Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.16.226.220

SummaryCVE DetailsRaw Data
10 Feb 2026, 18:46:41 UTC
{
  "scan_id": 1770546824,
  "ip": "182.16.226.220",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.16.224.0/21",
    "postal_code": "",
    "coordinates": {
      "latitude": "35.69",
      "longitude": "139.69"
    },
    "geo_point": "35.69, 139.69",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "JP",
    "country_name": "Japan",
    "city": ""
  },
  "location_updated_at": "2026-02-09T16:44:12Z",
  "asn": {
    "number": "AS37916",
    "organization": "A.T.WORKS, Inc.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.16.224.0/21",
    "organization": "A.T.WORKS,Inc.",
    "descr": "A.T.WORKS,Inc.,\n4-5, Ushijima shimmachi, Toyama-shi, Toyama 930-0856, Japan",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:49Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-02-09T16:44:12Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-02-09T17:34:52Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-02-09T16:44:12Z"
    }
  ],
  "hostnames": [
    {
      "name": "shr11.digitalink.ne.jp",
      "last_updated_at": "2026-02-09T17:34:52Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T19:10:50.539Z"
    },
    {
      "port": 22,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T04:06:08.321Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 shr11.digitalink.ne.jp ESMTP Postfix\r\n"
        },
        "tls": {
          "certificate": {
            "fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
            "fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
            "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
            "issuer": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1318987235",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "plesk"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2012-10-18T01:20:35",
              "not_before": "2011-10-19T01:20:35"
            }
          },
          "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
          "precert": false,
          "raw": "MIIDgzCCAmsCBE6eJeMwDQYJKoZIhvcNAQEFBQAwgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMB4XDTExMTAxOTAxMjAzNVoXDTEyMTAxODAxMjAzNVowgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuKf+NO/DJ2YQjlnyw/l8XP2zH/5KBG/OL8OlbUPRlJsJlungU5keMflzAziNO6A1iSmOXvkIfojXsLjyNFDDcDGiEoQplJ613P0WFtS6XsjYdkk5ZnvnVwTaac/mhj81VSvlVDW8vBzwmDNRF5wdaua/IQH78NKxy0nsWLfrjt839Q5mxvdO6x5qyKSit9X6QPGsZhxAr/ljh5VIkNLpeGL+Okt64vHXs/Swq0A0XIq9FIycaOZQApzGyywOJ6eQmxACDggHYp7VVAPqDwhJWTPoPk4nNXN3F+wlBHCAneI1jhYPBr5/2mwPfDYT8IoXs8pIMXTNoEtzlbbPeJzCWQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQBshv+0HMvsdhDgw50cTD+KRhIRHvMdCPdjfK1p/PMiTMZCiAi7uQn15ogTfpEm1kWtPtQrMrCCp4F/nax3C92c4GMlqERGIYY45lr/hR6vQJDcKUB1+fD3r1MCJdobhbWeBcx6ImCaCBHQF441speWehcnEr6qlKD2TdC+OIdhvgjSys1mKc3BB0LmF/b/05TwQIHM8SVLTfVuEJRWCaili86gphz+xQmC4LmQt8hjkHMLbvquAA0XCutji5JQc09NIocImgLvVtidicPT5ep+lEvGITe4hPflVTrGIbN1aZ9AfslBT48tXswJdca6Dr0vRiiPWD0jvdoDU/GFabrf",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T00:17:37.473Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache httpd",
      "extra_info": "PleskLin",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<html>\n<head>\n<title>301 Moved Permanently</title>\n<meta http-equiv=\"Content-type\" content=\"text/html; charset=Shift_JIS\">\n<meta http-equiv=\"refresh\" CONTENT=\"0;URL=http://www.digitalink.ne.jp/\">\n<meta name=\"robots\" content=\"INDEX,NOFOLLOW\">\n</head>\n<body></body>\n</html>\n",
          "body_murmur": 814893998,
          "body_sha256": "647b77dc8f86673bdccc02ba4528b121413df5d6f16a0ea65f54107a0e96bb5e",
          "component": [
            "Apache HTTP Server"
          ],
          "content_length": 272,
          "favicon": {
            "md5_hash": "1ce0c63f8bd1e5d3376ec0ae95a41c08",
            "murmur_hash": -652508439,
            "path": "http://182.16.226.220:80/favicon.ico",
            "size": 17542
          },
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "272"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sun, 01 Feb 2026 07:06:56 GMT"
