182.16.226.220
{
"scan_id": 1770546824,
"ip": "182.16.226.220",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.16.224.0/21",
"postal_code": "",
"coordinates": {
"latitude": "35.69",
"longitude": "139.69"
},
"geo_point": "35.69, 139.69",
"locale_code": "en",
"continent": "Asia",
"country_code": "JP",
"country_name": "Japan",
"city": ""
},
"location_updated_at": "2026-02-09T16:44:12Z",
"asn": {
"number": "AS37916",
"organization": "A.T.WORKS, Inc.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.16.224.0/21",
"organization": "A.T.WORKS,Inc.",
"descr": "A.T.WORKS,Inc.,\n4-5, Ushijima shimmachi, Toyama-shi, Toyama 930-0856, Japan",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:03:49Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-02-09T16:44:12Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-02-09T17:34:52Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-02-09T16:44:12Z"
}
],
"hostnames": [
{
"name": "shr11.digitalink.ne.jp",
"last_updated_at": "2026-02-09T17:34:52Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T19:10:50.539Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T04:06:08.321Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "Postfix smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postfix:postfix",
"part": "a",
"vendor": "postfix",
"product": "postfix",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 shr11.digitalink.ne.jp ESMTP Postfix\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
"fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"issuer": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1318987235",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"subject_alt_name": {
"dns_names": [
"plesk"
],
"extended_dns_names": []
},
"subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2012-10-18T01:20:35",
"not_before": "2011-10-19T01:20:35"
}
},
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T00:17:37.473Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "PleskLin",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\n<head>\n<title>301 Moved Permanently</title>\n<meta http-equiv=\"Content-type\" content=\"text/html; charset=Shift_JIS\">\n<meta http-equiv=\"refresh\" CONTENT=\"0;URL=http://www.digitalink.ne.jp/\">\n<meta name=\"robots\" content=\"INDEX,NOFOLLOW\">\n</head>\n<body></body>\n</html>\n",
"body_murmur": 814893998,
"body_sha256": "647b77dc8f86673bdccc02ba4528b121413df5d6f16a0ea65f54107a0e96bb5e",
"component": [
"Apache HTTP Server"
],
"content_length": 272,
"favicon": {
"md5_hash": "1ce0c63f8bd1e5d3376ec0ae95a41c08",
"murmur_hash": -652508439,
"path": "http://182.16.226.220:80/favicon.ico",
"size": 17542
},
"headers": {
"accept_ranges": [
"bytes"
],
"content_length": [
"272"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 01 Feb 2026 07:06:56 GMT"
],
"etag": [
"\"12a853-110-50c347c0\""
],
"last_modified": [
"Tue, 11 Jul 2017 10:39:35 GMT"
],
"server": [
"Apache"
],
"x_powered_by": [
"PleskLin"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.16.226.220",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "301 Moved Permanently"
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "http://182.16.226.220/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-01T07:06:57.709Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Courier pop3d",
"extra_info": "",
"tunnel": "",
"modules": {
"pop3": {
"banner": "+OK Hello there. <[email protected]>\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
"fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"issuer": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1318987235",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"subject_alt_name": {
"dns_names": [
"plesk"
],
"extended_dns_names": []
},
"subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2012-10-18T01:20:35",
"not_before": "2011-10-19T01:20:35"
}
},
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-02T08:17:39.24Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Courier Imapd",
"extra_info": "released 2004",
"tunnel": "",
"modules": {
"imap": {
"banner": "* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA IDLE ACL ACL2=UNION STARTTLS] Courier-IMAP ready. Copyright 1998-2004 Double Precision, Inc. See COPYING for distribution information.\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
"fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"issuer": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1318987235",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"subject_alt_name": {
"dns_names": [
"plesk"
],
"extended_dns_names": []
},
"subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2012-10-18T01:20:35",
"not_before": "2011-10-19T01:20:35"
}
},
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-31T10:59:05.71Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<html>\n<head>\n<title>301 Moved Permanently</title>\n<meta http-equiv=\"Content-type\" content=\"text/html; charset=Shift_JIS\">\n<meta http-equiv=\"refresh\" CONTENT=\"0;URL=http://www.digitalink.ne.jp/\">\n<meta name=\"robots\" content=\"INDEX,NOFOLLOW\">\n</head>\n<body></body>\n</html>\n",
"body_murmur": 814893998,
"body_sha256": "647b77dc8f86673bdccc02ba4528b121413df5d6f16a0ea65f54107a0e96bb5e",
"component": [
"Apache HTTP Server"
],
"content_length": 272,
"headers": {
"accept_ranges": [
"bytes"
],
"content_length": [
"272"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 10 Feb 2026 14:30:12 GMT"
],
"etag": [
"\"12a867-110-50c347c0\""
],
"last_modified": [
"Tue, 11 Jul 2017 10:39:35 GMT"
],
"server": [
"Apache"
],
"x_powered_by": [
"PleskLin"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.16.226.220",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"title": "301 Moved Permanently"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://repo.pubcert.jprs.jp/sppca/jprs/dvca_g4/JPRS_DVCA_G4_DER.cer"
],
"ocsp_urls": [
"http://dv.g4.ocsp.pubcert.jprs.jp"
]
},
"authority_key_id": "7c24ce0da4382dc7b3635ea7787a8d1d4c2ec715",
"certificate_policies": [
{
"cps": [
"http://jprs.jp/pubcert/info/repository/"
],
"id": "1.3.6.1.4.1.53827.1.1.4"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://repo.pubcert.jprs.jp/sppca/jprs/dvca_g4/fullcrl.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:\n 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E\n Timestamp : Nov 27 00:41:17.603 2022 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:1E:EE:76:F3:C5:2C:06:EE:69:35:99:D6:\n 05:DE:19:44:13:AA:E3:0A:D4:0A:C5:BA:0A:1C:80:EA:\n EA:4D:1B:D4:02:21:00:9E:AF:DE:90:5C:6F:1E:96:0A:\n D8:0E:CF:1B:8C:CB:AF:DF:D1:ED:C2:21:6F:B7:95:A2:\n 10:A2:54:E9:74:86:04\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:\n B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A\n Timestamp : Nov 27 00:41:19.098 2022 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:69:08:D9:A9:CA:DA:0E:F8:01:D5:1F:3C:\n E6:A3:B6:C9:61:D6:30:46:21:F6:83:CA:45:42:B7:85:\n 04:01:99:F8:02:20:00:EE:BE:AD:01:F8:05:82:00:06:\n EB:0F:97:1A:D8:35:73:43:98:5C:32:ED:11:04:8C:2A:\n 64:74:C5:7D:63:43\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09:\n 4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A\n Timestamp : Nov 27 00:41:19.872 2022 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:57:9D:48:56:64:09:1B:E2:CC:DB:0D:1A:\n C0:EB:7B:B7:53:56:96:5A:74:77:4D:A8:64:51:E2:7D:\n 77:8E:AB:B0:02:20:4D:BA:40:3E:C6:A4:BD:96:5B:35:\n B5:82:56:4A:96:91:2F:7D:F3:83:07:09:32:85:03:CA:\n 19:76:7A:37:40:0B\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 7A:32:8C:54:D8:B7:2D:B6:20:EA:38:E0:52:1E:E9:84:\n 16:70:32:13:85:4D:3B:D2:2B:C1:3A:57:A3:52:EB:52\n Timestamp : Nov 27 00:41:20.346 2022 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:23:7C:C8:9B:BD:CC:3A:92:C9:A1:B4:DA:\n DD:BD:85:05:7C:DD:8B:4B:DB:95:47:5A:22:57:A1:E1:\n AE:FC:B5:49:02:21:00:BA:CE:9B:5F:C3:EB:C2:95:EE:\n 05:D8:9C:19:81:A4:BB:B8:BE:CB:1C:D2:90:55:EF:AC:\n F3:35:78:B5:23:AA:91",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"ssl.shr11.digitalink.ne.jp"
]
},
"subject_key_id": "6513966bb88f8261295f8660510d1e12edd17d33"
},
"fingerprint_md5": "20DE3166661DBF1C2E95A8D5EFB1442B",
"fingerprint_sha1": "F583E23F6C62054335C4FEE96BED66070E13816F",
"fingerprint_sha256": "7441E1AA6875EE7B3E35364CE85258C40778632EEBC03BE23869553FB9DE2938",
"issuer": {
"common_name": [
"JPRS Domain Validation Authority - G4"
],
"country": [
"JP"
],
"organization": [
"Japan Registry Services Co., Ltd."
