182.160.17.247
{
"scan_id": 1763609656,
"ip": "182.160.17.247",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.160.16.0/23",
"postal_code": "2001",
"coordinates": {
"latitude": "-26.2309",
"longitude": "28.0583"
},
"geo_point": "-26.2309, 28.0583",
"locale_code": "en",
"continent": "Africa",
"country_code": "ZA",
"country_name": "South Africa",
"city": "Johannesburg"
},
"location_updated_at": "2025-11-21T12:47:53Z",
"asn": {
"number": "AS136907",
"organization": "HUAWEI CLOUDS",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.160.0.0/18",
"organization": "HUAWEI INTERNATIONAL PTE. LTD.",
"descr": "HUAWEI INTERNATIONAL PTE. LTD.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:16Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-11-21T12:47:53Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-11-21T15:07:43Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-11-21T12:47:53Z"
}
],
"hostnames": [
{
"name": "ecs-182-160-17-247.compute.hwclouds-dns.com",
"last_updated_at": "2025-11-22T10:26:31.433704224Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "6.4",
"product": "OpenBSD ftpd",
"extra_info": "Linux port 0.17",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:ftpd:6.4",
"part": "a",
"vendor": "openbsd",
"product": "ftpd",
"version": "6\\.4",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 Network-Camera FTP server (Version 6.4/OpenBSD/Linux-ftpd-0.17) ready.\r\n"
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T01:23:00.87Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.1p1 Ubuntu 2ubuntu2.8-de2fd55d",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.1p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.1p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.1p1 Ubuntu-2ubuntu2.8-fc093002",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"aes192-cbc",
"aes256-cbc",
"blowfish-cbc",
"3des-cbc"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"hmac-sha2-256",
"hmac-sha2-512",
"[email protected]",
"[email protected]",
"hmac-sha1",
"hmac-md5",
"hmac-sha1-96",
"hmac-md5-96"
],
"host_key_algorithms": [
"ssh-rsa"
],
"kex_algorithms": [
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group16-sha512",
"diffie-hellman-group14-sha256",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "668ecc2fce8eabab78a990ca9c206f0ee2d95149fd2ece0a9e1a3a4104a28ef1",
"raw": "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"
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"aes192-cbc",
"aes256-cbc",
"blowfish-cbc",
"3des-cbc"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"hmac-sha2-256",
"hmac-sha2-512",
"[email protected]",
"[email protected]",
"hmac-sha1",
"hmac-md5",
"hmac-sha1-96",
"hmac-md5-96"
],
"software": "OpenSSH_9.1p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-28531",
"score": 9.8,
"severity": "critical"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T10:25:52.345Z"
},
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "BusyBox telnetd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:busybox:busybox",
"part": "a",
"vendor": "busybox",
"product": "busybox",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"telnet": {
"banner": "Welcome to DVR-166 Board. \r\nLogin: "
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T15:01:19.172Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp-proxy",
"version": "",
"product": "ESET NOD32 anti-virus smtp proxy",
"extra_info": "",
"tunnel": "",
"modules": {
"smtp": {
"banner": "220 mail.freemail.org ESMTP Service ready\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T09:17:39.943Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html class=\"main-app\">\n<head>\n\t<meta charset=\"UTF-8\">\n\t<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n\t<meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n\t<base href=\"/\">\n\t<title ng-bind=\"'FortiWeb - ' + deviceState.admin.hostname\"></title>\n\n\t<link rel=\"stylesheet\" type=\"text/css\" href=\"ftnt_shared/css/ftnt_shared_mariner.css?_q=30479\">\n\t<link rel=\"stylesheet\" type=\"text/css\" href=\"css/app.min.css?_q=30479\">\n\n\t<script>\n\t\t// access to CONFIG_GUI_NO\n\t\twindow.CONFIG_GUI_NO = '30479';\n\t</script>\n\n\t<script src=\"app.min.js?_q=30479\"></script>\n\n</head>\n\n<body ui-view></body>\n\n</html>\n\n",
"body_murmur": -1344134987,
"body_sha256": "a7c250aba116560e95cd6823e7029cbe33724e78cdb7fe0125bcf68e742d3785",
"content_length": -1,
"favicon": {
"md5_hash": "e462005902f81094ab3de44e4381de19",
"murmur_hash": 945408572,
"path": "http://182.160.17.247:80/favicon.ico",
"size": 318
},
"headers": {
"accept_ranges": [
"bytes"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 17 Nov 2025 17:09:03 GMT"
],
"last_modified": [
"Wed, 04 Aug 2021 02:06:50 GMT"
],
"strict_transport_security": [
"max-age=63072000"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247",
"path": "",
"scheme": "http"
}
},
"status_code": 200
}
},
"url": "http://182.160.17.247/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T17:14:07.099Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "MailEnable POP3 Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mailenable:mailenable",
"part": "a",
"vendor": "mailenable",
"product": "mailenable",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"pop3": {
"banner": "+OK Welcome to MailEnable POP3 Server\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T04:29:46.364Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"imap": {
"banner": "* OK IMAP4rev1 server ready\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T04:42:24.204Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Citrix NetScaler SSL VPN",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XDEV_HTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\r\n<title>Netscaler Gateway</title>\r\n<link rel=\"SHORTCUT ICON\" href=\"/vpn/images/AccessGateway.ico\" type=\"image/vnd.microsoft.icon\">\r\n<META http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\">\r\n<META content=noindex,nofollow,noarchive name=robots>\r\n<link href=\"/vpn/js/rdx/core/css/rdx.css\" rel=\"stylesheet\" type=\"text/css\"/>\r\n<link href=\"/logon/themes/Default/css/base.css\" rel=\"stylesheet\" type=\"text/css\" media=\"screen\" />\r\n<link rel=\"stylesheet\" href=\"/logon/fonts/citrix-fonts.css\" type=\"text/css\">\r\n<link href=\"/logon/themes/Default/css/custom.css\" rel=\"stylesheet\" type=\"text/css\"/>\r\n<script type=\"text/javascript\" src=\"/vpn/js/rdx.js\"></script>\r\n<script type=\"text/javascript\" src=\"/vpn/login.js\"></script>\r\n<script type=\"text/javascript\" src=\"/vpn/js/views.js\"></script>\r\n<script type=\"text/javascript\" src=\"/vpn/js/gateway_login_view.js\"></script>\r\n<script type=\"text/javascript\" src=\"/vpn/js/gateway_login_form_view.js\"></script> \r\n<style type=\"text/css\">\r\nbody\r\n{\r\n display : none;\r\n visibility: hidden;\r\n}\r\n</style>\r\n<SCRIPT language=JavaScript>\r\n// frame-busting script\r\nfunction changePage()\r\n{\r\n\tif( self == top ) {\r\n \t\t document.getElementsByTagName(\"body\")[0].style.display = 'block' ;\r\n\t\t document.getElementsByTagName(\"body\")[0].style.visibility = 'visible' ;\r\n\t\t ns_fillName();\r\n\t} else {\r\n \t\ttop.location = self.location ;\r\n\t}\r\n\r\n}\r\nfunction setFocus(obj)\r\n{\r\n if (obj != null) {\r\n obj.focus();\r\n }\r\n}\t\t\t\r\n//-->\r\n</SCRIPT>\r\n<script type=\"text/javascript\" src=\"/vpn/resources.js\"></script>\r\n<script type=\"text/javascript\" language=\"javascript\">\r\nvar Resources = new ResourceManager(\"/logon/themes/Default/resources/{lang}\", \"logon\");\r\nvar eula = new ResourceManager(\"/logon/themes/EULA/resources/{lang}\",\"custom_strings\");\r\n</script>\r\n<script type=\"text/javascript\" src=\"/vpn/nsshare.js\"></script>\r\n<META content=\"MSHTML 6.00.2900.2802\" name=GENERATOR>\r\n</head>\r\n<body class=\"ns_body\" id=bodyTag>\r\n<!-- Copyright 2001-2005 Citrix Systems, Inc. All Rights Reserved -->\r\n<NOSCRIPT>\r\n<BR><BR>\r\n<table style=\"WIDTH: 100%\">\r\n<tr>\r\n \t<td align=\"center\">\r\n\t\t<table class=\"CTXMSAM_LogonFont\">\r\n\t\t\t<tr id=\"errorMessageRow\">\r\n\t\t\t\t<td class=\"glowBoxLeft\"> </td> \r\n\t\t\t\t<td class=\"loginTableMidWidth\">\r\n\t\t\t\t\t<div id=\"feedbackArea\">\r\n\t\t\t\t\t<div id=\"feedbackStyle\" class=\"feedbackStyleError\">\r\n\t\t\t\t\t<span id=\"errorMessageLabel\" class=\"messageStyle\">\r\n\t\t\t\t\tJavaScript is either disabled in or not supported by the Web browser. \r\n\t\t\t\t\tTo continue logon, use a Web browser that supports JavaScript or enable JavaScript in your current browser.\r\n\t\t\t\t\t</span>\r\n\t\t\t\t\t</div>\r\n\t\t\t\t\t</div>\r\n\t\t\t\t</td> \r\n\t\t\t\t<td class=\"glowBoxRight\"> </td>\r\n\t\t\t</tr>\r\n\t\t</table>\r\n\t</td>\r\n</tr>\r\n</table>\r\n\r\n<table style=\"display:none\">\r\n</NOSCRIPT>\r\n<script>\r\nrdx.FRAMEWORK_BASE = \"/vpn/js\";\r\nrdx.page.add_event_handler(rdx.events.PAGE_LOADED, new rdx.callback(login, login.do_action_on_load));\r\n\r\n$(window).load(function(){randomize(); \r\n\t\t\t\t\t\t\tresize();});\r\n$(window).resize(function(){resize();});\r\n</script>\r\n</body>\r\n</html>\r\n",
"body_murmur": -116402063,
"body_sha256": "0af866c95b5e1426031f23356b1aa78441935ef4ad34b7bf4a1dc42278d77330",
"component": [
"Apache HTTP Server"
],
"content_length": -1,
"favicon": {
"md5_hash": "4eaaa139063e6706d1b5d0eee833d47b",
"murmur_hash": -1166125415,