            ],
            "etag": [
              "\"12a853-110-50c347c0\""
            ],
            "last_modified": [
              "Tue, 11 Jul 2017 10:39:35 GMT"
            ],
            "server": [
              "Apache"
            ],
            "x_powered_by": [
              "PleskLin"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.16.226.220",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "301 Moved Permanently"
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0070",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1199",
          "score": 10,
          "severity": "high"
        },
        {
          "id": "CVE-2023-25690",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "http://182.16.226.220/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T07:06:57.709Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Courier pop3d",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "pop3": {
          "banner": "+OK Hello there. <[email protected]>\r\n"
        },
        "tls": {
          "certificate": {
            "fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
            "fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
            "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
            "issuer": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1318987235",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "plesk"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2012-10-18T01:20:35",
              "not_before": "2011-10-19T01:20:35"
            }
          },
          "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-02T08:17:39.24Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "imap",
      "version": "",
      "product": "Courier Imapd",
      "extra_info": "released 2004",
      "tunnel": "",
      "modules": {
        "imap": {
          "banner": "* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA IDLE ACL ACL2=UNION STARTTLS] Courier-IMAP ready. Copyright 1998-2004 Double Precision, Inc.  See COPYING for distribution information.\r\n"
        },
        "tls": {
          "certificate": {
            "fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
            "fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
            "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
            "issuer": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1318987235",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "plesk"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2012-10-18T01:20:35",
              "not_before": "2011-10-19T01:20:35"
            }
          },
          "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
          "precert": false,
          "raw": "MIIDgzCCAmsCBE6eJeMwDQYJKoZIhvcNAQEFBQAwgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMB4XDTExMTAxOTAxMjAzNVoXDTEyMTAxODAxMjAzNVowgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuKf+NO/DJ2YQjlnyw/l8XP2zH/5KBG/OL8OlbUPRlJsJlungU5keMflzAziNO6A1iSmOXvkIfojXsLjyNFDDcDGiEoQplJ613P0WFtS6XsjYdkk5ZnvnVwTaac/mhj81VSvlVDW8vBzwmDNRF5wdaua/IQH78NKxy0nsWLfrjt839Q5mxvdO6x5qyKSit9X6QPGsZhxAr/ljh5VIkNLpeGL+Okt64vHXs/Swq0A0XIq9FIycaOZQApzGyywOJ6eQmxACDggHYp7VVAPqDwhJWTPoPk4nNXN3F+wlBHCAneI1jhYPBr5/2mwPfDYT8IoXs8pIMXTNoEtzlbbPeJzCWQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQBshv+0HMvsdhDgw50cTD+KRhIRHvMdCPdjfK1p/PMiTMZCiAi7uQn15ogTfpEm1kWtPtQrMrCCp4F/nax3C92c4GMlqERGIYY45lr/hR6vQJDcKUB1+fD3r1MCJdobhbWeBcx6ImCaCBHQF441speWehcnEr6qlKD2TdC+OIdhvgjSys1mKc3BB0LmF/b/05TwQIHM8SVLTfVuEJRWCaili86gphz+xQmC4LmQt8hjkHMLbvquAA0XCutji5JQc09NIocImgLvVtidicPT5ep+lEvGITe4hPflVTrGIbN1aZ9AfslBT48tXswJdca6Dr0vRiiPWD0jvdoDU/GFabrf",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-31T10:59:05.71Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "<html>\n<head>\n<title>301 Moved Permanently</title>\n<meta http-equiv=\"Content-type\" content=\"text/html; charset=Shift_JIS\">\n<meta http-equiv=\"refresh\" CONTENT=\"0;URL=http://www.digitalink.ne.jp/\">\n<meta name=\"robots\" content=\"INDEX,NOFOLLOW\">\n</head>\n<body></body>\n</html>\n",
          "body_murmur": 814893998,
          "body_sha256": "647b77dc8f86673bdccc02ba4528b121413df5d6f16a0ea65f54107a0e96bb5e",