]
},
"issuer_dn": "/C=JP/O=Japan Registry Services Co., Ltd./CN=JPRS Domain Validation Authority - G4",
"jarm": "05b02b09b04b04b05b05b02b05b04bd7fc4c7c6ef19b77a4ca0787979cdc13",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2026-02-14T06:09:14",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2026-02-14T06:09:14",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "41061256262959263337412196679202164424",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "e83ed0da3ef5063532e75728bc896bc903d3cbd1116beceb69e1777d6d06bd6e",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502201eee76f3c52c06ee693599d605de194413aae30ad40ac5ba0a1c80eaea4d1bd40221009eafde905c6f1e960ad80ecf1b8ccbafdfd1edc2216fb795a210a254e9748604"
},
"timestamp": "2022-11-27T00:41:17.603000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "adf7befa7cff10c88b9d3d9c1e3e186ab467295dcfb10c24ca858634ebdc828a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402206908d9a9cada0ef801d51f3ce6a3b6c961d6304621f683ca4542b785040199f8022000eebead01f805820006eb0f971ad8357343985c32ed11048c2a6474c57d6343"
},
"timestamp": "2022-11-27T00:41:19.098000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "b3737707e18450f86386d605a9dc11094a792db1670c0b87dcf0030e7936a59a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30440220579d485664091be2ccdb0d1ac0eb7bb75356965a74774da86451e27d778eabb002204dba403ec6a4bd965b35b582564a96912f7df3830709328503ca19767a37400b"
},
"timestamp": "2022-11-27T00:41:19.872000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "7a328c54d8b72db620ea38e0521ee98416703213854d3bd22bc13a57a352eb52",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450220237cc89bbdcc3a92c9a1b4daddbd85057cdd8b4bdb95475a2257a1e1aefcb549022100bace9b5fc3ebc295ee05d89c1981a4bbb8becb1cd29055efacf33578b523aa91"
},
"timestamp": "2022-11-27T00:41:20.346000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"ssl.shr11.digitalink.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"ssl.shr11.digitalink.ne.jp"
],
"extended_dns_names": [
{
"domain": "digitalink",
"fld": "digitalink.ne.jp",
"subdomain": "ssl.shr11",
"tld": "ne.jp"
}
]
},
"subject_dn": "/CN=ssl.shr11.digitalink.ne.jp",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "06b3c21e3af65f0eb93e41beae742138aa5eb39293e6f959be9d21eed3d84c12",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "0f6fbd8a4f6d0f519207da93f762938feb9294f423de4ff04bd5679be876a073",
"tbs_noct_fingerprint": "bd922649020c5c87565cebecc9770f12ffab4bf2ed3bea754daca9197f7b99fa",
"validation_level": "DV",
"validity": {
"length_seconds": 31847322,
"not_after": "2023-11-30T14:59:59",
"not_before": "2022-11-27T00:31:17"
},
"version": 2
},
"fingerprint_sha256": "7441E1AA6875EE7B3E35364CE85258C40778632EEBC03BE23869553FB9DE2938",
"precert": false,
"raw": "MIIG3TCCBcWgAwIBAgIQHuQcPI/PfMn57HUuwXTOyDANBgkqhkiG9w0BAQsFADBpMQswCQYDVQQGEwJKUDEqMCgGA1UEChMhSmFwYW4gUmVnaXN0cnkgU2VydmljZXMgQ28uLCBMdGQuMS4wLAYDVQQDEyVKUFJTIERvbWFpbiBWYWxpZGF0aW9uIEF1dGhvcml0eSAtIEc0MB4XDTIyMTEyNzAwMzExN1oXDTIzMTEzMDE0NTk1OVowJTEjMCEGA1UEAxMac3NsLnNocjExLmRpZ2l0YWxpbmsubmUuanAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDCpAowPPsKZexiWBwdeS4IOHKCDBD55PMdHYMRqyFFPmtVYbiWj55uGKiOt43fe72frWYMNlfD6dOlyVQHBJCwMUhMqsGqQLDHowYvFq+nde6CD7HqaSNQjvWYc5ecqgc4lG7irHnVo+rXUyCpzCl31Q9nD9HtIWyR2tsmSeT8kColYsdksZC7f5ToPMgS1ROxKy55vQ8bnyEdMLjpmgczBRpjV4QvIdy7XiO5soa0NQnYGewKp+SbdbnMuk5Ogmp+XsvPlcNk0XElhg4E1Qjd5/t3fF0E8pTqA/kB3d/Mphm+tJwHxna0wM10KRG7ZGfdhYmHFDl9J4NP/jZqcfZ7AgMBAAGjggPDMIIDvzAfBgNVHSMEGDAWgBR8JM4NpDgtx7NjXqd4eo0dTC7HFTCBkAYIKwYBBQUHAQEEgYMwgYAwTwYIKwYBBQUHMAKGQ2h0dHA6Ly9yZXBvLnB1YmNlcnQuanBycy5qcC9zcHBjYS9qcHJzL2R2Y2FfZzQvSlBSU19EVkNBX0c0X0RFUi5jZXIwLQYIKwYBBQUHMAGGIWh0dHA6Ly9kdi5nNC5vY3NwLnB1YmNlcnQuanBycy