"path": "https://182.160.17.247:443/vpn/images/AccessGateway.ico",
"size": 1150
},
"headers": {
"accept_ranges": [
"bytes"
],
"age": [
"1"
],
"cache_control": [
"no-cache, no-store, must-revalidate"
],
"connection": [
"keep-alive"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Fri, 21 Nov 2025 10:51:37 GMT"
],
"etag": [
"\"4fa-231a-5796234945c40\""
],
"last_modified": [
"Tue, 21 May 2019 09:45:13 GMT"
],
"server": [
"Apache"
],
"set_cookie": [
"pwcount=0;Secure;HttpOnly;Path=/;expires=Wednesday, 09-Nov-1999 23:12:40 GMT"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=15, max=100"
]
}
],
"via": [
"NS-CACHE-10.0: 101"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html><head><META HTTP-EQUIV=\"Content-Type\" CONTENT=\"text/html; charset=UTF-8\"><script type=\"text/javascript\" src=\"/vpn/resources.js\"></script><script type=\"text/javascript\" language=\"javascript\">var Resources = new ResourceManager(\"/logon/themes/Default/resources/{lang}\", \"REDIRECTION_BODY\");</script></head><body><span id=\"This object may be found \"></span><a href=\"/vpn/index.html\"><span id=\"here\"></span></a><span id=\"Trailing phrase after here\"></span><script type=\"text/javascript\" language=\"javascript\">Resources.Load();</script></body></html>",
"body_murmur": -352523558,
"body_sha256": "e48a39819c6923ffb26bd625ea10e0e41c7367959537ac17eb8aac86df8d372c",
"content_length": -1,
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"location": [
"/vpn/index.html"
],
"pragma": [
"no-cache"
],
"set_cookie": [
"NSC_AAAC=xyz;Path=/;expires=Wednesday, 09-Nov-1999 23:12:40 GMT;Secure"
]
},
"location": "/vpn/index.html",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Object Moved"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://182.160.17.247"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247",
"path": "/vpn/index.html",
"scheme": "https"
}
},
"status_code": 200,
"title": "Netscaler Gateway"
},
"tls": {
"certificate": {
"fingerprint_md5": "86ADE6315CA7B846C9C18CE513D53650",
"fingerprint_sha1": "88C89009DD3D0DE5DCBA3C76D811149784E7E7D6",
"fingerprint_sha256": "0D7BE5B7780280047CF2BD01F046AE8CCBF08A33CAA5DA4A5AA1D0FFDFE907CC",
"issuer": {
"country": [
"US"
],
"locality": [
"Irvine"
],
"province": [
"Califomia"
]
},
"issuer_dn": "/C=US/ST=Califomia/L=Irvine",
"jarm": "2ad2ad0002ad2ad22c42d42d000000faabb8fd156aa8b4d8a37853e1063261",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "891",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"country": [
"US"
],
"locality": [
"Irvine"
],
"province": [
"Califomia"
]
},
"subject_alt_name": {
"extended_dns_names": []
},
"subject_dn": "/C=US/ST=Califomia/L=Irvine",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "0f78d70c4da7d46fcb90b98aa5268f5e2efce22934841d1b28d5275187ba43c8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "08b49545cbb8e2eb8b9fd5e5c2dc31529ef43eb2b272b644b5785c26ae6b52fc",
"validation_level": "OV",
"validity": {
"length_seconds": 315619200,
"not_after": "2028-09-19T14:00:00",
"not_before": "2018-09-19T14:00:00"
},
"version": 2
},
"fingerprint_sha256": "0D7BE5B7780280047CF2BD01F046AE8CCBF08A33CAA5DA4A5AA1D0FFDFE907CC",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed"
]
}
},
"url": "https://182.160.17.247/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T16:56:05.584Z"
},
{
"port": 445,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smb": {
"capabilities": [],
"negotiation": [],
"smbv1_support": true,
"version": "1.0.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T08:17:08.574Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:465",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:465/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T23:57:12.232Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:587",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:587/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T06:28:42.638Z"
},
{
"port": 631,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\" >\n<html><head><link rel=\"stylesheet\" href=\"styles.css\">\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\">\n<title>Intel® Active Management Technology</title></head>\n<body>\n<table class=\"header\">\n<tr><td valign=\"top\" nowrap=\"nowrap\">\n<p class=\"top1\">Intel<font class=\"r\"><sup>®</sup></font> Active Management Technology</td>\n<td valign=\"top\"><img src=\"logo.gif\" align=\"right\" alt=\"Intel\"></td></tr>\n</table>\n\n<h1>Log On</h1>\n<P>Log on to Intel® Active Management Technology on this computer.</p>\n<P><form METHOD=\"GET\" action=\"index.htm\"><h2><input type=\"submit\" value=\" Log On... \">\n</h2></form></p></body></html>\n",
"body_murmur": 998037014,
"body_sha256": "cc1c46859af3010e3212d9fb00e8d25d532f4e7f7ed27fbadf98517a5bd38d62",
"component": [
"Intel Active Management Technology:9.0.2"
],
"content_length": 706,
"headers": {
"content_length": [
"706"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Sat, 22 Nov 2025 04:39:43 GMT"
],
"server": [
"Intel(R) Active Management Technology 9.0.2"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:631",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Intel® Active Management Technology"
}
},
"url": "http://182.160.17.247:631/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T04:44:53.473Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:993",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:993/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T05:33:37.617Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:995",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:995/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T01:36:18.268Z"
},
{
"port": 1234,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:1234",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:1234/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T03:35:35.963Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "12.00.2000",
"product": "Microsoft SQL Server 2014",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2014",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2014",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2015-1761",
"score": 6.5,
"severity": "medium"
},
{
"id": "CVE-2015-1762",
"score": 7.1,
"severity": "high"
},
{
"id": "CVE-2015-1763",
"score": 8.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T13:23:46.071Z"
},
{
"port": 1434,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:1434",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:1434/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T02:54:32.002Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:1883",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:1883/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T15:20:10.925Z"
},
{
"port": 1911,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:1911",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:1911/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T11:35:51.145Z"
},
{
"port": 2181,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:2181",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:2181/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T03:44:49.952Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:2525",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:2525/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T16:23:55.627Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "8.0.32",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:8.0.32",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "8\\.0\\.32",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "8.0.32"
},
"tls": {
"certificate": {
"fingerprint_md5": "7F97EDF0E173D5DA51E810F0680EB3F1",
"fingerprint_sha1": "BB4B31678F2794F90539B50F2DC026DA428B0D35",
"fingerprint_sha256": "7CCB033C47F7B0386851EB7D0EF42AB11431A04F07EE2F7E87C127365CACE45A",
"issuer": {
"common_name": [
"Amazon"
],
"country": [
"US"
],
"locality": [
"Irvine"
],
"organization": [
"Amazon "
],
"organizational_unit": [
"Server CA 1B "
],
"province": [
"Califomia"
]
},
"issuer_dn": "/C=US/O=Amazon /CN=Amazon/ST=Califomia/L=Irvine/OU=Server CA 1B ",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "41391",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"Amazon"
],
"country": [
"US"
],
"locality": [
"Irvine"
],
"organization": [
"Amazon "
],
"organizational_unit": [
"Server CA 1B "
],
"province": [
"Califomia"
]
},
"subject_alt_name": {
"dns_names": [
"Amazon"
],
"extended_dns_names": [
{
"domain": "amazon",
"fld": "amazon",
"tld": "amazon"
}
]
},
"subject_dn": "/C=US/O=Amazon /CN=Amazon/ST=Califomia/L=Irvine/OU=Server CA 1B ",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "2d12b41eaa32d5f0eb1dbedac6583248415bc3f87b5aede727a69881e68b1159",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "61133875cdf873609033c831d32cd3c2fd1a403a27cc5875b8f1d36b4d2d5182",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2030-03-19T14:00:00",
"not_before": "2020-03-19T14:00:00"
},
"version": 2
},
"fingerprint_sha256": "7CCB033C47F7B0386851EB7D0EF42AB11431A04F07EE2F7E87C127365CACE45A",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T21:57:00.369Z"
},
{
"port": 4891,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:4891",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:4891/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T19:47:05.748Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "{\"message\":\"page not found\"}\n",
"body_murmur": 1561587376,
