
                  "fld": "jzhy.com.cn",
                  "subdomain": "auth",
                  "tld": "com.cn"
                }
              ]
            },
            "subject_dn": "/CN=auth.jzhy.com.cn",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "b0ca7ae562197c0370024a276683e35b4db0cffd34706be45c192fa0e610fbd3",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "MHhjODQxZTBhNzg1YjJjM2JkMTM0OTY0ODFjYzNkYzEwMWQ4M2UwNjQ1OTUzZGJjOTE5ZTE3YjI5NjE5ZTZhODAyZGMwYzYwODA4OWY1ZjEwNjI1YzA1MDUzZDZiNWI0MDFjNjc1MjRlMWExNTdiMzQwOGZmMGQ5NDQ5MWRiZmU3ZTE3NGY3N2ViNDEwYzJkNWY5MjQ4ODIzNDI0MGY1ZWMyODI3YjBiMDdmNmQ3ZjBiODFhMTNjMWM5NGJmMzlmYTRiYmVhZTFkODExZTBjOThiYTY0Yjk0OGYxYzNiYzNkZWVjZjA4NDBmNjEzZDM3ZTZiMWJhMTk0ZmRlZWYxNTMwNDlmMGJmM2RiZTU1NzllZTQ3OWNmMDNjOWUyYjc0M2Q2NzgyODhmYzBmY2FiOWVkZjExMTBlYzI4ZGI2YmI1N2E3NjM3NzE4MWJkM2Y5MjI2ZmUyZWFhMDE3MTVjMjNmOWVmNGVhYTcyYjVlMzkzNGNjYjUyOGFjNWJkMDFkOTZmNmUzNzVkYTVhMDA5ZmFmMDJjNDY2MTYzNDc0ZDI2OWMzYTA1YWM5MjI3NmNmYWUxOWNlMzQzNTJiOTc1YThmODZkZGI5MDZlNWU5ZDJkMjZlOGVjNzUyZDBhYWEyOWY5MGJjZGViMmU1ODVkZWQyMDkxYzY0NGNlNzU5OWY5Yg=="
              }
            },
            "tbs_fingerprint": "8799a0012ad0b04cab172ee91bf3baf6097a06f5f139c171c5de63213d9bf466",
            "tbs_noct_fingerprint": "45be2f5b674cfb8a6a8158a4d66913d82455f8670618fe488591a007fd781590",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7948799,
              "not_after": "2026-02-05T23:59:59",
              "not_before": "2025-11-06T00:00:00"
            },
            "version": 2
          },
          "fingerprint_sha256": "11A9E9C16994D53B0A763D77A858709A97CC0449E6EE37DC3F75FCC119158070",
          "precert": false,
          "raw": "MIIF9zCCBN+gAwIBAgIQB4ZGmmBPUFTGniGahJ4zRDANBgkqhkiG9w0BAQsFADBuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMS0wKwYDVQQDEyRFbmNyeXB0aW9uIEV2ZXJ5d2hlcmUgRFYgVExTIENBIC0gRzIwHhcNMjUxMTA2MDAwMDAwWhcNMjYwMjA1MjM1OTU5WjAbMRkwFwYDVQQDExBhdXRoLmp6aHkuY29tLmNuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyEHgp4Wyw70TSWSBzD3BAdg+BkWVPbyRnheylhnmqALcDGCAifXxBiXAUFPWtbQBxnUk4aFXs0CP8NlEkdv+fhdPd+tBDC1fkkiCNCQPXsKCewsH9tfwuBoTwclL85+ku+rh2BHgyYumS5SPHDvD3uzwhA9hPTfmsboZT97vFTBJ8L89vlV57kec8DyeK3Q9Z4KI/A/Kue3xEQ7Cjba7V6djdxgb0/kib+LqoBcVwj+e9OqnK145NMy1KKxb0B2W9uN12loAn68CxGYWNHTSacOgWskids+uGc40NSuXWo+G3bkG5enS0m6Ox1LQqqKfkLzesuWF3tIJHGRM51mfmwIDAQABo4IC4jCCAt4wHwYDVR0jBBgwFoAUeN+RkF/u3qz2xXXr1UxVU+8kSrYwHQYDVR0OBBYEFLN0n49O+YNpr/uPgC6vPtcJv2ZIMBsGA1UdEQQUMBKCEGF1dGguanpoeS5jb20uY24wPgYDVR0gBDcwNTAzBgZngQwBAgEwKTAnBggrBgEFBQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgYAGCCsGAQUFBwEBBHQwcjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEoGCCsGAQUFBzAChj5odHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRW5jcnlwdGlvbkV2ZXJ5d2hlcmVEVlRMU0NBLUcyLmNydDAMBgNVHRMBAf8EAjAAMIIBfQYKKwYBBAHWeQIEAgSCAW0EggFpAWcAdgCWl2S/VViXrfdDh2g3CEJ36fA61fak8zZuRqQ/D8qpxgAAAZpXLCU7AAAEAwBHMEUCIH6fn418rjSZID3Fsmlw9Eb0F4qMC4dnYOPYqkwayN6SAiEA+gTgWAtb5xsm4N80z5PWn/MTLE0rkc7KQkGDv6KqiSsAdgBkEcRspBLsp4kcogIuALyrTygH1B41J6vq/tUDyX3N8AAAAZpXLCU0AAAEAwBHMEUCID7fWRYtDj38f5XWHDV9Gt4NwSMKnkfuVfwl1AT0JVliAiEAkZgV7fTO0pkfHu2ankf2Erha99PNqoP5JJaXXcOQ8E8AdQBJnJtp3h187Pw23s2HZKa4W68Kh4AZ0VVS++nrKd34wwAAAZpXLCVGAAAEAwBGMEQCIChWZQg3eVMWjq8mbb0QUhUsX/32Cu47lIw2OqQLazA/AiA2fNc1GzVq/19eCKllvfXvvpStRtqb12ENGWpJfYVeJDANBgkqhkiG9w0BAQsFAAOCAQEARzIub9c/0UovOeuGbC1LRq90pJWoybeNdfk2+gVVmxQvOxu3BKo0kGv8+LcGkxhUIZEhfMV87LmOFGTEdhWYhutNgfaipMoPUzcBZvWJtTFu1QUmV7wrArCRIxABX6wUhx/ZMJDsiE6bWCQ7Uz1ZRiTtnkup+p3M/h5zx3Yp9spTHVhdpKsRfIyV+4DDs44wSSor52r4K7+sCoXRGRVxMAAXpnDb+B4TQVs1wPp52n+06b7LWT1YjDLXh6fFXoiDujxBXBD3d0ugwRrwJveLXAyv/pwEaDf5H76VAnsA6Sc9Ry5Yai/dYBOdVBIvyvfkzgZ866tcVpAianymCHSFbw==",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "http://182.131.21.103:443/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-21T01:07:36.98Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T19:29:15.951Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T20:21:01.969Z"
    },
    {
      "port": 631,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-20T20:28:44.053Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T00:00:50.763Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-20T06:36:57.933Z"
    },
    {
      "port": 1234,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T21:58:06.577Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "ms-sql-s",
      "version": "12.00.6024",
      "product": "Microsoft SQL Server 2014",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:sql_server:2014",