5qcDAlBgNVHREEHjAcghpzc2wuc2hyMTEuZGlnaXRhbGluay5uZS5qcDBZBgNVHSAEUjBQMEQGCysGAQQBg6RDAQEEMDUwMwYIKwYBBQUHAgEWJ2h0dHA6Ly9qcHJzLmpwL3B1YmNlcnQvaW5mby9yZXBvc2l0b3J5LzAIBgZngQwBAgEwEwYDVR0lBAwwCgYIKwYBBQUHAwEwSwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL3JlcG8ucHViY2VydC5qcHJzLmpwL3NwcGNhL2pwcnMvZHZjYV9nNC9mdWxsY3JsLmNybDAdBgNVHQ4EFgQUZROWa7iPgmEpX4ZgUQ0eEu3RfTMwDgYDVR0PAQH/BAQDAgWgMIIB9AYKKwYBBAHWeQIEAgSCAeQEggHgAd4AdgDoPtDaPvUGNTLnVyi8iWvJA9PL0RFr7Otp4Xd9bQa9bgAAAYS2iAIjAAAEAwBHMEUCIB7udvPFLAbuaTWZ1gXeGUQTquMK1ArFugocgOrqTRvUAiEAnq/ekFxvHpYK2A7PG4zLr9/R7cIhb7eVohCiVOl0hgQAdQCt9776fP8QyIudPZwePhhqtGcpXc+xDCTKhYY069yCigAAAYS2iAf6AAAEAwBGMEQCIGkI2anK2g74AdUfPOajtslh1jBGIfaDykVCt4UEAZn4AiAA7r6tAfgFggAG6w+XGtg1c0OYXDLtEQSMKmR0xX1jQwB1ALNzdwfhhFD4Y4bWBancEQlKeS2xZwwLh9zwAw55NqWaAAABhLaICwAAAAQDAEYwRAIgV51IVmQJG+LM2w0awOt7t1NWllp0d02oZFHifXeOq7ACIE26QD7GpL2WWzW1glZKlpEvffODBwkyhQPKGXZ6N0ALAHYAejKMVNi3LbYg6jjgUh7phBZwMhOFTTvSK8E6V6NS61IAAAGEtogM2gAABAMARzBFAiAjfMibvcw6ksmhtNrdvYUFfN2LS9uVR1oiV6Hhrvy1SQIhALrOm1/D68KV7gXYnBmBpLu4vssc0pBV76zzNXi1I6qRMA0GCSqGSIb3DQEBCwUAA4IBAQAvW8dGwFQwhN7AgECZ+wyJ4IjIoWjfDWb1Zrt+rs4syJ8xCo67Ml6YwWFmRHrSHI6suFfgO5OXkP0u7c6msHIRyVwgf3mhEx0QyL9k9pqcrbtfB9Wn3U7nfLUshHZdpO1BMcAEMKSmdv5Hnvfpys4crqYglQKi+Y11uL5cFipDelZSt2cdrM8TlD8ckWSUMEXVHsArot/+ZYfsKEF9lIKUfg0eln9KkBOgBu/zi+n3+n60NVJR5b6AFolLtnS3lhsErVbYT6ZWldheIQhUp4scgdAMPZAAMWH2HiSPD6WvUmfMzUNJv7y610e7cyMw8pBMnH1e44BvwHlmjfygRVQX",
"tags": [
"dv"
]
}
},
"url": "https://182.16.226.220/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T18:35:24.895Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-07T19:37:47.007Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "Postfix smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postfix:postfix",
"part": "a",
"vendor": "postfix",
"product": "postfix",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 shr11.digitalink.ne.jp ESMTP Postfix\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
"fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"issuer": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1318987235",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"plesk"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"Herndon"
],
"organization": [
"Parallels"
],
"organizational_unit": [
"Plesk"
],
"province": [
"Virginia"
]
},
"subject_alt_name": {
"dns_names": [
"plesk"
],
"extended_dns_names": []
},
"subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2012-10-18T01:20:35",
"not_before": "2011-10-19T01:20:35"
}
},
"fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T23:38:50.659Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Courier Imapd",
"extra_info": "released 2004",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-08T01:37:53.243Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Courier pop3d",
"extra_info": "",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-10T18:46:41.055Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.0.77",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:5.0.77",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "5\\.0\\.77",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.0.77"
}
},
"cve": [
{
"id": "CVE-2007-5925",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2009-0819",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2009-4028",
"score": 6.8,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T20:51:28.84Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T03:56:17.647Z"
}
],
"services_hash": "79000b391f4a4e96b03b20096a92458e7796888faf85832e38feec177ce1bd59",
"last_updated_at": "2026-02-10T18:46:41.055Z",
"banner": [
"mysql",
"smtp",
"tls",
"http",
"pop3",
"imap"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0070": {
"id": "CVE-1999-0070",