"body_sha256": "829fb0d182a27ce543e0419b1b55cd21b2138b028a511b824a42b4dfdebb7f6e",
"content_length": 29,
"headers": {
"content_length": [
"29"
],
"content_type": [
"application/json; charset=UTF-8"
],
"date": [
"Thu, 20 Nov 2025 02:11:27 GMT"
],
"server": [
"Docker/18.05.0-ce (linux)"
],
"unknown": [
{
"key": "api_version",
"value": [
"1.37"
]
},
{
"key": "docker_experimental",
"value": [
"false"
]
},
{
"key": "ostype",
"value": [
"linux"
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:5000",
"path": "",
"scheme": "http"
}
},
"status_code": 200
},
"solrdb": {
"jvm": [],
"lucene": [],
"system": [],
"vm": []
}
},
"url": "http://182.160.17.247:5000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T02:16:35.06Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:5060",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:5060/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T19:15:49.233Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T10:57:27.154Z"
},
{
"port": 5671,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:5671",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:5671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T17:27:24.382Z"
},
{
"port": 5984,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"couchdb": {
"databases": [
"_replicator",
"_users",
"test",
"shops",
"god"
],
"uuid": "e920626a6a2024d035730873c7fcf8ab",
"version": "1.6.1"
},
"http": {
"body": "{\"couchdb\":\"Welcome\",\"uuid\":\"e920626a6a2024d035730873c7fcf8ab\",\"version\":\"1.6.1\",\"vendor\":{\"name\":\"Ubuntu\",\"version\":\"16.04\"}}\n",
"body_murmur": -427937664,
"body_sha256": "28d44637566f6477bf38e8d61896903b57f81f1a1a4e896aa70e17a4e1a874ed",
"component": [
"Erlang: otp/18",
"CouchDB:1.6.1"
],
"content_length": 127,
"favicon": {
"md5_hash": "2ab2aae806e8393b70970b2eaace82e0",
"murmur_hash": -1346006262,
"path": "http://182.160.17.247:5984/favicon.ico",
"size": 9326
},
"headers": {
"cache_control": [
"must-revalidate"
],
"content_length": [
"127"
],
"content_type": [
"application/json; charset=UTF-8"
],
"date": [
"Thu, 20 Nov 2025 05:00:04 GMT"
],
"server": [
"CouchDB/1.6.1 (Erlang OTP/18)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:5984",
"path": "",
"scheme": "http"
}
},
"status_code": 200
},
"solrdb": {
"jvm": [],
"lucene": [],
"system": [],
"vm": []
}
},
"url": "http://182.160.17.247:5984/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T05:05:11.947Z"
},
{
"port": 6000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:6000",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:6000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T05:44:09.745Z"
},
{
"port": 6379,
"protocol": "tcp",
"name": "redis",
"version": "2.8.3",
"product": "Redis key-value store",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:redislabs:redis:2.8.3",
"part": "a",
"vendor": "redislabs",
"product": "redis",
"version": "2\\.8\\.3",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"redis": {
"arch_bits": "64",
"build_id": "f5d3ac54abffe461",
"gcc_version": "4.4.7",
"git_sha1": "00000000",
"info_response": "# Server\r\nredis_version:2.8.3\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:f5d3ac54abffe461\r\nredis_mode:standalone\r\nos:Linux 2.6.32-642.6.2.el6.x86_64 x86_64\r\narch_bits:64\r\nmultiplexing_api:epoll\r\ngcc_version:4.4.7\r\nprocess_id:29969\r\nrun_id:185ec1f650d22d3113c32038c828f4a8d60f5bbf\r\ntcp_port:6379\r\nuptime_in_seconds:1058067\r\nuptime_in_days:12\r\nhz:10\r\nlru_clock:896632\r\nconfig_file:/root/redis-2.8.3/redis.conf\r\n\r\n# Clients\r\nconnected_clients:135\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:156\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:3612856\r\nused_memory_human:3.45M\r\nused_memory_rss:12828672\r\nused_memory_peak:6557128\r\nused_memory_peak_human:6.25M\r\nused_memory_lua:33792\r\nmem_fragmentation_ratio:3.55\r\nmem_allocator:jemalloc-3.2.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:0\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1497943587\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:0\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:7195\r\ntotal_commands_processed:22727\r\ninstantaneous_ops_per_sec:0\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:0\r\nevicted_keys:0\r\nkeyspace_hits:8745\r\nkeyspace_misses:165\r\npubsub_channels:0\r\npubsub_patterns:0\r\nlatest_fork_usec:965\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:125.16\r\nused_cpu_user:303.80\r\nused_cpu_sys_children:0.27\r\nused_cpu_user_children:0.06\r\n\r\n# Keyspace\r\ndb0:keys=4,expires=0,avg_ttl=0\r\n",
"major": 2,
"mem_allocator": "jemalloc-3.2.0",
"minor": 8,
"mode": "standalone",
"nonexistent_response": "OK",
"os": "Linux 2.6.32-642.6.2.el6.x86_64 x86_64",
"patchlevel": 3,
"ping_response": "PONG",
"quit_response": "<null>",
"total_commands_processed": 22727,
"total_connections_received": 7195,
"uptime_in_seconds": 1058067,
"used_memory": 3612856,
"version": "2.8.3"
}
},
"cve": [
{
"id": "CVE-2013-7458",
"score": 3.3,
"severity": "low"
},
{
"id": "CVE-2015-4335",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2015-8080",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T03:42:44.434Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:6443",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:6443/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T12:58:55.812Z"
},
{
"port": 7574,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:7574",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:7574/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T06:37:19.943Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Jetty",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mortbay:jetty",
"part": "a",
"vendor": "mortbay",
"product": "jetty",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"en\" lang=\"en\" ng-app=\"\"> \r\n\r\n\t<!-- Head -->\r\n\t<head>\r\n\t\t<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\r\n\t\t<meta http-equiv=\"X-UA-Compatible\" content=\"IE=Edge\" />\r\n \t\t<title>Gitblit</title>\r\n\t\t<link rel=\"icon\" href=\"gitblt-favicon.png\" type=\"image/png\"/>\r\n\t\t\r\n\t\t<link rel=\"stylesheet\" href=\"bootstrap/css/bootstrap.css\"/>\r\n\t\t<link rel=\"stylesheet\" href=\"bootstrap/css/iconic.css\"/>\r\n\t\t<link rel=\"stylesheet\" href=\"fontawesome/css/font-awesome.min.css\"/>\r\n <link rel=\"stylesheet\" href=\"octicons/octicons.css\"/>\r\n\t\t<link rel=\"stylesheet\" type=\"text/css\" href=\"gitblit.css\"/>\r\n\t\t<link rel=\"stylesheet\" type=\"text/css\" href=\"bootstrap-fixes.css\"/>\r\n\t<link rel=\"stylesheet\" type=\"text/css\" href=\"bootstrap/css/bootstrap-responsive.css\" />\r\n<style type=\"text/css\">\n.navbar-inner {\n}\n</style>\n<script type=\"text/javascript\" src=\"resources/com.gitblit.wicket.ng.NgController/angular.js\"></script>\r\n<script type=\"text/javascript\" ><!--/*--><![CDATA[/*><!--*/\n<!-- AngularJS projectsCtrl data controller -->\nfunction projectsCtrl($scope) {\n\t$scope.projectsList = [];\n}\n\n/*-->]]>*/</script>\n\r\n</head>\r\n\r\n\t<body>\r\n\r\n\t\t<!-- page content -->\r\n\t\t\r\n\t<div class=\"navbar navbar-fixed-top\">\r\n\t\t<div class=\"navbar-inner\">\r\n\t\t\t<div class=\"container\">\r\n\t\t\t\t<a class=\"btn btn-navbar\" data-toggle=\"collapse\" data-target=\".nav-collapse\">\r\n \t\t\t<span class=\"icon-bar\"></span>\r\n \t\t\t<span class=\"icon-bar\"></span>\r\n \t\t\t<span class=\"icon-bar\"></span>\r\n \t\t</a>\r\n\t\t\t\t<a class=\"brand\" href=\"\" title=\"\">\r\n\t\t\t\t\t<img src=\"logo.png\" width=\"120\" class=\"logo\"/>\r\n\t\t\t\t</a>\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"nav-collapse\">\r\n\t\t\t\t\t<div>\r\n\t<ul class=\"nav\">\r\n\t\t<li class=\"active\">\r\n<a href=\"./\">公告板</a>\r\n</li><li>\r\n<a href=\"repositories/\">版本库</a>\r\n</li><li>\r\n<a href=\"filestore/\">filestore</a>\r\n</li><li>\r\n<a href=\"activity/\">活动</a>\r\n</li><li>\r\n<a href=\"lucene/\">搜索</a>\r\n</li><li class=\"dropdown\">\r\n\t<a class=\"dropdown-toggle\" href=\"#\" data-toggle=\"dropdown\">过滤<b class=\"caret\"></b></a>\r\n\t<ul class=\"dropdown-menu\">\r\n\t\t<li>\r\n<a href=\"?db=1\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>今天</a>\r\n</li><li>\r\n<a href=\"?db=3\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>最近 3 天</a>\r\n</li><li>\r\n<a href=\"?db=7\"><i style=\"padding-right:5px;\" class=\"icon-ok\"></i>最近 7 天</a>\r\n</li><li>\r\n<a href=\"?db=14\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>最近 14 天</a>\r\n</li><li>\r\n<a href=\"?db=21\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>最近 21 天</a>\r\n</li><li>\r\n<a href=\"?db=28\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>最近 28 天</a>\r\n</li><li class=\"divider\"></li><li>\r\n<a href=\"./\"><i style=\"padding-right:5px;\" class=\"icon-ok-white\"></i>重置</a>\r\n</li>\r\n\t</ul>\t\r\n</li>\t\t\t\r\n\t</ul>\t\r\n</div>\r\n\t\t\t\t\t<ul class=\"nav pull-right\">\r\n\t\t\t\t\t \t\r\n\t\t<li>\r\n\t\t\t<form class=\"pull-right\" id=\"id1\" method=\"post\" action=\"?wicket:interface=:0:userPanel:loginForm::IFormSubmitListener::\"><div style=\"width:0px;height:0px;position:absolute;left:-100px;top:-100px;overflow:hidden\"><input type=\"hidden\" name=\"wicket:bookmarkablePage\" value=\":com.gitblit.wicket.pages.MyDashboardPage\" /></div><div style=\"width:0px;height:0px;position:absolute;left:-100px;top:-100px;overflow:hidden\"><input type=\"hidden\" name=\"id1_hf_0\" id=\"id1_hf_0\" /></div>\r\n\t\t\t\t<span class=\"form-search\">\r\n\t\t\t\t\t<input class=\"input-small\" type=\"text\" value=\"\" name=\"username\" placeholder=\"用户名\"/>\r\n\t\t\t\t\t<input class=\"input-small\" type=\"password\" value=\"\" name=\"password\" placeholder=\"密码\"/>\r\n\t\t\t\t\t<button class=\"btn\" type=\"submit\">登录</button>\r\n\t\t\t\t</span>\r\n\t\t\t</form>\r\n\t\t</li>\r\n\t\r\n\t\t\t\t\t</ul>\r\n\t\t\t\t</div>\r\n\t\t\t</div>\r\n\t\t</div>\r\n\t</div>\r\n\t\t\t\t\r\n\t<!