          "part": "a",
          "vendor": "microsoft",
          "product": "sql_server",
          "version": "2014",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_ON",
          "instance_name": "",
          "version": "12.0.6024"
        }
      },
      "cve": [
        {
          "id": "CVE-2015-1761",
          "score": 6.5,
          "severity": "medium"
        },
        {
          "id": "CVE-2015-1762",
          "score": 7.1,
          "severity": "high"
        },
        {
          "id": "CVE-2015-1763",
          "score": 8.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T20:00:48.842Z"
    },
    {
      "port": 1434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T19:51:03.815Z"
    },
    {
      "port": 1883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T11:36:42.682Z"
    },
    {
      "port": 1911,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T05:00:26.465Z"
    },
    {
      "port": 2181,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T19:54:49.07Z"
    },
    {
      "port": 2525,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T09:22:51.621Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "8.0.33",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:8.0.33",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "8\\.0\\.33",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_SSL": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "8.0.33"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              }
            },
            "fingerprint_md5": "4CF8A443756736ED31598508D70C67C7",
            "fingerprint_sha1": "6760F49E8E920587E56E374F985E054BBB594976",
            "fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
            "issuer": {
              "common_name": [
                "MySQL_Server_8.0.33_Auto_Generated_CA_Certificate"
              ]
            },
            "issuer_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_CA_Certificate",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_Server_Certificate",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "43110fcf3d1cf0e99d7f103e8612e665ef8de017107b770f2e1d9ded956fb942",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "ca1abaa28d5a7173892e527c183b6f924d0886a8f2565a4d2cf2b75c2d073dc6",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2033-09-03T06:30:29",
              "not_before": "2023-09-06T06:30:29"
            },
            "version": 2
          },
          "fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T13:36:33.568Z"
    },
    {
      "port": 4891,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T16:35:12.863Z"
    },
    {
      "port": 5000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T18:23:40.796Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T09:51:53.074Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T07:03:30.355Z"
    },
    {
      "port": 5671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T15:18:09.682Z"
    },
    {
      "port": 5984,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T18:19:39.039Z"
    },
    {
      "port": 6000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-20T16:01:00.841Z"
    },
    {
      "port": 6379,
      "protocol": "tcp",
      "name": "redis",
      "version": "3.2.100",
      "product": "Redis key-value store",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:redislabs:redis:3.2.100",
          "part": "a",
          "vendor": "redislabs",
          "product": "redis",
          "version": "3\\.2\\.100",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "redis": {
          "arch_bits": "64",
          "build_id": "dd26f1f93c5130ee",
          "gcc_version": "",
          "git_sha1": "00000000",
          "info_response": "# Server\r\nredis_version:3.2.100\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:dd26f1f93c5130ee\r\nredis_mode:standalone\r\nos:Windows  \r\narch_bits:64\r\nmultiplexing_api:WinSock_IOCP\r\nprocess_id:2376\r\nrun_id:19ffca6d819a1270474b9a04718da9fba894e021\r\ntcp_port:6379\r\nuptime_in_seconds:658066\r\nuptime_in_days:7\r\nhz:10\r\nlru_clock:4985582\r\nexecutable:D:\\Program Files\\Redis\\\"D:\\Program Files\\Redis\\redis-server.exe\"\r\nconfig_file:D:\\Program Files\\Redis\\redis.windows-service.conf\r\n\r\n# Clients\r\nconnected_clients:39\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:4\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:2698144\r\nused_memory_human:2.57M\r\nused_memory_rss:2660232\r\nused_memory_rss_human:2.54M\r\nused_memory_peak:5652248\r\nused_memory_peak_human:5.39M\r\ntotal_system_memory:0\r\ntotal_system_memory_human:0B\r\nused_memory_lua:37888\r\nused_memory_lua_human:37.00K\r\nmaxmemory:0\r\nmaxmemory_human:0B\r\nmaxmemory_policy:noeviction\r\nmem_fragmentation_ratio:0.99\r\nmem_allocator:jemalloc-3.6.