"references": [
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "test-cgi program allows an attacker to list files on the server.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-1999-1199": {
"id": "CVE-1999-1199",
"references": [
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 10,
"services": [
"80/http"
],
"severity": "high",
"summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-5925": {
"id": "CVE-2007-5925",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=198988",
"http://bugs.mysql.com/bug.php?id=32125",
"http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
"http://secunia.com/advisories/27568",
"http://secunia.com/advisories/27649",
"http://secunia.com/advisories/27823",
"http://secunia.com/advisories/28025",
"http://secunia.com/advisories/28040",
"http://secunia.com/advisories/28099",
"http://secunia.com/advisories/28108",
"http://secunia.com/advisories/28128",
"http://secunia.com/advisories/28838",
"http://security.gentoo.org/glsa/glsa-200711-25.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
"http://www.debian.org/security/2007/dsa-1413",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
"http://www.redhat.com/support/errata/RHSA-2007-1155.html",
"http://www.redhat.com/support/errata/RHSA-2007-1157.html",
"http://www.securityfocus.com/bid/26353",
"http://www.securitytracker.com/id?1018978",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2007/3903",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
"https://usn.ubuntu.com/559-1/",
"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html",
"http://bugs.gentoo.org/show_bug.cgi?id=198988",
"http://bugs.mysql.com/bug.php?id=32125",
"http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
"http://secunia.com/advisories/27568",
"http://secunia.com/advisories/27649",
"http://secunia.com/advisories/27823",
"http://secunia.com/advisories/28025",
"http://secunia.com/advisories/28040",
"http://secunia.com/advisories/28099",
"http://secunia.com/advisories/28108",
"http://secunia.com/advisories/28128",
"http://secunia.com/advisories/28838",
"http://security.gentoo.org/glsa/glsa-200711-25.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
"http://www.debian.org/security/2007/dsa-1413",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
"http://www.redhat.com/support/errata/RHSA-2007-1155.html",
"http://www.redhat.com/support/errata/RHSA-2007-1157.html",
"http://www.securityfocus.com/bid/26353",
"http://www.securitytracker.com/id?1018978",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2007/3903",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
"https://usn.ubuntu.com/559-1/",
"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2009-0819": {
"id": "CVE-2009-0819",
"references": [
"http://bugs.mysql.com/bug.php?id=42495",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
"http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
"http://secunia.com/advisories/34115",
"http://www.securityfocus.com/bid/33972",
"http://www.securitytracker.com/id?1021786",
"http://www.vupen.com/english/advisories/2009/0594",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544",
"http://bugs.mysql.com/bug.php?id=42495",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
"http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
"http://secunia.com/advisories/34115",
"http://www.securityfocus.com/bid/33972",
"http://www.securitytracker.com/id?1021786",
"http://www.vupen.com/english/advisories/2009/0594",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2009-4028": {
"id": "CVE-2009-4028",
"references": [
"http://bugs.mysql.com/47320",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
