182.131.21.103
{
"scan_id": 1766556008,
"ip": "182.131.21.103",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.131.16.0/21",
"postal_code": "",
"coordinates": {
"latitude": "34.7732",
"longitude": "113.722"
},
"geo_point": "34.7732, 113.722",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": ""
},
"location_updated_at": "2025-12-23T00:44:24Z",
"asn": {
"number": "AS38283",
"organization": "CHINANET SiChuan Telecom Internet Data Center",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.128.0.0/12",
"organization": "CHINANET Sichuan province network",
"descr": "CHINANET Sichuan province network,\nData Communication Division,\nChina Telecom",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:03:50Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-12-23T00:44:24Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-12-23T07:28:01Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-12-23T00:44:24Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T17:09:01.304Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T23:19:44.522Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T08:53:29.748Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
"body_murmur": 1489525118,
"body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
"component": [
"Microsoft HTTPAPI:2.0"
],
"content_length": 315,
"headers": {
"content_length": [
"315"
],
"content_type": [
"text/html; charset=us-ascii"
],
"date": [
"Wed, 24 Dec 2025 23:34:47 GMT"
],
"server": [
"Microsoft-HTTPAPI/2.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.131.21.103",
"path": "",
"scheme": "http"
}
},
"status_code": 404,
"title": "Not Found"
}
},
"url": "http://182.131.21.103/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T23:34:49.111Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T07:19:27.995Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-20T12:11:14.372Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA"
],
"ocsp_urls": [
"http://ocsp.digicert.com"
]
},
"authority_key_id": "78df91905feedeacf6c575ebd54c5553ef244ab6",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"http://www.digicert.com/CPS"
],
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n Timestamp : Nov 6 03:18:22.267 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:7E:9F:9F:8D:7C:AE:34:99:20:3D:C5:B2:\n 69:70:F4:46:F4:17:8A:8C:0B:87:67:60:E3:D8:AA:4C:\n 1A:C8:DE:92:02:21:00:FA:04:E0:58:0B:5B:E7:1B:26:\n E0:DF:34:CF:93:D6:9F:F3:13:2C:4D:2B:91:CE:CA:42:\n 41:83:BF:A2:AA:89:2B\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n Timestamp : Nov 6 03:18:22.260 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:3E:DF:59:16:2D:0E:3D:FC:7F:95:D6:1C:\n 35:7D:1A:DE:0D:C1:23:0A:9E:47:EE:55:FC:25:D4:04:\n F4:25:59:62:02:21:00:91:98:15:ED:F4:CE:D2:99:1F:\n 1E:ED:9A:9E:47:F6:12:B8:5A:F7:D3:CD:AA:83:F9:24:\n 96:97:5D:C3:90:F0:4F\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:\n 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3\n Timestamp : Nov 6 03:18:22.278 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:28:56:65:08:37:79:53:16:8E:AF:26:6D:\n BD:10:52:15:2C:5F:FD:F6:0A:EE:3B:94:8C:36:3A:A4:\n 0B:6B:30:3F:02:20:36:7C:D7:35:1B:35:6A:FF:5F:5E:\n 08:A9:65:BD:F5:EF:BE:94:AD:46:DA:9B:D7:61:0D:19:\n 6A:49:7D:85:5E:24",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"auth.jzhy.com.cn"
]
},
"subject_key_id": "b3749f8f4ef98369affb8f802eaf3ed709bf6648"
},
"fingerprint_md5": "7BD762B574A5156026AE74D12C2C9926",
"fingerprint_sha1": "3A1CAD55DBDC4EB0325DC85920D78124CA862311",
"fingerprint_sha256": "11A9E9C16994D53B0A763D77A858709A97CC0449E6EE37DC3F75FCC119158070",
"issuer": {
"common_name": [
"Encryption Everywhere DV TLS CA - G2"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Encryption Everywhere DV TLS CA - G2",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-12-27T09:09:00",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "10001795749153806261943129322400133956",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502207e9f9f8d7cae3499203dc5b26970f446f4178a8c0b876760e3d8aa4c1ac8de92022100fa04e0580b5be71b26e0df34cf93d69ff3132c4d2b91ceca424183bfa2aa892b"
},
"timestamp": "2025-11-06T03:18:22.267000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502203edf59162d0e3dfc7f95d61c357d1ade0dc1230a9e47ee55fc25d404f4255962022100919815edf4ced2991f1eed9a9e47f612b85af7d3cdaa83f92496975dc390f04f"
},
"timestamp": "2025-11-06T03:18:22.260000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "499c9b69de1d7cecfc36decd8764a6b85baf0a878019d15552fbe9eb29ddf8c3",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3044022028566508377953168eaf266dbd1052152c5ffdf60aee3b948c363aa40b6b303f0220367cd7351b356aff5f5e08a965bdf5efbe94ad46da9bd7610d196a497d855e24"
},
"timestamp": "2025-11-06T03:18:22.278000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"auth.jzhy.com.cn"
]
},
"subject_alt_name": {
"dns_names": [
"auth.jzhy.com.cn"
],
"extended_dns_names": [
{
"domain": "jzhy",
"fld": "jzhy.com.cn",
"subdomain": "auth",
"tld": "com.cn"
}
]
},
"subject_dn": "/CN=auth.jzhy.com.cn",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b0ca7ae562197c0370024a276683e35b4db0cffd34706be45c192fa0e610fbd3",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "8799a0012ad0b04cab172ee91bf3baf6097a06f5f139c171c5de63213d9bf466",