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:0\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1766593212\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:0\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\naof_last_write_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:20440\r\ntotal_commands_processed:996566\r\ninstantaneous_ops_per_sec:3\r\ntotal_net_input_bytes:79286345\r\ntotal_net_output_bytes:973776794\r\ninstantaneous_input_kbps:0.07\r\ninstantaneous_output_kbps:1.50\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:29501\r\nevicted_keys:0\r\nkeyspace_hits:132665\r\nkeyspace_misses:23880\r\npubsub_channels:1\r\npubsub_patterns:0\r\nlatest_fork_usec:497\r\nmigrate_cached_sockets:0\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:5.41\r\nused_cpu_user:7.70\r\nused_cpu_sys_children:0.00\r\nused_cpu_user_children:0.00\r\n\r\n# Cluster\r\ncluster_enabled:0\r\n\r\n# Keyspace\r\ndb0:keys=137,expires=129,avg_ttl=3679852\r\ndb10:keys=66,expires=48,avg_ttl=640502195\r\n",
          "major": 3,
          "mem_allocator": "jemalloc-3.6.0",
          "minor": 2,
          "mode": "standalone",
          "nonexistent_response": "(Error: ERR unknown command 'NONEXISTENT')",
          "os": "Windows  ",
          "patchlevel": 100,
          "ping_response": "PONG",
          "quit_response": "OK",
          "total_commands_processed": 996566,
          "total_connections_received": 20440,
          "uptime_in_seconds": 658066,
          "used_memory": 2698144,
          "version": "3.2.100"
        }
      },
      "cve": [
        {
          "id": "CVE-2018-12326",
          "score": 8.4,
          "severity": "high"
        },
        {
          "id": "CVE-2018-12453",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2020-14147",
          "score": 7.7,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T16:21:03.097Z"
    },
    {
      "port": 6443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T16:59:54.915Z"
    },
    {
      "port": 7574,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T13:48:02.128Z"
    },
    {
      "port": 8000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T07:11:50.727Z"
    },
    {
      "port": 8080,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T03:53:27.523Z"
    },
    {
      "port": 8086,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T01:05:14.56Z"
    },
    {
      "port": 8087,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-21T08:37:27.852Z"
    },
    {
      "port": 8500,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T08:54:03.327Z"
    },
    {
      "port": 8883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T09:55:16.743Z"
    },
    {
      "port": 8983,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T06:54:03.01Z"
    },
    {
      "port": 9042,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T03:13:35.286Z"
    },
    {
      "port": 9092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-22T13:37:47.09Z"
    },
    {
      "port": 9093,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T10:08:59.812Z"
    },
    {
      "port": 9200,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T16:22:14.714Z"
    },
    {
      "port": 10250,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T12:56:56.16Z"
    },
    {
      "port": 11211,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T10:36:27.419Z"
    },
    {
      "port": 11434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-25T13:59:28.73Z"
    },
    {
      "port": 15671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T20:28:26.942Z"
    },
    {
      "port": 15672,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T03:38:23.026Z"
    },
    {
      "port": 20000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T19:25:29.89Z"
    },
    {
      "port": 27017,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-23T22:56:28.144Z"
    },
    {
      "port": 27018,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T22:20:26.685Z"
    },
    {
      "port": 27019,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T20:58:21.485Z"