"http://lists.mysql.com/commits/87446",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://marc.info/?l=oss-security&m=125881733826437&w=2",
"http://www.openwall.com/lists/oss-security/2009/11/19/3",
"http://www.openwall.com/lists/oss-security/2009/11/23/16",
"http://www.redhat.com/support/errata/RHSA-2010-0109.html",
"http://www.vupen.com/english/advisories/2010/1107",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510",
"http://bugs.mysql.com/47320",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
"http://lists.mysql.com/commits/87446",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://marc.info/?l=oss-security&m=125881733826437&w=2",
"http://www.openwall.com/lists/oss-security/2009/11/19/3",
"http://www.openwall.com/lists/oss-security/2009/11/23/16",
"http://www.redhat.com/support/errata/RHSA-2010-0109.html",
"http://www.vupen.com/english/advisories/2010/1107",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"weakness": "CWE-20"
},
"CVE-2010-1621": {
"id": "CVE-2010-1621",
"references": [
"http://bugs.mysql.com/bug.php?id=51770",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
"http://www.securityfocus.com/bid/39543",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://bugs.mysql.com/bug.php?id=51770",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
"http://www.securityfocus.com/bid/39543",
"http://www.ubuntu.com/usn/USN-1397-1"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "CWE-264"
},
"CVE-2010-1626": {
"id": "CVE-2010-1626",
"references": [
"http://bugs.mysql.com/bug.php?id=40980",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
"http://securitytracker.com/id?1024004",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
"http://www.openwall.com/lists/oss-security/2010/05/10/2",
"http://www.openwall.com/lists/oss-security/2010/05/18/4",
"http://www.redhat.com/support/errata/RHSA-2010-0442.html",
"http://www.securityfocus.com/bid/40257",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2010/1194",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490",
"http://bugs.mysql.com/bug.php?id=40980",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
"http://securitytracker.com/id?1024004",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
"http://www.openwall.com/lists/oss-security/2010/05/10/2",
"http://www.openwall.com/lists/oss-security/2010/05/18/4",
"http://www.redhat.com/support/errata/RHSA-2010-0442.html",
"http://www.securityfocus.com/bid/40257",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2010/1194",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
],
"score": 3.6,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"weakness": "CWE-59"
},
"CVE-2010-3677": {
"id": "CVE-2010-3677",
"references": [
"http://bugs.mysql.com/bug.php?id=54575",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://secunia.com/advisories/42875",
"http://secunia.com/advisories/42936",
"http://support.apple.com/kb/HT4723",
"http://www.debian.org/security/2011/dsa-2143",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
"http://www.openwall.com/lists/oss-security/2010/09/28/10",
"http://www.redhat.com/support/errata/RHSA-2010-0825.html",
"http://www.redhat.com/support/errata/RHSA-2011-0164.html",
"http://www.securityfocus.com/bid/42646",
"http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
"http://www.ubuntu.com/usn/USN-1017-1",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2011/0105",
"http://www.vupen.com/english/advisories/2011/0133",
"http://www.vupen.com/english/advisories/2011/0170",
"http://www.vupen.com/english/advisories/2011/0345",
"https://bugzilla.redhat.com/show_bug.cgi?id=628040",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/64688",
"http://bugs.mysql.com/bug.php?id=54575",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://secunia.com/advisories/42875",