"tbs_noct_fingerprint": "45be2f5b674cfb8a6a8158a4d66913d82455f8670618fe488591a007fd781590",
"validation_level": "DV",
"validity": {
"length_seconds": 7948799,
"not_after": "2026-02-05T23:59:59",
"not_before": "2025-11-06T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "11A9E9C16994D53B0A763D77A858709A97CC0449E6EE37DC3F75FCC119158070",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "http://182.131.21.103:443/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-21T01:07:36.98Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T19:29:15.951Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T20:21:01.969Z"
},
{
"port": 631,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-20T20:28:44.053Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T00:00:50.763Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-20T06:36:57.933Z"
},
{
"port": 1234,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T21:58:06.577Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "12.00.6024",
"product": "Microsoft SQL Server 2014",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2014",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2014",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_ON",
"instance_name": "",
"version": "12.0.6024"
}
},
"cve": [
{
"id": "CVE-2015-1761",
"score": 6.5,
"severity": "medium"
},
{
"id": "CVE-2015-1762",
"score": 7.1,
"severity": "high"
},
{
"id": "CVE-2015-1763",
"score": 8.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T20:00:48.842Z"
},
{
"port": 1434,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T19:51:03.815Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T11:36:42.682Z"
},
{
"port": 1911,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T05:00:26.465Z"
},
{
"port": 2181,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T19:54:49.07Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T09:22:51.621Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "8.0.33",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:8.0.33",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "8\\.0\\.33",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "8.0.33"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
}
},
"fingerprint_md5": "4CF8A443756736ED31598508D70C67C7",
"fingerprint_sha1": "6760F49E8E920587E56E374F985E054BBB594976",
"fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
"issuer": {
"common_name": [
"MySQL_Server_8.0.33_Auto_Generated_CA_Certificate"
]
},
"issuer_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_CA_Certificate",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
]
},
"subject_alt_name": {
"dns_names": [
"MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
],
"extended_dns_names": []
},
"subject_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_Server_Certificate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "43110fcf3d1cf0e99d7f103e8612e665ef8de017107b770f2e1d9ded956fb942",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "ca1abaa28d5a7173892e527c183b6f924d0886a8f2565a4d2cf2b75c2d073dc6",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2033-09-03T06:30:29",
"not_before": "2023-09-06T06:30:29"
},
"version": 2
},
"fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T13:36:33.568Z"
},
{
"port": 4891,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T16:35:12.863Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T18:23:40.796Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T09:51:53.074Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T07:03:30.355Z"
},
{
"port": 5671,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T15:18:09.682Z"
},
{
"port": 5984,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T18:19:39.039Z"
},
{
"port": 6000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-20T16:01:00.841Z"
},
{
"port": 6379,
"protocol": "tcp",
"name": "redis",
"version": "3.2.100",
"product": "Redis key-value store",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:redislabs:redis:3.2.100",
"part": "a",
"vendor": "redislabs",
"product": "redis",
"version": "3\\.2\\.100",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"redis": {
"arch_bits": "64",
"build_id": "dd26f1f93c5130ee",
"gcc_version": "",
"git_sha1": "00000000",
"info_response": "# Server\r\nredis_version:3.2.100\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:dd26f1f93c5130ee\r\nredis_mode:standalone\r\nos:Windows \r\narch_bits:64\r\nmultiplexing_api:WinSock_IOCP\r\nprocess_id:2376\r\nrun_id:19ffca6d819a1270474b9a04718da9fba894e021\r\ntcp_port:6379\r\nuptime_in_seconds:658066\r\nuptime_in_days:7\r\nhz:10\r\nlru_clock:4985582\r\nexecutable:D:\\Program Files\\Redis\\\"D:\\Program Files\\Redis\\redis-server.exe\"\r\nconfig_file:D:\\Program Files\\Redis\\redis.windows-service.conf\r\n\r\n# Clients\r\nconnected_clients:39\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:4\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:2698144\r\nused_memory_human:2.57M\r\nused_memory_rss:2660232\r\nused_memory_rss_human:2.54M\r\nused_memory_peak:5652248\r\nused_memory_peak_human:5.39M\r\ntotal_system_memory:0\r\ntotal_system_memory_human:0B\r\nused_memory_lua:37888\r\nused_memory_lua_human:37.00K\r\nmaxmemory:0\r\nmaxmemory_human:0B\r\nmaxmemory_policy:noeviction\r\nmem_fragmentation_ratio:0.99\r\nmem_allocator:jemalloc-3.6.