-- subclass content -->\r\n\t<div class=\"container\">\r\n\t\t<div style=\"text-align:center\">\n \n</div>\r\n\t</div>\r\n\t\r\n\t\r\n<div class=\"container\">\r\n\r\n\t<div class=\"row\" style=\"padding-top:10px;\">\r\n\t\t<div class=\"span7\">\r\n\t\t\t<div class=\"hidden-phone hidden-tablet markdown\" style=\"padding-bottom: 10px;\"><h2>欢迎访问 Gitblit</h2><p>快速便捷的 <a href=\"http://www.git-scm.com\">Git</a> 版本库管理方案。</p></div>\r\n\t\t\t<div ng-non-bindable=\"\">\r\n\t<div class=\"dashboardTitle\"><span class=\"hidden-phone hidden-tablet\">最近活动</span> <small></small></div>\r\n\t<div class=\"hidden-phone hidden-tablet\" style=\"text-align:center;\">\r\n\t\t\r\n\t</div>\r\n\t<div>最近 7 天内没有任何活动</div>\r\n</div>\r\n\t\t</div>\r\n\t\t<div class=\"span5\">\r\n\t\t\t<div>\r\n\t<ul class=\"nav nav-pills\">\r\n\t\t<li class=\"active\"><a href=\"#recent\" data-toggle=\"tab\">活动</a></li>\r\n\t\t<li><a href=\"#projects\" data-toggle=\"tab\">项目</a></li>\r\n\t</ul>\r\n\t<div class=\"tab-content\">\r\n\t\t<div class=\"tab-pane active\" id=\"recent\">\r\n\t\t\t\r\n\t\t</div>\r\n\t\t<div class=\"tab-pane\" id=\"projects\">\r\n\t\t\t<div>\r\n\t<div ng-controller=\"projectsCtrl\" style=\"border: 1px solid #ddd;margin-bottom: 20px;\">\r\n\t<div class=\"header\" style=\"padding: 5px;border: none;\"><i class=\"icon-folder-close\"></i> <span>项目 (0)</span>\r\n\t\t<div style=\"padding: 5px 0px 0px;\">\r\n\t\t\t<input type=\"text\" ng-model=\"query.n\" class=\"input-large\" style=\"border-radius: 14px; padding: 3px 14px;margin: 0px;\" placeholder=\"过滤\"></input>\r\n\t\t</div>\r\n\t</div>\r\n\t\t\r\n\t<div ng-repeat=\"item in projectsList | filter:query\" style=\"padding: 3px;border-top: 1px solid #ddd;\">\r\n\t\t<a href=\"project/?p={{item.p}}\" title=\"{{item.i}}\"><b>{{item.n}}</b></a>\r\n\t\t<span class=\"link hidden-tablet hidden-phone\" style=\"color: #bbb;\" title=\"{{item.d}}\">{{item.t}}</span>\r\n\t\t<span class=\"pull-right\">\r\n\t\t\t<span style=\"padding: 0px 5px;color: #888;font-weight:bold;vertical-align:middle;\" title=\"版本库\">{{item.c | number}}</span>\r\n\t\t</span>\r\n\t</div>\r\n</div>\r\n\r\n</div>\r\n\t\t</div>\r\n\t</div>\r\n</div>\r\n\t\t</div>\t\t\r\n\t</div>\r\n</div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\t\r\n\t\r\n\t\r\n\t<!-- user fragment -->\r\n\t\r\n\r\n\t\r\n\t\r\n\r\n\t\t\r\n\t\t<!-- page footer -->\r\n\t\t<div class=\"container\">\r\n\t\t\t<footer class=\"footer\">\r\n\t\t\t\t<p class=\"pull-right\">\r\n\t\t\t\t\t<a title=\"gitblit homepage\" href=\"http://gitblit.com/\">\r\n\t\t\t\t\t\t<span>v1.9.1</span>\r\n\t\t\t\t\t</a> \r\n\t\t\t\t</p>\r\n\t\t\t</footer>\r\n\t\t</div>\r\n\r\n\t\t<!-- Override Bootstrap's responsive menu background highlighting -->\r\n\t\t<style>\r\n\t\t@media (max-width: 979px) {\r\n\t\t\t.nav-collapse .nav > li > a:hover, .nav-collapse .dropdown-menu a:hover {\r\n\t\t\t\tbackground-color: #002060;\r\n\t\t\t}\r\n\t\t\t\r\n\t\t\t.navbar div > ul .dropdown-menu li a {\r\n\t\t\t\tcolor: #ccc;\r\n\t\t\t}\r\n\t\t}\r\n\t\t</style>\r\n\t\t\r\n\t\t<!-- Include scripts at end for faster page loading -->\r\n\t\t<script type=\"text/javascript\" src=\"bootstrap/js/jquery.js\"></script>\r\n\t\t<script type=\"text/javascript\" src=\"bootstrap/js/bootstrap.js\"></script>\t\r\n\t\t<script type=\"text/javascript\" src=\"gitblit/js/collapsible-table.js\"></script>\r\n\t\t\r\n\t</body>\r\n</html>",
"body_murmur": 1832614531,
"body_sha256": "cbea39e06e18d16e5638cfaeca506888a2552ed7ff8c82e01f7be43a0ad77c13",
"component": [
"Jetty:9.2.13",
"Java",
"Bootstrap",
"AngularJS"
],
"content_length": -1,
"favicon": {
"md5_hash": "8fb1b4d4aa2d980696b290ffd587eb7f",
"murmur_hash": 573035254,
"path": "http://182.160.17.247:8000/gitblt-favicon.png",
"size": 654
},
"headers": {
"cache_control": [
"no-cache, max-age=0, must-revalidate"
],
"content_language": [
"zh-CN"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Sat, 22 Nov 2025 06:05:37 GMT"
],
"expires": [
"Thu, 01 Jan 1970 00:00:00 GMT"
],
"link": [
"<https://182.160.17.247:8000/>; rel=\"canonical\""
],
"pragma": [
"no-cache"
],
"server": [
"Jetty(9.2.13.v20150730)"
],
"set_cookie": [
"JSESSIONID=c25t0q3ehyegrxh9k8ypvxcn;Path=/;Secure;HttpOnly"
],
"x_frame_options": [
"SAMEORIGIN"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8000",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Gitblit"
}
},
"url": "http://182.160.17.247:8000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T06:10:47.246Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<html>\n<head>\n<meta http-equiv=\"content-type\" content=\"text/html; charset=UTF-8\">\n<META HTTP-EQUIV=\"CACHE-CONTROL\" CONTENT=\"NO-CACHE\">\n<META HTTP-EQUIV=\"PRAGMA\" CONTENT=\"NO-CACHE\">\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=9\">\n<link type=\"text/css\" rel=\"stylesheet\" href=\"main.css\">\n<link rel=\"shortcut icon\" href=\"images/favicon.ico\" type=\"image/x-icon\" /> \n<title>Vigor Login Page</title>\n<style type=\"text/css\">\n/* Remove margins from the 'html' and 'body' tags, and ensure the page takes up full screen height */\nhtml, body {height:100%; margin:0; padding:0;}\n/* Set the position and dimensions of the background image. */\n#page-background {position:fixed; top:0; left:0; width:100%; height:100%;}\n/* Specify the position and layering for the content that needs to appear in front of the background image. Must have a higher z-index value than the background image. Also add some padding to compensate for removing the margin from the 'html' and 'body' tags. */\n#content {position:relative; z-index:1; padding:10px;}\n</style>\n<!--[if IE]><script type=\"text/javascript\" src=\"V2960/excanvas.js\"></script><![endif]-->\n<script>\n\tvar isomorphicDir = \"V2960/sc/\";\n</script>\n<script src=\"assets/md5.js\"></script>\n<script src=\"assets/rsa/jsbn.js\"></script>\n<script src=\"assets/rsa/prng4.js\"></script>\n<script src=\"assets/rsa/rng.js\"></script>\n<script src=\"assets/rsa/rsa.js\"></script>\n<script src=\"assets/rsa/base64.js\"></script>\n<script src=\"mobile/js/pwdmeter.js\"></script>\n<script>\n\tfunction isMobile()\n\t{\n\t\tvar mobiles = new Array(\"midp\", \"j2me\", \"avant\", \"docomo\", \"novarra\", \"palmos\", \"palmsource\",\"240x320\", \"opwv\", \"chtml\", \"pda\", \"windows ce\", \"mmp/\", \"blackberry\", \"mib/\", \"symbian\", \"wireless\", \"nokia\", \"hand\", \"mobi\", \"phone\", \"cdm\", \"up.b\", \"audio\", \"sie-\", \"sec-\", \"samsung\", \"htc\", \"mot-\", \"mitsu\", \"sagem\", \"sony\", \"alcatel\", \"lg\", \"eric\", \"vx\",\"NEC\", \"philips\", \"mmm\", \"xx\", \"panasonic\", \"sharp\", \"wap\", \"sch\",\"rover\", \"pocket\", \"benq\", \"java\", \"pt\", \"pg\", \"vox\", \"amoi\",\"bird\", \"compal\", \"kg\", \"voda\", \"sany\", \"kdd\", \"dbt\", \"sendo\",\"sgh\", \"gradi\", \"jb\", \"dddi\", \"moto\", \"iphone\", \"android\",\"iPod\", \"incognito\", \"webmate\", \"dream\", \"cupcake\", \"webos\",\"s8000\", \"bada\", \"googlebot-mobile\");\n\t var ua = navigator.userAgent.toLowerCase();\n\t var isMobile = false;\n\t var url = window.location.href;\n\t if(url.match(/\\?desktop=1/g) === null){\n\t\t for (var i = 0; i < mobiles.length; i++) {\n\t\t if (ua.indexOf(mobiles[i]) > 0) {\n\t\t isMobile = true;\n\t\t break;\n\t\t }\n\t\t }\n\t\t}\n\t\treturn isMobile;\n\t}\n\n\tif(isMobile()){\n\t\twindow.location.href = \"/mobile/\";\n\t}\n</script>\n\n<!-- SmartGWT start-->\n<script type=\"text/javascript\" language=\"javascript\"\n\tsrc=\"V2960/V2960.nocache.js\">\n\t\n</script>\n<script>\n<!--\n\tfunction getLang(lang) {\n\t\t/*\n\t\tif (lang == \"EN\")\n\t\t\treturn \"English\";\n\t\tif (lang == \"CN\")\n\t\t\treturn \"简体中文\";\n\t\tif(lang==\"TW\")\n\t\t\treturn \"繁體中文\";\n\t\t*/\n\t\t\n\t\tif (lang == \"en\"){\n\t\t\treturn \"English\";\t\n\t\t}else if (lang == \"zh-cn\"){\n\t\t\treturn \"简体中文\";\n\t\t}else if(lang==\"zh-tw\"){\n\t\t\treturn \"繁體中文\";\n\t\t}else{\n\t\t\treturn lang;\n\t\t}\n\t}\n\t\n\tfunction detectLang(){\n\t\tvar userLang = (navigator.language) ? navigator.language : navigator.userLanguage; \n\t\treturn userLang;\n\t}\n//-->\n</script>\n</head>\n<body>\n\t<div id=\"page-background\"><img src=\"images/background.png\" width=\"100%\" height=\"100%\"></div>\n</body>\n</html>\n",
"body_murmur": -771463154,
"body_sha256": "a9fe9312ff76c78874caf4a0016253f500ce3cba9ee72a8171614046e1cf1995",
"content_length": -1,
"favicon": {
"md5_hash": "ad1d65e19419d2e7ce3925fbdc0bfcdc",
"murmur_hash": 104189364,
"path": "http://182.160.17.247:8080/images/favicon.ico",
"size": 1406
},
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache, max-age=7200"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 18 Nov 2025 00:14:08 GMT"
],
"etag": [
"\"-608374592\""
],
"expires": [
"Tue, 18 Nov 2025 00:14:08 GMT"
],
"last_modified": [
"Thu, 01 Jan 1970 00:00:10 GMT"
],
"server": [
"DWS"
],
"x_frame_options": [
"SAMEORIGIN"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8080",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Vigor Login Page"
}
},