"http://secunia.com/advisories/42936",
"http://support.apple.com/kb/HT4723",
"http://www.debian.org/security/2011/dsa-2143",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
"http://www.openwall.com/lists/oss-security/2010/09/28/10",
"http://www.redhat.com/support/errata/RHSA-2010-0825.html",
"http://www.redhat.com/support/errata/RHSA-2011-0164.html",
"http://www.securityfocus.com/bid/42646",
"http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
"http://www.ubuntu.com/usn/USN-1017-1",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2011/0105",
"http://www.vupen.com/english/advisories/2011/0133",
"http://www.vupen.com/english/advisories/2011/0170",
"http://www.vupen.com/english/advisories/2011/0345",
"https://bugzilla.redhat.com/show_bug.cgi?id=628040",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2010-3682": {
"id": "CVE-2010-3682",
"references": [
"http://bugs.mysql.com/bug.php?id=52711",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://secunia.com/advisories/42875",
"http://secunia.com/advisories/42936",
"http://support.apple.com/kb/HT4723",
"http://www.debian.org/security/2011/dsa-2143",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
"http://www.openwall.com/lists/oss-security/2010/09/28/10",
"http://www.redhat.com/support/errata/RHSA-2010-0825.html",
"http://www.redhat.com/support/errata/RHSA-2011-0164.html",
"http://www.securityfocus.com/bid/42599",
"http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
"http://www.ubuntu.com/usn/USN-1017-1",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2011/0105",
"http://www.vupen.com/english/advisories/2011/0133",
"http://www.vupen.com/english/advisories/2011/0170",
"http://www.vupen.com/english/advisories/2011/0345",
"https://bugzilla.redhat.com/show_bug.cgi?id=628328",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/64684",
"http://bugs.mysql.com/bug.php?id=52711",
"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://secunia.com/advisories/42875",
"http://secunia.com/advisories/42936",
"http://support.apple.com/kb/HT4723",
"http://www.debian.org/security/2011/dsa-2143",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
"http://www.openwall.com/lists/oss-security/2010/09/28/10",
"http://www.redhat.com/support/errata/RHSA-2010-0825.html",
"http://www.redhat.com/support/errata/RHSA-2011-0164.html",
"http://www.securityfocus.com/bid/42599",
"http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
"http://www.ubuntu.com/usn/USN-1017-1",
"http://www.ubuntu.com/usn/USN-1397-1",
"http://www.vupen.com/english/advisories/2011/0105",
"http://www.vupen.com/english/advisories/2011/0133",
"http://www.vupen.com/english/advisories/2011/0170",
"http://www.vupen.com/english/advisories/2011/0345",
"https://bugzilla.redhat.com/show_bug.cgi?id=628328",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2015-2575": {
"id": "CVE-2015-2575",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
"http://www.debian.org/security/2016/dsa-3621",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74075",
"http://www.securitytracker.com/id/1032121",
"https://security.netapp.com/advisory/ntap-20150417-0003/",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
"http://www.debian.org/security/2016/dsa-3621",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74075",
"http://www.securitytracker.com/id/1032121",
"https://security.netapp.com/advisory/ntap-20150417-0003/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-15945": {
"id": "CVE-2017-15945",
"references": [
"https://bugs.gentoo.org/630822",
"https://security.gentoo.org/glsa/201711-04"
],
"score": 7.8,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-732"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
}
}
}