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:0\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1766593212\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:0\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\naof_last_write_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:20440\r\ntotal_commands_processed:996566\r\ninstantaneous_ops_per_sec:3\r\ntotal_net_input_bytes:79286345\r\ntotal_net_output_bytes:973776794\r\ninstantaneous_input_kbps:0.07\r\ninstantaneous_output_kbps:1.50\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:29501\r\nevicted_keys:0\r\nkeyspace_hits:132665\r\nkeyspace_misses:23880\r\npubsub_channels:1\r\npubsub_patterns:0\r\nlatest_fork_usec:497\r\nmigrate_cached_sockets:0\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:5.41\r\nused_cpu_user:7.70\r\nused_cpu_sys_children:0.00\r\nused_cpu_user_children:0.00\r\n\r\n# Cluster\r\ncluster_enabled:0\r\n\r\n# Keyspace\r\ndb0:keys=137,expires=129,avg_ttl=3679852\r\ndb10:keys=66,expires=48,avg_ttl=640502195\r\n",
"major": 3,
"mem_allocator": "jemalloc-3.6.0",
"minor": 2,
"mode": "standalone",
"nonexistent_response": "(Error: ERR unknown command 'NONEXISTENT')",
"os": "Windows ",
"patchlevel": 100,
"ping_response": "PONG",
"quit_response": "OK",
"total_commands_processed": 996566,
"total_connections_received": 20440,
"uptime_in_seconds": 658066,
"used_memory": 2698144,
"version": "3.2.100"
}
},
"cve": [
{
"id": "CVE-2018-12326",
"score": 8.4,
"severity": "high"
},
{
"id": "CVE-2018-12453",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2020-14147",
"score": 7.7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T16:21:03.097Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T16:59:54.915Z"
},
{
"port": 7574,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T13:48:02.128Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T07:11:50.727Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T03:53:27.523Z"
},
{
"port": 8086,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T01:05:14.56Z"
},
{
"port": 8087,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-21T08:37:27.852Z"
},
{
"port": 8500,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T08:54:03.327Z"
},
{
"port": 8883,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T09:55:16.743Z"
},
{
"port": 8983,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T06:54:03.01Z"
},
{
"port": 9042,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T03:13:35.286Z"
},
{
"port": 9092,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-22T13:37:47.09Z"
},
{
"port": 9093,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T10:08:59.812Z"
},
{
"port": 9200,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T16:22:14.714Z"
},
{
"port": 10250,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T12:56:56.16Z"
},
{
"port": 11211,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T10:36:27.419Z"
},
{
"port": 11434,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-25T13:59:28.73Z"
},
{
"port": 15671,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T20:28:26.942Z"
},
{
"port": 15672,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T03:38:23.026Z"
},
{
"port": 20000,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T19:25:29.89Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-23T22:56:28.144Z"
},
{
"port": 27018,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T22:20:26.685Z"
},
{
"port": 27019,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T20:58:21.485Z"
},
{
"port": 29092,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-24T15:03:17.653Z"
}
],
"services_hash": "903dc2827b9fcd7fb97bf1e07a2bb39b7e2e0cfe294246498b43cf6f9bdd5042",
"last_updated_at": "2025-12-25T13:59:28.73Z",
"banner": [
"http",
"mysql",
"tls",
"redis",
"mssql"
],
"is_vuln": true,
"cveDetails": {
"CVE-2015-1761": {
"id": "CVE-2015-1761",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
],
"score": 6.5,
"services": [
"1433/ms-sql-s"
],
"severity": "medium",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "CWE-284"
},
"CVE-2015-1762": {
"id": "CVE-2015-1762",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 7.1,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"weakness": "CWE-74"
},
"CVE-2015-1763": {
"id": "CVE-2015-1763",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 8.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"weakness": "CWE-284"
},
"CVE-2018-12326": {
"id": "CVE-2018-12326",
"references": [
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/"
],
"score": 8.4,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2018-12453": {
"id": "CVE-2018-12453",
"references": [
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/",
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-704"
},
"CVE-2020-14147": {
"id": "CVE-2020-14147",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 7.7,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-32761": {
"id": "CVE-2021-32761",
"references": [
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001",
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-125"
},
"CVE-2021-3470": {
"id": "CVE-2021-3470",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
],
"score": 5.3,
"services": [
"6379/redis"
],
"severity": "medium",
"summary": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-119"
}
}
}