"url": "http://182.160.17.247:8080/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T00:19:11.909Z"
},
{
"port": 8086,
"protocol": "tcp",
"name": "http",
"version": "6.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:6.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "6\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\">\r\n<script type=\"text/javascript\" src=\"/js/jquery/jquery_wev8.js\"></script>\r\n<script type=\"text/javascript\" src=\"/js/jquery/plugins/client/jquery.client_wev8.js\"></script>\r\n<script type=\"text/javascript\" src=\"/system/index_wev8.js\"></script>\r\n</head>\r\n\r\n<script language=\"javascript1.1\">\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nwindow.onload=function()\r\n{\r\n var redirectUrl = \"/login/Login.jsp?logintype=1\" ;\r\n window.location.href=redirectUrl\r\n \r\n}\r\n\r\nfunction checkPopupBlocked(poppedWindow) {\r\n\t setTimeout(function(){ \r\n\t\t var flag= false\r\n\t\t if(jQuery.client.browser==\"Chrome\"){\r\n\t\t\t flag = doCheckPopupBlocked(poppedWindow);\r\n\t\t }else{\r\n\t\t\tif(poppedWindow!=null){\r\n flag = false;\r\n\t\t\t}else{\r\n flag = true;\r\n\t\t\t}\r\n\t\t }\r\n\t\t \r\n\t\t\r\n\t\t if(flag){\r\n\t\t\t var redirectUrl = \"/login/Login.jsp?logintype=1\" ;\r\n\t\t\t \r\n\t\t\t var helpurl=getHelpUrl();\r\n\t\t\t\t if(helpurl!=\"\"){\r\n\t\t\t\t\t var yn = confirm(msg);\r\n\t\t\t\t\t if(!yn) location.href = redirectUrl;\r\n\t\t\t\t\t if(yn) location.href = helpurl;\r\n\t\t\t\t }else{\r\n\t\t\t\t\t location.href = redirectUrl;\r\n\t\t\t }\r\n\t\t\t\t \r\n\t\t\t}else{\r\n\t\t\t\t\r\n\t\t\t \t window.open('','_self');\r\n\t\t\t \t window.close();\r\n\t\t\t}\r\n\t\t },500);\r\n}\r\n\r\nfunction doCheckPopupBlocked(poppedWindow) {\r\n\r\n\t var result = false;\r\n\t\t//alert(poppedWindow.closed)\r\n\t try {\r\n\t if (typeof poppedWindow == 'undefined') {\r\n\t // Safari with popup blocker... leaves the popup window handle undefined\r\n\t result = true;\r\n\t //alert(1)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.closed) {\r\n\t // This happens if the user opens and closes the client window...\r\n\t // Confusing because the handle is still available, but it's in a \"closed\" state.\r\n\t // We're not saying that the window is not being blocked, we're just saying\r\n\t // that the window has been closed before the test could be run.\r\n\t result = false;\r\n\t //alert(2)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.outerWidth == 0) {\r\n\t // This is usually Chrome's doing. The outerWidth (and most other size/location info)\r\n\t // will be left at 0, EVEN THOUGH the contents of the popup will exist (including the\r\n\t // test function we check for next). The outerWidth starts as 0, so a sufficient delay\r\n\t // after attempting to pop is needed.\r\n\t result = true;\r\n\t //alert(3)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.test) {\r\n\t // This is the actual test. The client window should be fine.\r\n\t result = false;\r\n\t //alert(4)\r\n\t }\r\n\t else {\r\n\t // Else we'll assume the window is not OK\r\n\t result = false;\r\n\t //alert(5)\r\n\t }\r\n\r\n\t } catch (err) {\r\n\t //if (console) {\r\n\t // console.warn(\"Could not access popup window\", err);\r\n\t //}\r\n\t }\r\n\r\n\t return result\r\n}\r\n\r\nfunction getHelpUrl() \r\n{ \r\n\t \r\n\treturn \"/help/sys/help.html\"\r\n \r\n} \r\n\r\n\r\n</script>\t\r\n</html>\r\n\r\n\n\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<!DOCTYPE html>\r\n<html dir=\"ltr\" lang=\"en\">\r\n<meta charset=\"utf-8\" />\r\n<p hidden>\r\n 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\r\n</p>\r\n\r\n<p hidden>\r\n<!--\r\n0,0 );\r\n0MLog\r\n016007844182,UPnP1.1 Compliant Media Server from CISCO STBID:2202275802\r\n28fa362bb88ef2653463e6bd9dc07227\r\ncee8d6b7ce52554fd70354e37bbf44a2\r\nc4ca4238a0b923820dcc509a6f75849b\r\n61fe9d8eb1385c750bf06dfbedd17aae\r\nc0eb89e1d7f2982390f96603e66f2b6b\r\ne78869e2f219905e3dcefffc5216a098\r\n4d14d64d1cbfe8042b12f47bc5e3e432\r\n50c7a791a56880e321f0ba35f7710752\r\n202cb962ac59075b964b07152d234b70\r\n05df88bbd551891f2951a6e4af73cb9e\r\na2858e699f83cdee35259eba5ed73ff9\r\n610cker\r\n2003server的酷狗,Kugou\r\n2023243000\r\n\"asjhj\",\r\n\"build_hash\" : \"e43676b1385b8125d647f593f7202acbd816e8ec\",\r\n\"build_snapshot\" : false,\r\n\"build_timestamp\" : \"2015-09-14T09:49:53Z\",\r\n\"cluster_name\" : \"elasticsearch\",\r\n\"lucene_version\" : \"4.10.4\"\r\n\"name\" : \"node1\",\r\n\"number\" : \"1.7.2\",\r\n\"status\" : 200,\r\n\"tagline\" : \"You Know, for Search\"\r\n\"version\" : {\r\n:no\r\n;\r\n; Asterisk Call Management support\r\n; Each user has a section labeled with the username\r\n; so this is the section for the user named \"mark\"\r\n;deny=0.0.0.0/0.0.0.0\r\n</HEAD></HTML>\r\n </div>\r\n</script>\r\n</td>\r\n<h2>DAGs</h2>\r\n<H1>Index of /mnt/web/</H1>\r\n<HTML><HEAD><script>top.location.href='/Main_Login.asp?error_status=1&page=index.asp&lock_time=0';</script>\r\n<ModelName>WRT110</ModelName>\r\n<NewUserpassword>455</NewUserpassword>\r\n<a href=\"http://mikrotik.com\"><img src=\"mikrotik_logo.png\" style=\"float: right;\" /></a>\r\n<a style=\"color: white; text-decoration: none\" href=\"/cgi-bin/luci\">Wait for configuration</a>\r\n<br>Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or it's affiliates in the United States and certain other countries.\r\n<button data-drupal-selector=\"edit-submit\" class=\"button js-form-submit form-submit btn-default btn\" type=\"submit\" id=\"edit-submit\" name=\"op\" value=\"Subscribe\">Subscribe</button>\r\n<div class=\"wiki-content\">\r\n<div id=\"menu\" class=\"topmenucontainer\" style=\"display:none;\"><div class=\"modelname\">DIR-600</div>\r\n<div id=\"menu\" class=\"topmenucontainer\" style=\"display:none;\"><div class=\"modelname\">DIR-629</div>\r\n<div id=\"FOOTER\">Copyright 2012- DQ Technology and VisionNet are trademarks of DQ Technology, Inc. </div>\r\n<footer class=\"teltonika\"><a1>Teltonika solutions </a1><a target=\"_blank\" href=\"http://www.teltonika.lt/\">www.teltonika.lt</a>\r\n<form name=\"frm\" id=\"frm\" method=\"post\" action=\"login.php\">\r\n<form name=\"pagepost\" method=\"post\" action=\"/xslt?PAGE=WRA01_POST&NEXTPAGE=WRA01_POST\" id=\"pagepost\">\r\n<h1>RouterOS v6.36.4</h1>\r\n<html ng-app=\"solrAdminApp\">\r\n{\"code\":20000,\r\n\"data\":{\"token\"\r\ncanal.instance.rds.accesskey=2zA12sL23cX230pS\r\ncanal.instance.rds.secretkey=iEl12120i341jv326ud23reULeIOSG\r\ncanal.instance.rds.instanceId=rm-bp1u38330lqe7989f\r\n<html><head></head><body><p>JavaScript must be enabled to continue!</p></body></html>\r\n<html><script>document.location.replace(\"/+CSCOE+/logon.html\")</script></html>\r\n<meta http-equiv=\"refresh\" content=\"0; URL=/cgi-bin/luci\" />\r\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"http://srv4.anderl-it.de:8089\">\r\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\r\n<meta name=\"application-name\" content=\"JIRA\" data-name=\"jira\" data-version=\"7.2.6\"><meta name=\"ajs-dev-mode\" content=\"false\">\r\n<meta name=\"generator\" content=\"Joomla! - Open Source Content Management\" />\r\n<p><a href=\"//mnt/web/.\">.</a></p>\r\n<p><a href=\"//mnt/web/..\">..</a></p>\r\n<report>OK</report>\r\n<script type=\"text/javascript\">document.write(\"<title>\" + ID_VC_Welcome + \"</title>\");</script>\r\n<script LANGUAGE=JavaScript>\r\n<string id=\"IDS_GETDDNSTIPS\">Your camera do not have a Foscam DDNS!You can get a DDNS for free by click \"Get My DDNS Now\".</string>\r\n<td valign=\"bottom\" height=\"20\" class=\"Copyright\" colspan=\"3\" style=\"text-align:justify\">© 2015 Cisco Systems, Inc. All Rights Reserved.\r\n<textarea cols=\"\" rows=\"\" id=\"Frm_CmdAck\" class=\"textarea_1\">sadjashj</textarea>\r\n<tr><td colspan=\"3\"><h2>WebFig Login:</h2>\r\n<web-app\r\nABCZ\r\nAC-D7111IR1,UPnP IPNC Device\r\nALFA-R36,USB Wi-Fi Router\r\nATV@100,WaxRainPlayer\r\nAXIS M3004 - ACCC8E169710,AXIS M3004 Network Camera\r\nAdm_ID\r\nAdmin:\r\nAir5021,AirTies Wireless Networks Router\r\nAll Cast[Q17130704],DLNA Media Render\r\nArcher_C20,AC750 Wireless Dual Band Router\r\nArcher_C50,Двухдиапазонный беспроводной маршрутизатор AC1200\r\nBRCM-DMS:10,Broadcom Digital Media Server Ver 1.0\r\nBCM963xxDSLRouter\r\nBroadcom ADSL Router,Broadcom single-chip ADSL router\r\nCAM6082QIR,MAC:00-0F-0D-2A-64-37\r\nCGISESSID\r\nCP Plus DVR - Web View\r\nChinaNet EPON Router,China Telecom EPON router\r\nChinaTelecom E8C(EPON) Gateway,(null)\r\nCommand was: show startup-config\r\nConfigSystemCommand\r\nConnecting to\r\nD88068C10018F51333C0,Digital Video Recorder\r\nD94027C10018F51353EE,Digital Video Recorder\r\nD-Link\r\nD-Link ADSL Router,DSL-2750B\r\nD-Link DSL-225,DSL-225\r\nD-Link DSL-2730U,D-Link DSL-2730U\r\nD-Link DSL-2750U,D-Link DSL-2750U\r\nD-Link VoIP Wireless Router\r\nD-link ADSL Router,(null)\r\nDDNSSetting\r\nDEL1202-T10B/B,802.11n ADSL2+ 4-port Wi-Fi Gateway\r\nDLNA-Player-MediaCenter,Intel AV Media Renderer device\r\nDS1517 (DS1517+),Synology NAS\r\nDS-7104HGHI-E1 192.168.1.108,Digital Video Recorder\r\nDVR (192.168.20.153),\"DVR/Tilt\"\r\nDVR Components Download\r\nDVR WebClient\r\nDahuaRtsp\r\nDataServer (DS216se),Synology NAS\r\nDeviceBasicInfo\r\nDhWebCookie\r\nDiskStation (DS114),Synology NAS\r\nDiskStation (DS3617xs),Synology NAS\r\nDiskStation,Synology DLNA/UPnP Media Server\r\nDockerDSM1,Synology DLNA/UPnP Media Server\r\nDreambox\r\nEFM Networks ipTIME N704V,EFM Networks ipTIME N704V\r\nEdmWebVideo\r\nEltex GPON ONT,(null)\r\nEmby - ns340537,UPnP/AV 1.0 Compliant Media Server\r\nError: username or password error,please input again.