          "component": [
            "Apache HTTP Server"
          ],
          "content_length": 272,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "272"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Tue, 10 Feb 2026 14:30:12 GMT"
            ],
            "etag": [
              "\"12a867-110-50c347c0\""
            ],
            "last_modified": [
              "Tue, 11 Jul 2017 10:39:35 GMT"
            ],
            "server": [
              "Apache"
            ],
            "x_powered_by": [
              "PleskLin"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.16.226.220",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "301 Moved Permanently"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://repo.pubcert.jprs.jp/sppca/jprs/dvca_g4/JPRS_DVCA_G4_DER.cer"
                ],
                "ocsp_urls": [
                  "http://dv.g4.ocsp.pubcert.jprs.jp"
                ]
              },
              "authority_key_id": "7c24ce0da4382dc7b3635ea7787a8d1d4c2ec715",
              "certificate_policies": [
                {
                  "cps": [
                    "http://jprs.jp/pubcert/info/repository/"
                  ],
                  "id": "1.3.6.1.4.1.53827.1.1.4"
                },
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://repo.pubcert.jprs.jp/sppca/jprs/dvca_g4/fullcrl.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:\n                03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E\n    Timestamp : Nov 27 00:41:17.603 2022 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:1E:EE:76:F3:C5:2C:06:EE:69:35:99:D6:\n                05:DE:19:44:13:AA:E3:0A:D4:0A:C5:BA:0A:1C:80:EA:\n                EA:4D:1B:D4:02:21:00:9E:AF:DE:90:5C:6F:1E:96:0A:\n                D8:0E:CF:1B:8C:CB:AF:DF:D1:ED:C2:21:6F:B7:95:A2:\n                10:A2:54:E9:74:86:04\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:\n                B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A\n    Timestamp : Nov 27 00:41:19.098 2022 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:69:08:D9:A9:CA:DA:0E:F8:01:D5:1F:3C:\n                E6:A3:B6:C9:61:D6:30:46:21:F6:83:CA:45:42:B7:85:\n                04:01:99:F8:02:20:00:EE:BE:AD:01:F8:05:82:00:06:\n                EB:0F:97:1A:D8:35:73:43:98:5C:32:ED:11:04:8C:2A:\n                64:74:C5:7D:63:43\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09:\n                4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A\n    Timestamp : Nov 27 00:41:19.872 2022 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:57:9D:48:56:64:09:1B:E2:CC:DB:0D:1A:\n                C0:EB:7B:B7:53:56:96:5A:74:77:4D:A8:64:51:E2:7D:\n                77:8E:AB:B0:02:20:4D:BA:40:3E:C6:A4:BD:96:5B:35:\n                B5:82:56:4A:96:91:2F:7D:F3:83:07:09:32:85:03:CA:\n                19:76:7A:37:40:0B\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 7A:32:8C:54:D8:B7:2D:B6:20:EA:38:E0:52:1E:E9:84:\n                16:70:32:13:85:4D:3B:D2:2B:C1:3A:57:A3:52:EB:52\n    Timestamp : Nov 27 00:41:20.346 2022 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:23:7C:C8:9B:BD:CC:3A:92:C9:A1:B4:DA:\n                DD:BD:85:05:7C:DD:8B:4B:DB:95:47:5A:22:57:A1:E1:\n                AE:FC:B5:49:02:21:00:BA:CE:9B:5F:C3:EB:C2:95:EE:\n                05:D8:9C:19:81:A4:BB:B8:BE:CB:1C:D2:90:55:EF:AC:\n                F3:35:78:B5:23:AA:91",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ssl.shr11.digitalink.ne.jp"
                ]
              },
              "subject_key_id": "6513966bb88f8261295f8660510d1e12edd17d33"
            },
            "fingerprint_md5": "20DE3166661DBF1C2E95A8D5EFB1442B",
            "fingerprint_sha1": "F583E23F6C62054335C4FEE96BED66070E13816F",
            "fingerprint_sha256": "7441E1AA6875EE7B3E35364CE85258C40778632EEBC03BE23869553FB9DE2938",
            "issuer": {
              "common_name": [
                "JPRS Domain Validation Authority - G4"
              ],
              "country": [
                "JP"
              ],
              "organization": [
                "Japan Registry Services Co., Ltd."