    },
    {
      "port": 29092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-24T15:03:17.653Z"
    }
  ],
  "services_hash": "903dc2827b9fcd7fb97bf1e07a2bb39b7e2e0cfe294246498b43cf6f9bdd5042",
  "last_updated_at": "2025-12-25T13:59:28.73Z",
  "banner": [
    "http",
    "mysql",
    "tls",
    "redis",
    "mssql"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2015-1761": {
      "id": "CVE-2015-1761",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
      ],
      "score": 6.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "medium",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-284"
    },
    "CVE-2015-1762": {
      "id": "CVE-2015-1762",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 7.1,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-74"
    },
    "CVE-2015-1763": {
      "id": "CVE-2015-1763",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 8.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-284"
    },
    "CVE-2018-12326": {
      "id": "CVE-2018-12326",
      "references": [
        "https://access.redhat.com/errata/RHSA-2019:0052",
        "https://access.redhat.com/errata/RHSA-2019:0094",
        "https://access.redhat.com/errata/RHSA-2019:1860",
        "https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
        "https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
        "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
        "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
        "https://www.exploit-db.com/exploits/44904/",
        "https://access.redhat.com/errata/RHSA-2019:0052",
        "https://access.redhat.com/errata/RHSA-2019:0094",
        "https://access.redhat.com/errata/RHSA-2019:1860",
        "https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
        "https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
        "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
        "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
        "https://www.exploit-db.com/exploits/44904/"
      ],
      "score": 8.4,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.",
      "vector_string": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-119"
    },
    "CVE-2018-12453": {
      "id": "CVE-2018-12453",
      "references": [
        "https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
        "https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
        "https://www.exploit-db.com/exploits/44908/",
        "https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
        "https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
        "https://www.exploit-db.com/exploits/44908/"
      ],
      "score": 7.5,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-704"
    },
    "CVE-2020-14147": {
      "id": "CVE-2020-14147",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
        "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
        "https://github.com/antirez/redis/pull/6875",
        "https://security.gentoo.org/glsa/202008-17",
        "https://www.debian.org/security/2020/dsa-4731",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
        "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
        "https://github.com/antirez/redis/pull/6875",
        "https://security.gentoo.org/glsa/202008-17",
        "https://www.debian.org/security/2020/dsa-4731",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 7.7,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2021-32761": {
      "id": "CVE-2021-32761",
      "references": [
        "https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
        "https://security.gentoo.org/glsa/202209-17",
        "https://security.netapp.com/advisory/ntap-20210827-0004/",
        "https://www.debian.org/security/2021/dsa-5001",
        "https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
        "https://security.gentoo.org/glsa/202209-17",
        "https://security.netapp.com/advisory/ntap-20210827-0004/",
        "https://www.debian.org/security/2021/dsa-5001"
      ],
      "score": 7.5,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2021-3470": {
      "id": "CVE-2021-3470",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
      ],
      "score": 5.3,
      "services": [
        "6379/redis"
      ],
      "severity": "medium",
      "summary": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "weakness": "CWE-119"
    }
  }
}