\r\nF660,ZTE Broadband Home Gateway\r\nFSO1,Simultaneous Dual-Band Wireless-AC Gigabit Router\r\nFStorage\r\nFU HDTVI 8008F1-S2 192.168.1.109,Digital Video Recorder\r\nFactory (DS214),Synology NAS\r\nFollow administrator instructions to enter the complete path\r\nFrm_Logintoken\").value = \"12324\";\r\nGSDS-86308 192.168.1.110,Digital Video Recorder\r\nH0m3l4b1t: YES\r\nH7:219.78.57.135,AV Media Renderer Device\r\nH108N,Broadband System\r\nHD-TVI 8016 192.168.1.109,Digital Video Recorder\r\nHDS-7204TVI-HDMI 192.168.1.10,Digital Video Recorder\r\nHDS-7204TVI-HDMI/K 192.168.100.89,Digital Video Recorder\r\nHDS-7208TVI-HDMI 192.168.100.100,Digital Video Recorder\r\nHDS-7208TVI-HDMI/N 192.168.1.188,Digital Video Recorder\r\nHDS-N9632I-4K/8HD 192.168.100.101,Digital Video Recorder\r\nHDVR(74.129.35.117),UPnP Device\r\nHIKVISION DS-2CD2420F-IW - C17064308,IP Camera\r\nHIMEDIA(Q5)\r\nHIMEDIA(TV Box@139),Rockchip Media Renderer, DLNA(DMR)\r\nHK-VT7116 192.168.1.64,Digital Video Recorder\r\nHeather,NVR\r\nHello\r\nHello: World!\r\nHiMultiScreen,UPnP HiMultiScreen Device 1.0\r\nHostname: HACKED-ROUTER-HELP-SOS-DEFAULT-PASSWORD\r\nIMP-1\r\nIPTV+572659\r\nIX380,ZTE Fixed Wireless Terminal\r\nInvalid credentials for user\r\nJAWS/\r\nLILIN NVR116 192.168.2.50,1080P Real-time Multi-touch Standalone NVR\r\nLTD8304T-FT 10.1.10.150,Digital Video Recorder\r\nLebo-Media Renderer\r\nLiShan (DS916+),Synology NAS\r\nLinksys\r\nLinksys08686,Simultaneous Dual-Band Wireless-AC Gigabit Router\r\nLinksys SPA Configuration\r\nLinux Internet Gateway Device,WAN Device on Linux IGD\r\nLinux Ubuntu 4.4.0-101-generic #124-Ubuntu SMP Fri Nov 10 18:29:59 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux\r\nLinux router,Linux router\r\nLiving Room 1_1460(HiMediaRender)\r\nLiving Room 1_1625,UPnP HiMultiScreen Device 1.0\r\nLocation: http://192.168.1.1/home_H1.asp\r\nMLog\r\nMacrec DVR - Web view\r\nMbOrpjfVAgyUd8uS\r\nMedia Renderer Device\r\nMediaCenter-664243ec,Rockchip Media Server, DLNA(DMS)\r\nModel: LW-N605R\r\nN4560,N4560 IP Storage Server\r\nNAME=\"OldPwd\"\r\nNAS138CB5\r\nNASC262E2\r\nNASDD789E\r\nNETCORE NI360 S3,NETCORE NI360 S3\r\nNETCORE NR235W,NETCORE NR235W\r\nNETCORE NR236W,NETCORE NR236W\r\nNETCORE NR255-V,NETCORE NR255-V\r\nNETCORE NR256,NETCORE NR256\r\nNETCORE NR266,NETCORE NR266\r\nNETCORE NR286,NETCORE NR286\r\nNETCORE NR289-GE,NETCORE NR289-GE\r\nNETCORE NW715P,NETCORE NW715P\r\nNETCORE NW735,NETCORE NW735\r\nNETCORE NW736,NETCORE NW736\r\nNETCORE T1,NETCORE T1\r\nNETGEAR R6400\r\nNETGEAR R7000\r\nNETIS RX30,NETIS RX30\r\nNETIS WF2409,NETIS WF2409\r\nNETIS WF2409/WF2409D,NETIS WF2409/WF2409D\r\nNETIS WF-2409,NETIS WF-2409\r\nNS-YN201,wifi router\r\nNetDvrV3\r\nNoName,PSTEK Digital Signage\r\nOPS-DRD (199.72.57.76),AV Media Renderer Device\r\nP-660HN-T1A_IPv6\r\nP-2612HNU-F1F,WAN Device\r\nPC-LIGUOPENG,Hikvision UPNP Agent for Depolyer\r\nPassPhrase\r\nPlanet Wireless Fiber Router,Planet Wireless Fiber Router\r\nPlex Media Server: HomeServer,Plex Media Server\r\nPlex Media Server: NAS_CIFS,Plex Media Server\r\nPlex Media Server: homeserver,Plex Media Server\r\nPlex Media Server: ns3029989.ip-91-121-88.eu,Plex Media Server\r\nPlex Media Server: plexnifique,Plex Media Server\r\nQ6IIemmc,UPnP HiMultiScreen Device 1.0\r\nQDlna AV Media Renderer Device\r\nQTECH,(null)\r\nQnap\r\nQxBox DLNA_Global_Edition_S800\r\nRT2880 Linux Internet Gateway Device,RT2880 802.11 SoC Solution\r\nRT-212,AirTies Wireless Networks Router\r\nRT-AC55UHP,RT-AC55UHP\r\nRT-AC66U,RT-AC66U\r\nRT-N10PV2,RT-N10PV2\r\nRT-N10U,RT-N10U\r\nRT-N12,RT-N12\r\nRT-N12VP,RT-N12VP\r\nRackStation (RS2416RP+),Synology NAS\r\nRalinkAPS,Ralink AP WSC device\r\nRealtek 960: Realtek Media Render,Intel DLNA DMR Using Auto-Generated UPnP Stack\r\nRepetidor Wireless TP-LINK WA850RE\r\nRomPager\r\nRt47 @ Petersburg - 471034,Siqura multi-codec VideoEncoder\r\nRt47 @ Rt347 MM31.8 - 402067,Siqura multi-codec VideoDecoder\r\nRuckus Wireless Admin\r\nSECOM NVR104,1080P Real-time Multi-touch Standalone NVR\r\nSMC-WGR14S-N3,SMC AP WSC device\r\nSMCI_0:25:90:22:27:44,IPMI Console\r\nSMCWBR14S-N4,150 Mbps 4-Port Wireless Broadband Router\r\nSMCWBR14S-N4,Draft 11n Wifi Router\r\nSSA-3296 192.168.1.33,Digital Video Recorder\r\nSSID\r\nSTANNVR-4E 192.168.1.253,1080P Real-time Multi-touch Standalone NVR\r\nSagemcom ADSL Router,(null)\r\nServer\r\nServer_Com-Ent (DS418),Synology NAS\r\nServiio (ns318893),Serviio, a DLNA media server\r\nSmartSTB\r\nStruts2045\r\nT3,T3\r\nTDVRL16 10.1.10.249,Digital Video Recorder\r\nTL-WR840N,Router inalámbrico N 300Mbps WR840N\r\nTL-WR840N,TP-Link Wireless N Router WR840N\r\nTL-WR840N,TP-Link 無線 N 路由器 WR840N\r\nTL-WR841HP,TP-Link Wireless N Router TL-WR841HP\r\nTL-WR841N,TP-Link 無線 N 路由器 WR841N\r\nTL-WR849N,Roteador Wireless N 300Mbps\r\nTR064 IGD,ZTE Broadband Home Gateway\r\nTenda Wireless-N Broadband router,Tenda Wireless-N Broadband router\r\nTenda Wireless-N Router,Tenda Wireless-N Router\r\nThe Cross Web Server\r\nThere is a loop in network for HTTP traffic. Check your network topology and proxy & firewall configuration\r\nTnas-000025\r\nU+tv UHD2\r\nUPNP HDS-2020IRPW - 690240459,IP Camera\r\nUPNP HDS-2420IRPW - 119835180,IP Camera\r\nUPnP Digital Video/Audio Recorder,4 Channel(SD) H.264 DVR(ports:67/68/80)\r\nUPnP Digital Video/Audio Recorder,8 Channel(SD) H.264 DVR(ports:67/68/80)\r\nUTT Internet Gateway Device,UTT 802.11 SoC Solution\r\nUpdate Success!\r\nUpnpManager,UPnP Device\r\nUseUserCredential\r\nUser Password\r\nUserSetSetting\r\nVMG3312-B10A,MitraStar single-chip ADSL router\r\nVMG3312-B10B,MitraStar single-chip ADSL router\r\nVMI-DVR-3108-SL 192.168.1.5,Digital Video Recorder\r\nVOUK-NAS (DS716+),Synology NAS\r\nWAP3205v2,WAP3205v2\r\nWBR-6005,150M N wireless Router\r\nWPAPSK\r\nWPS Access Point,Kit1700Duo\r\nWWW-Authenticate\r\nWWW-Authenticate: Basic realm=\"netcam\"\r\nWeb Client for EDVS/EDVR\r\nWireless Router,Wireless Router\r\nX-Content-Powered-By: K2 v2.8.0 (by JoomlaWorks)\r\nXBR-55X700D\r\nXWebPlay\r\nXiaomi MediaRenderer\r\nYou have logged out of the Cisco Router.\r\nZXV10 H108L,ZTE Broadband Home Gateway\r\nZioncom TOTOLINK N300R,Zioncom TOTOLINK N300R\r\nZoneDirector,Ruckus Wireless ZoneDirector\r\nZyXEL P-660HN-T1A\r\n[error]0\r\n[fonts]\r\n[general]\r\n[mark]\r\n\\u0022ECOR264\r\n\\u0022NETGEAR\r\n\\x11\\x44\\x75\\x63\\x6b\\x79\\\r\na42e705f4cade6b3e84b99b0e0400e74\r\nad43fd99987a8f6a648abe05095bf52c\r\nadmin:\r\nadjuncts\r\nbackup:x:34:34:backup:/var/backups:/usr/sbin/nologin\r\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\r\nbindaddr = 0.0.0.0\r\nd41d8cd98f00b204e9800998ecf8427e\r\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\r\ndaxi,PSTEK Digital Signage\r\nddns\r\ndeadbeaf\r\ndgn123456\r\ndiag_result = \"\";\r\ndocument.write('<span><font color=\"#006699\" style=\"font-family:Arial;font-size:20px;\">Home Gateway</font></span>');\r\ndocument.write('<span><font color=\"#006699\" style=\"font-family:Arial;font-size:28px;\"><b>家 庭 网 关</b></font></span>');\r\neHomeMediaCenter,Rockchip Media Renderer, DLNA(DMR)\r\nelse if (lang == 'zh')\r\nempty or is not available to view\r\nenabled = yes\r\nength: 11\r\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\r\ngnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin\r\nhello world!\r\nhermanosingles (DS215j),Synology NAS\r\nhome_wan.htm\r\niNeXT_TV_715: Realtek Media Render,Intel DLNA DMR Using Auto-Generated UPnP Stack\r\nif (lang == 'en')\r\nirc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin\r\njava.lang.ProcessBuilder\r\njaws123456\r\nlighttpd/1.4.34\r\nlinux--2017\r\nlist:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin\r\nlogin\r\nlogin:\r\nlp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin\r\nls3k\r\nmail:x:8:8:mail:/var/mail:/usr/sbin/nologin\r\nman:x:6:12:man:/var/cache/man:/usr/sbin/nologin\r\nmsfc (DS418),Synology NAS\r\nnetis_WF2471 Wireless AP,netis_WF2471 Wireless AP\r\nnews:x:9:9:news:/var/spool/news:/usr/sbin/nologin\r\nnobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\r\nnuuo123456\r\nnvr,NVR\r\nomg1337hax\r\npassword\r\npassword:\r\npermit=0.0.0.0/0.0.0.0\r\npermit=127.0.0.1/255.255.255.0\r\nphpmyadmin\r\nport = 5038\r\npppoe_password\r\nproxy:x:13:13:proxy:/bin:/usr/sbin/nologin\r\nputmsg(mPingCount);\r\npwdAdmin\r\npwdAdmin = 123\r\npwdSupport\r\npwdSupport = 123\r\npwdUser\r\npwdUser = admin\r\nread = system,call,log,verbose,command,agent,user,originate\r\nreport.db.server.name\r\nreport.db.server.sa.pass\r\nreport.db.server.user.pass\r\nroot:\r\nroot:x:0:0:root:/root:/bin/bash\r\nsecret = p@ssword!\r\nstatus=\"doing\"\r\nsuccess\r\nsync:x:4:65534:sync:/bin:/bin/sync\r\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\r\nszPassword\r\nszUsername\r\ntomcat\r\nuShare,GeeXboX uShare : UPnP Media Server\r\nuucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin\r\nvar COPYRIGHT_YEAR = \"2013\";\r\nvar DEFAULT_LANG = \"en\";\r\nvar DEFAULT_PASSWD = \"admin\";\r\nvar NEED_UPLOAD_FROM_DISK = true;\r\nvar OEM_TYPE = false;\r\nvar PROJECT_NAME = \"NVRmini 2\";\r\nvar SUPPORT_ABNORMAL_DISK_EVENT = true;\r\nvar SUPPORT_BUILDIN_DHCP = false;\r\nvar SUPPORT_DAILY_SYSTEM_REPORT = true;\r\nvar SUPPORT_HW_LOG = true;\r\nvar SUPPORT_IO = true;\r\nvar SUPPORT_LICENSE_TRANSFER = true;\r\nvar SUPPORT_LOCAL_DISPAY = false;\r\nvar SUPPORT_NETWORK_SETTING = true;\r\nvar SUPPORT_OVERHEAT_EVENT = true;\r\nvar SUPPORT_POS = true;\r\nvar SUPPORT_POWER_ON_EVENT = true;\r\nvar SUPPORT_RAID_SETTING = true;\r\nvar SUPPORT_SYSTEM_SETTING = true;\r\nvar SUPPORT_TRIAL = false;\r\nvar SUPPORT_WEB_SERVICE = true;\r\nvar VENDOR_CONTACT_WINDOW = \"www.nuuo.com/eHelpdesk.php\";\r\nvar VENDOR_DISPLAY_NAME = \"NUUO\";\r\nvar VENDOR_NAME = \"NUUO\";\r\nvar XOntName = 'GPON Home Gateway';\r\nvar cmdResult = new Array(\r\nvar gHashCookie = new Hash.Cookie('WebClientCookie', {duration:30});\r\nvar model = \"LW-N605R\";\r\nvar refreshUrl = \"/view/view.shtml?id=665\";var questMark = refreshUrl.indexOf('?') < 0 ? \"?\" : \"&\";var imagepath = \"/mjpg/video.mjpg\";var completePath = \"imagepath=\" + encodeURIComponent(imagepath) + \"&size=1\";if (refreshUrl.indexOf(\"view.shtml\") >= 0) {window.location.href = refreshUrl + questMark + completePath;}else {window.location.href = refreshUrl;}\r\nvar vendor = \"LINK-NET\";\r\nwctesthellosec!!!\r\nwebenabled = no\r\nwiki-content\r\nwindow.location.href=\"login_pic.asp\";\r\nwindow.location=\"/global-protect/login.esp\";\r\nwindows--2017\r\nwrite = system,call,log,verbose,command,agent,user,originate\r\nwww-data:x:33:33:www-data:/var/www:/usr/sbin/nologin\r\n},\r\n荣耀立方\r\nWelcome to the Apache ActiveMQ Console of localhost\r\nallow_url_include\r\nPHP Extension Build\r\nprocessor\t: 0\r\nvendor_id\t: GenuineIntel\r\ncpu family\t: 6\r\nmodel\t\t: 63\r\nmodel name\t: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz\r\nstepping\t: 2\r\nmicrocode\t: 0x38\r\ncpu MHz\t\t: 2599.951\r\ncache size\t: 20480 KB\r\nphysical id\t: 0\r\nsiblings\t: 16\r\ncore id\t\t: 0\r\ncpu cores\t: 8\r\napicid\t\t: 0\r\ninitial apicid\t: 0\r\nfpu\t\t: yes\r\nfpu_exception\t: yes\r\ncpuid level\t: 15\r\nwp\t\t: yes\r\nbogomips\t: 4788.78\r\nclflush size\t: 64\r\ncache_alignment\t: 64\r\naddress sizes\t: 46 bits physical, 48 bits virtual\r\npower management:\r\n-->\r\n</p>\r\n",
"body_murmur": -864955752,
"body_sha256": "e789b28a02927a6e19d17cd1127bcde3d078fcf221dc60e2d1be7c0d590c0bab",
"component": [
"AngularJS"
],
"content_length": 20382,
"headers": {
"content_length": [
"20382"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Thu, 20 Nov 2025 12:32:06 GMT"
],
"server": [
"Spark"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8086",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "\" + ID_VC_Welcome + \""
}
},
"cve": [
{
"id": "CVE-2005-2089",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-1446",
"score": 9,
"severity": "high"
},
{
"id": "CVE-2009-1535",
"score": 7.5,
"severity": "high"
}
],
"url": "http://182.160.17.247:8086/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T12:37:14.763Z"
},
{
"port": 8087,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\">\r\n<script type=\"text/javascript\" src=\"/js/jquery/jquery_wev8.js\"></script>\r\n<script type=\"text/javascript\" src=\"/js/jquery/plugins/client/jquery.client_wev8.js\"></script>\r\n<script type=\"text/javascript\" src=\"/system/index_wev8.js\"></script>\r\n</head>\r\n\r\n<script language=\"javascript1.1\">\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nwindow.onload=function()\r\n{\r\n var redirectUrl = \"/login/Login.jsp?logintype=1\" ;\r\n window.location.href=redirectUrl\r\n \r\n}\r\n\r\nfunction checkPopupBlocked(poppedWindow) {\r\n\t setTimeout(function(){ \r\n\t\t var flag= false\r\n\t\t if(jQuery.client.browser==\"Chrome\"){\r\n\t\t\t flag = doCheckPopupBlocked(poppedWindow);\r\n\t\t }else{\r\n\t\t\tif(poppedWindow!=null){\r\n flag = false;\r\n\t\t\t}else{\r\n flag = true;\r\n\t\t\t}\r\n\t\t }\r\n\t\t \r\n\t\t\r\n\t\t if(flag){\r\n\t\t\t var redirectUrl = \"/login/Login.jsp?logintype=1\" ;\r\n\t\t\t \r\n\t\t\t var helpurl=getHelpUrl();\r\n\t\t\t\t if(helpurl!=\"\"){\r\n\t\t\t\t\t var yn = confirm(msg);\r\n\t\t\t\t\t if(!yn) location.href = redirectUrl;\r\n\t\t\t\t\t if(yn) location.href = helpurl;\r\n\t\t\t\t }else{\r\n\t\t\t\t\t location.href = redirectUrl;\r\n\t\t\t }\r\n\t\t\t\t \r\n\t\t\t}else{\r\n\t\t\t\t\r\n\t\t\t \t window.open('','_self');\r\n\t\t\t \t window.close();\r\n\t\t\t}\r\n\t\t },500);\r\n}\r\n\r\nfunction doCheckPopupBlocked(poppedWindow) {\r\n\r\n\t var result = false;\r\n\t\t//alert(poppedWindow.closed)\r\n\t try {\r\n\t if (typeof poppedWindow == 'undefined') {\r\n\t // Safari with popup blocker... leaves the popup window handle undefined\r\n\t result = true;\r\n\t //alert(1)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.closed) {\r\n\t // This happens if the user opens and closes the client window...\r\n\t // Confusing because the handle is still available, but it's in a \"closed\" state.\r\n\t // We're not saying that the window is not being blocked, we're just saying\r\n\t // that the window has been closed before the test could be run.\r\n\t result = false;\r\n\t //alert(2)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.outerWidth == 0) {\r\n\t // This is usually Chrome's doing. The outerWidth (and most other size/location info)\r\n\t // will be left at 0, EVEN THOUGH the contents of the popup will exist (including the\r\n\t // test function we check for next). The outerWidth starts as 0, so a sufficient delay\r\n\t // after attempting to pop is needed.\r\n\t result = true;\r\n\t //alert(3)\r\n\t }\r\n\t else if (poppedWindow && poppedWindow.test) {\r\n\t // This is the actual test. The client window should be fine.\r\n\t result = false;\r\n\t //alert(4)\r\n\t }\r\n\t else {\r\n\t // Else we'll assume the window is not OK\r\n\t result = false;\r\n\t //alert(5)\r\n\t }\r\n\r\n\t } catch (err) {\r\n\t //if (console) {\r\n\t // console.warn(\"Could not access popup window\", err);\r\n\t //}\r\n\t }\r\n\r\n\t return result\r\n}\r\n\r\nfunction getHelpUrl() \r\n{ \r\n\t \r\n\treturn \"/help/sys/help.html\"\r\n \r\n} \r\n\r\n\r\n</script>\t\r\n</html>\r\n\r\n\n\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<!DOCTYPE html>\r\n<html dir=\"ltr\" lang=\"en\">\r\n<meta charset=\"utf-8\" />\r\n<p hidden>\r\n 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\r\n</p>\r\n\r\n<p hidden>\r\n<!--\r\n0,0 );\r\n0MLog\r\n016007844182,UPnP1.1 Compliant Media Server from CISCO STBID:2202275802\r\n28fa362bb88ef2653463e6bd9dc07227\r\ncee8d6b7ce52554fd70354e37bbf44a2\r\nc4ca4238a0b923820dcc509a6f75849b\r\n61fe9d8eb1385c750bf06dfbedd17aae\r\nc0eb89e1d7f2982390f96603e66f2b6b\r\ne78869e2f219905e3dcefffc5216a098\r\n4d14d64d1cbfe8042b12f47bc5e3e432\r\n50c7a791a56880e321f0ba35f7710752\r\n202cb962ac59075b964b07152d234b70\r\n05df88bbd551891f2951a6e4af73cb9e\r\na2858e699f83cdee35259eba5ed73ff9\r\n610cker\r\n2003server的酷狗,Kugou\r\n2023243000\r\n\"asjhj\",\r\n\"build_hash\" : \"e43676b1385b8125d647f593f7202acbd816e8ec\",\r\n\"build_snapshot\" : false,\r\n\"build_timestamp\" : \"2015-09-14T09:49:53Z\",\r\n\"cluster_name\" : \"elasticsearch\",\r\n\"lucene_version\" : \"4.10.4\"\r\n\"name\" : \"node1\",\r\n\"number\" : \"1.7.2\",\r\n\"status\" : 200,\r\n\"tagline\" : \"You Know, for Search\"\r\n\"version\" : {\r\n:no\r\n;\r\n; Asterisk Call Management support\r\n; Each user has a section labeled with the username\r\n; so this is the section for the user named \"mark\"\r\n;deny=0.0.0.0/0.0.0.0\r\n</HEAD></HTML>\r\n </div>\r\n</script>\r\n</td>\r\n<h2>DAGs</h2>\r\n<H1>Index of /mnt/web/</H1>\r\n<HTML><HEAD><script>top.location.href='/Main_Login.asp?error_status=1&page=index.asp&lock_time=0';</script>\r\n<ModelName>WRT110</ModelName>\r\n<NewUserpassword>455</NewUserpassword>\r\n<a href=\"http://mikrotik.com\"><img src=\"mikrotik_logo.png\" style=\"float: right;\" /></a>\r\n<a style=\"color: white; text-decoration: none\" href=\"/cgi-bin/luci\">Wait for configuration</a>\r\n<br>Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or it's affiliates in the United States and certain other countries.\r\n<button data-drupal-selector=\"edit-submit\" class=\"button js-form-submit form-submit btn-default btn\" type=\"submit\" id=\"edit-submit\" name=\"op\" value=\"Subscribe\">Subscribe</button>\r\n<div class=\"wiki-content\">\r\n<div id=\"menu\" class=\"topmenucontainer\" style=\"display:none;\"><div class=\"modelname\">DIR-600</div>\r\n<div id=\"menu\" class=\"topmenucontainer\" style=\"display:none;\"><div class=\"modelname\">DIR-629</div>\r\n<div id=\"FOOTER\">Copyright 2012- DQ Technology and VisionNet are trademarks of DQ Technology, Inc. </div>\r\n<footer class=\"teltonika\"><a1>Teltonika solutions </a1><a target=\"_blank\" href=\"http://www.teltonika.lt/\">www.teltonika.lt</a>\r\n<form name=\"frm\" id=\"frm\" method=\"post\" action=\"login.php\">\r\n<form name=\"pagepost\" method=\"post\" action=\"/xslt?PAGE=WRA01_POST&NEXTPAGE=WRA01_POST\" id=\"pagepost\">\r\n<h1>RouterOS v6.36.4</h1>\r\n<html ng-app=\"solrAdminApp\">\r\n{\"code\":20000,\r\n\"data\":{\"token\"\r\ncanal.instance.rds.accesskey=2zA12sL23cX230pS\r\ncanal.instance.rds.secretkey=iEl12120i341jv326ud23reULeIOSG\r\ncanal.instance.rds.instanceId=rm-bp1u38330lqe7989f\r\n<html><head></head><body><p>JavaScript must be enabled to continue!</p></body></html>\r\n<html><script>document.location.replace(\"/+CSCOE+/logon.html\")</script></html>\r\n<meta http-equiv=\"refresh\" content=\"0; URL=/cgi-bin/luci\" />\r\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"http://srv4.anderl-it.de:8089\">\r\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\r\n<meta name=\"application-name\" content=\"JIRA\" data-name=\"jira\" data-version=\"7.2.6\"><meta name=\"ajs-dev-mode\" content=\"false\">\r\n<meta name=\"generator\" content=\"Joomla! - Open Source Content Management\" />\r\n<p><a href=\"//mnt/web/.\">.</a></p>\r\n<p><a href=\"//mnt/web/..\">..</a></p>\r\n<report>OK</report>\r\n<script type=\"text/javascript\">document.write(\"<title>\" + ID_VC_Welcome + \"</title>\");</script>\r\n<script LANGUAGE=JavaScript>\r\n<string id=\"IDS_GETDDNSTIPS\">Your camera do not have a Foscam DDNS!You can get a DDNS for free by click \"Get My DDNS Now\".</string>\r\n<td valign=\"bottom\" height=\"20\" class=\"Copyright\" colspan=\"3\" style=\"text-align:justify\">© 2015 Cisco Systems, Inc. All Rights Reserved.\r\n<textarea cols=\"\" rows=\"\" id=\"Frm_CmdAck\" class=\"textarea_1\">sadjashj</textarea>\r\n<tr><td colspan=\"3\"><h2>WebFig Login:</h2>\r\n<web-app\r\nABCZ\r\nAC-D7111IR1,UPnP IPNC Device\r\nALFA-R36,USB Wi-Fi Router\r\nATV@100,WaxRainPlayer\r\nAXIS M3004 - ACCC8E169710,AXIS M3004 Network Camera\r\nAdm_ID\r\nAdmin:\r\nAir5021,AirTies Wireless Networks Router\r\nAll Cast[Q17130704],DLNA Media Render\r\nArcher_C20,AC750 Wireless Dual Band Router\r\nArcher_C50,Двухдиапазонный беспроводной маршрутизатор AC1200\r\nBRCM-DMS:10,Broadcom Digital Media Server Ver 1.0\r\nBCM963xxDSLRouter\r\nBroadcom ADSL Router,Broadcom single-chip ADSL router\r\nCAM6082QIR,MAC:00-0F-0D-2A-64-37\r\nCGISESSID\r\nCP Plus DVR - Web View\r\nChinaNet EPON Router,China Telecom EPON router\r\nChinaTelecom E8C(EPON) Gateway,(null)\r\nCommand was: show startup-config\r\nConfigSystemCommand\r\nConnecting to\r\nD88068C10018F51333C0,Digital Video Recorder\r\nD94027C10018F51353EE,Digital Video Recorder\r\nD-Link\r\nD-Link ADSL Router,DSL-2750B\r\nD-Link DSL-225,DSL-225\r\nD-Link DSL-2730U,D-Link DSL-2730U\r\nD-Link DSL-2750U,D-Link DSL-2750U\r\nD-Link VoIP Wireless Router\r\nD-link ADSL Router,(null)\r\nDDNSSetting\r\nDEL1202-T10B/B,802.11n ADSL2+ 4-port Wi-Fi Gateway\r\nDLNA-Player-MediaCenter,Intel AV Media Renderer device\r\nDS1517 (DS1517+),Synology NAS\r\nDS-7104HGHI-E1 192.168.1.108,Digital Video Recorder\r\nDVR (192.168.20.153),\"DVR/Tilt\"\r\nDVR Components Download\r\nDVR WebClient\r\nDahuaRtsp\r\nDataServer (DS216se),Synology NAS\r\nDeviceBasicInfo\r\nDhWebCookie\r\nDiskStation (DS114),Synology NAS\r\nDiskStation (DS3617xs),Synology NAS\r\nDiskStation,Synology DLNA/UPnP Media Server\r\nDockerDSM1,Synology DLNA/UPnP Media Server\r\nDreambox\r\nEFM Networks ipTIME N704V,EFM Networks ipTIME N704V\r\nEdmWebVideo\r\nEltex GPON ONT,(null)\r\nEmby - ns340537,UPnP/AV 1.0 Compliant Media Server\r\nError: username or password error,please input again.\r\nF660,ZTE Broadband Home Gateway\r\nFSO1,Simultaneous Dual-Band Wireless-AC Gigabit Router\r\nFStorage\r\nFU HDTVI 8008F1-S2 192.168.1.109,Digital Video Recorder\r\nFactory (DS214),Synology NAS\r\nFollow administrator instructions to enter the complete path\r\nFrm_Logintoken\").value = \"12324\";\r\nGSDS-86308 192.168.1.110,Digital Video Recorder\r\nH0m3l4b1t: YES\r\nH7:219.78.57.135,AV Media Renderer Device\r\nH108N,Broadband System\r\nHD-TVI 8016 192.168.1.109,Digital Video Recorder\r\nHDS-7204TVI-HDMI 192.168.1.10,Digital Video Recorder\r\nHDS-7204TVI-HDMI/K 192.168.100.89,Digital Video Recorder\r\nHDS-7208TVI-HDMI 192.168.100.100,Digital Video Recorder\r\nHDS-7208TVI-HDMI/N 192.168.1.188,Digital Video Recorder\r\nHDS-N9632I-4K/8HD 192.168.100.101,Digital Video Recorder\r\nHDVR(74.129.35.117),UPnP Device\r\nHIKVISION DS-2CD2420F-IW - C17064308,IP Camera\r\nHIMEDIA(Q5)\r\nHIMEDIA(TV Box@139),Rockchip Media Renderer, DLNA(DMR)\r\nHK-VT7116 192.168.1.64,Digital Video Recorder\r\nHeather,NVR\r\nHello\r\nHello: World!\r\nHiMultiScreen,UPnP HiMultiScreen Device 1.0\r\nHostname: HACKED-ROUTER-HELP-SOS-DEFAULT-PASSWORD\r\nIMP-1\r\nIPTV+572659\r\nIX380,ZTE Fixed Wireless Terminal\r\nInvalid credentials for user\r\nJAWS/\r\nLILIN NVR116 192.168.2.50,1080P Real-time Multi-touch Standalone NVR\r\nLTD8304T-FT 10.1.10.150,Digital Video Recorder\r\nLebo-Media Renderer\r\nLiShan (DS916+),Synology NAS\r\nLinksys\r\nLinksys08686,Simultaneous Dual-Band Wireless-AC Gigabit Router\r\nLinksys SPA Configuration\r\nLinux Internet Gateway Device,WAN Device on Linux IGD\r\nLinux Ubuntu 4.4.0-101-generic #124-Ubuntu SMP Fri Nov 10 18:29:59 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux\r\nLinux router,Linux router\r\nLiving Room 1_1460(HiMediaRender)\r\nLiving Room 1_1625,UPnP HiMultiScreen Device 1.0\r\nLocation: http://192.168.1.1/home_H1.asp\r\nMLog\r\nMacrec DVR - Web view\r\nMbOrpjfVAgyUd8uS\r\nMedia Renderer Device\r\nMediaCenter-664243ec,Rockchip Media Server, DLNA(DMS)\r\nModel: LW-N605R\r\nN4560,N4560 IP Storage Server\r\nNAME=\"OldPwd\"\r\nNAS138CB5\r\nNASC262E2\r\nNASDD789E\r\nNETCORE NI360 S3,NETCORE NI360 S3\r\nNETCORE NR235W,NETCORE NR235W\r\nNETCORE NR236W,NETCORE NR236W\r\nNETCORE NR255-V,NETCORE NR255-V\r\nNETCORE NR256,NETCORE NR256\r\nNETCORE NR266,NETCORE NR266\r\nNETCORE NR286,NETCORE NR286\r\nNETCORE NR289-GE,NETCORE NR289-GE\r\nNETCORE NW715P,NETCORE NW715P\r\nNETCORE NW735,NETCORE NW735\r\nNETCORE NW736,NETCORE NW736\r\nNETCORE T1,NETCORE T1\r\nNETGEAR R6400\r\nNETGEAR R7000\r\nNETIS RX30,NETIS RX30\r\nNETIS WF2409,NETIS WF2409\r\nNETIS WF2409/WF2409D,NETIS WF2409/WF2409D\r\nNETIS WF-2409,NETIS WF-2409\r\nNS-YN201,wifi router\r\nNetDvrV3\r\nNoName,PSTEK Digital Signage\r\nOPS-DRD (199.72.57.76),AV Media Renderer Device\r\nP-660HN-T1A_IPv6\r\nP-2612HNU-F1F,WAN Device\r\nPC-LIGUOPENG,Hikvision UPNP Agent for Depolyer\r\nPassPhrase\r\nPlanet Wireless Fiber Router,Planet Wireless Fiber Router\r\nPlex Media Server: HomeServer,Plex Media Server\r\nPlex Media Server: NAS_CIFS,Plex Media Server\r\nPlex Media Server: homeserver,Plex Media Server\r\nPlex Media Server: ns3029989.ip-91-121-88.eu,Plex Media Server\r\nPlex Media Server: plexnifique,Plex Media Server\r\nQ6IIemmc,UPnP HiMultiScreen Device 1.0\r\nQDlna AV Media Renderer Device\r\nQTECH,(null)\r\nQnap\r\nQxBox DLNA_Global_Edition_S800\r\nRT2880 Linux Internet Gateway Device,RT2880 802.11 SoC Solution\r\nRT-212,AirTies Wireless Networks Router\r\nRT-AC55UHP,RT-AC55UHP\r\nRT-AC66U,RT-AC66U\r\nRT-N10PV2,RT-N10PV2\r\nRT-N10U,RT-N10U\r\nRT-N12,RT-N12\r\nRT-N12VP,RT-N12VP\r\nRackStation (RS2416RP+),Synology NAS\r\nRalinkAPS,Ralink AP WSC device\r\nRealtek 960: Realtek Media Render,Intel DLNA DMR Using Auto-Generated UPnP Stack\r\nRepetidor Wireless TP-LINK WA850RE\r\nRomPager\r\nRt47 @ Petersburg - 471034,Siqura multi-codec VideoEncoder\r\nRt47 @ Rt347 MM31.8 - 402067,Siqura multi-codec VideoDecoder\r\nRuckus Wireless Admin\r\nSECOM NVR104,1080P Real-time Multi-touch Standalone NVR\r\nSMC-WGR14S-N3,SMC AP WSC device\r\nSMCI_0:25:90:22:27:44,IPMI Console\r\nSMCWBR14S-N4,150 Mbps 4-Port Wireless Broadband Router\r\nSMCWBR14S-N4,Draft 11n Wifi Router\r\nSSA-3296 192.168.1.33,Digital Video Recorder\r\nSSID\r\nSTANNVR-4E 192.168.1.253,1080P Real-time Multi-touch Standalone NVR\r\nSagemcom ADSL Router,(null)\r\nServer\r\nServer_Com-Ent (DS418),Synology NAS\r\nServiio (ns318893),Serviio, a DLNA media server\r\nSmartSTB\r\nStruts2045\r\nT3,T3\r\nTDVRL16 10.1.10.249,Digital Video Recorder\r\nTL-WR840N,Router inalámbrico N 300Mbps WR840N\r\nTL-WR840N,TP-Link Wireless N Router WR840N\r\nTL-WR840N,TP-Link 無線 N 路由器 WR840N\r\nTL-WR841HP,TP-Link Wireless N Router TL-WR841HP\r\nTL-WR841N,TP-Link 無線 N 路由器 WR841N\r\nTL-WR849N,Roteador Wireless N 300Mbps\r\nTR064 IGD,ZTE Broadband Home Gateway\r\nTenda Wireless-N Broadband router,Tenda Wireless-N Broadband router\r\nTenda Wireless-N Router,Tenda Wireless-N Router\r\nThe Cross Web Server\r\nThere is a loop in network for HTTP traffic. Check your network topology and proxy & firewall configuration\r\nTnas-000025\r\nU+tv UHD2\r\nUPNP HDS-2020IRPW - 690240459,IP Camera\r\nUPNP HDS-2420IRPW - 119835180,IP Camera\r\nUPnP Digital Video/Audio Recorder,4 Channel(SD) H.264 DVR(ports:67/68/80)\r\nUPnP Digital Video/Audio Recorder,8 Channel(SD) H.264 DVR(ports:67/68/80)\r\nUTT Internet Gateway Device,UTT 802.11 SoC Solution\r\nUpdate Success!\r\nUpnpManager,UPnP Device\r\nUseUserCredential\r\nUser Password\r\nUserSetSetting\r\nVMG3312-B10A,MitraStar single-chip ADSL router\r\nVMG3312-B10B,MitraStar single-chip ADSL router\r\nVMI-DVR-3108-SL 192.168.1.5,Digital Video Recorder\r\nVOUK-NAS (DS716+),Synology NAS\r\nWAP3205v2,WAP3205v2\r\nWBR-6005,150M N wireless Router\r\nWPAPSK\r\nWPS Access Point,Kit1700Duo\r\nWWW-Authenticate\r\nWWW-Authenticate: Basic realm=\"netcam\"\r\nWeb Client for EDVS/EDVR\r\nWireless Router,Wireless Router\r\nX-Content-Powered-By: K2 v2.8.0 (by JoomlaWorks)\r\nXBR-55X700D\r\nXWebPlay\r\nXiaomi MediaRenderer\r\nYou have logged out of the Cisco Router.\r\nZXV10 H108L,ZTE Broadband Home Gateway\r\nZioncom TOTOLINK N300R,Zioncom TOTOLINK N300R\r\nZoneDirector,Ruckus Wireless ZoneDirector\r\nZyXEL P-660HN-T1A\r\n[error]0\r\n[fonts]\r\n[general]\r\n[mark]\r\n\\u0022ECOR264\r\n\\u0022NETGEAR\r\n\\x11\\x44\\x75\\x63\\x6b\\x79\\\r\na42e705f4cade6b3e84b99b0e0400e74\r\nad43fd99987a8f6a648abe05095bf52c\r\nadmin:\r\nadjuncts\r\nbackup:x:34:34:backup:/var/backups:/usr/sbin/nologin\r\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\r\nbindaddr = 0.0.0.0\r\nd41d8cd98f00b204e9800998ecf8427e\r\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\r\ndaxi,PSTEK Digital Signage\r\nddns\r\ndeadbeaf\r\ndgn123456\r\ndiag_result = \"\";\r\ndocument.write('<span><font color=\"#006699\" style=\"font-family:