              ]
            },
            "issuer_dn": "/C=JP/O=Japan Registry Services Co., Ltd./CN=JPRS Domain Validation Authority - G4",
            "jarm": "05b02b09b04b04b05b05b02b05b04bd7fc4c7c6ef19b77a4ca0787979cdc13",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2026-02-14T06:09:14",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2026-02-14T06:09:14",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "41061256262959263337412196679202164424",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "e83ed0da3ef5063532e75728bc896bc903d3cbd1116beceb69e1777d6d06bd6e",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502201eee76f3c52c06ee693599d605de194413aae30ad40ac5ba0a1c80eaea4d1bd40221009eafde905c6f1e960ad80ecf1b8ccbafdfd1edc2216fb795a210a254e9748604"
                },
                "timestamp": "2022-11-27T00:41:17.603000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "adf7befa7cff10c88b9d3d9c1e3e186ab467295dcfb10c24ca858634ebdc828a",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304402206908d9a9cada0ef801d51f3ce6a3b6c961d6304621f683ca4542b785040199f8022000eebead01f805820006eb0f971ad8357343985c32ed11048c2a6474c57d6343"
                },
                "timestamp": "2022-11-27T00:41:19.098000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "b3737707e18450f86386d605a9dc11094a792db1670c0b87dcf0030e7936a59a",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "30440220579d485664091be2ccdb0d1ac0eb7bb75356965a74774da86451e27d778eabb002204dba403ec6a4bd965b35b582564a96912f7df3830709328503ca19767a37400b"
                },
                "timestamp": "2022-11-27T00:41:19.872000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "7a328c54d8b72db620ea38e0521ee98416703213854d3bd22bc13a57a352eb52",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "30450220237cc89bbdcc3a92c9a1b4daddbd85057cdd8b4bdb95475a2257a1e1aefcb549022100bace9b5fc3ebc295ee05d89c1981a4bbb8becb1cd29055efacf33578b523aa91"
                },
                "timestamp": "2022-11-27T00:41:20.346000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "ssl.shr11.digitalink.ne.jp"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ssl.shr11.digitalink.ne.jp"
              ],
              "extended_dns_names": [
                {
                  "domain": "digitalink",
                  "fld": "digitalink.ne.jp",
                  "subdomain": "ssl.shr11",
                  "tld": "ne.jp"
                }
              ]
            },
            "subject_dn": "/CN=ssl.shr11.digitalink.ne.jp",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "06b3c21e3af65f0eb93e41beae742138aa5eb39293e6f959be9d21eed3d84c12",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "0f6fbd8a4f6d0f519207da93f762938feb9294f423de4ff04bd5679be876a073",
            "tbs_noct_fingerprint": "bd922649020c5c87565cebecc9770f12ffab4bf2ed3bea754daca9197f7b99fa",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31847322,
              "not_after": "2023-11-30T14:59:59",
              "not_before": "2022-11-27T00:31:17"
            },
            "version": 2
          },
          "fingerprint_sha256": "7441E1AA6875EE7B3E35364CE85258C40778632EEBC03BE23869553FB9DE2938",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv"
          ]
        }
      },
      "url": "https://182.16.226.220/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T18:35:24.895Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T19:37:47.007Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 shr11.digitalink.ne.jp ESMTP Postfix\r\n"
        },
        "tls": {
          "certificate": {
            "fingerprint_md5": "A7D8D4053EC5962FD95368C65B60FEC6",
            "fingerprint_sha1": "6D7BD2BD372C7D791361758A9DA249446AD2F113",
            "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
            "issuer": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "issuer_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1318987235",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "plesk"
              ],
              "country": [
                "US"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "Herndon"
              ],
              "organization": [
                "Parallels"
              ],
              "organizational_unit": [
                "Plesk"
              ],
              "province": [
                "Virginia"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "plesk"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/C=US/ST=Virginia/L=Herndon/O=Parallels/OU=Plesk/CN=plesk/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fc4adaa6c595a7701aabe6a31dd69b62d4cb47dd3f6932d8266afb7ef03270a8",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "41a5099c0fb6aa60144dad281725f43b5bab808c7e217dd136cd3b4b0b4722bd",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2012-10-18T01:20:35",
              "not_before": "2011-10-19T01:20:35"
            }
          },
          "fingerprint_sha256": "452E97D73BB3C8D35D6B664DA36AC5D9AA2EB20F85AE1E14E964940C31BB390D",
          "precert": false,
          "raw": "MIIDgzCCAmsCBE6eJeMwDQYJKoZIhvcNAQEFBQAwgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMB4XDTExMTAxOTAxMjAzNVoXDTEyMTAxODAxMjAzNVowgYUxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhWaXJnaW5pYTEQMA4GA1UEBxMHSGVybmRvbjESMBAGA1UEChMJUGFyYWxsZWxzMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFcGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuKf+NO/DJ2YQjlnyw/l8XP2zH/5KBG/OL8OlbUPRlJsJlungU5keMflzAziNO6A1iSmOXvkIfojXsLjyNFDDcDGiEoQplJ613P0WFtS6XsjYdkk5ZnvnVwTaac/mhj81VSvlVDW8vBzwmDNRF5wdaua/IQH78NKxy0nsWLfrjt839Q5mxvdO6x5qyKSit9X6QPGsZhxAr/ljh5VIkNLpeGL+Okt64vHXs/Swq0A0XIq9FIycaOZQApzGyywOJ6eQmxACDggHYp7VVAPqDwhJWTPoPk4nNXN3F+wlBHCAneI1jhYPBr5/2mwPfDYT8IoXs8pIMXTNoEtzlbbPeJzCWQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQBshv+0HMvsdhDgw50cTD+KRhIRHvMdCPdjfK1p/PMiTMZCiAi7uQn15ogTfpEm1kWtPtQrMrCCp4F/nax3C92c4GMlqERGIYY45lr/hR6vQJDcKUB1+fD3r1MCJdobhbWeBcx6ImCaCBHQF441speWehcnEr6qlKD2TdC+OIdhvgjSys1mKc3BB0LmF/b/05TwQIHM8SVLTfVuEJRWCaili86gphz+xQmC4LmQt8hjkHMLbvquAA0XCutji5JQc09NIocImgLvVtidicPT5ep+lEvGITe4hPflVTrGIbN1aZ9AfslBT48tXswJdca6Dr0vRiiPWD0jvdoDU/GFabrf",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T23:38:50.659Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "imap",
      "version": "",
      "product": "Courier Imapd",
      "extra_info": "released 2004",
      "tunnel": "ssl",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T01:37:53.243Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Courier pop3d",
      "extra_info": "",
      "tunnel": "ssl",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T18:46:41.055Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.0.77",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.0.77",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.0\\.77",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.0.77"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-5925",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2009-0819",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2009-4028",
          "score": 6.8,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T20:51:28.84Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T03:56:17.647Z"
    }
  ],
  "services_hash": "79000b391f4a4e96b03b20096a92458e7796888faf85832e38feec177ce1bd59",
  "last_updated_at": "2026-02-10T18:46:41.055Z",
  "banner": [
    "mysql",
    "smtp",
    "tls",
    "http",
    "pop3",
    "imap"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0070": {
      "id": "CVE-1999-0070",
      "references": [
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "test-cgi program allows an attacker to list files on the server.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-1999-1199": {
      "id": "CVE-1999-1199",
      "references": [
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 10,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2007-5925": {
      "id": "CVE-2007-5925",
      "references": [
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html",
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2009-0819": {
      "id": "CVE-2009-0819",
      "references": [
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544",
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2009-4028": {
      "id": "CVE-2009-4028",
      "references": [
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510",
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2010-1621": {
      "id": "CVE-2010-1621",
      "references": [
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2010-1626": {
      "id": "CVE-2010-1626",
      "references": [
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490",
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
      ],
      "score": 3.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2010-3677": {
      "id": "CVE-2010-3677",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688",
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3682": {
      "id": "CVE-2010-3682",
      "references": [
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684",
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2015-2575": {
      "id": "CVE-2015-2575",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-15945": {
      "id": "CVE-2017-15945",
      "references": [
        "https://bugs.gentoo.org/630822",
        "https://security.gentoo.org/glsa/201711-04"
      ],
      "score": 7.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.",
      "vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-732"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-27522": {
      "id": "CVE-2023-27522",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    }
  }
}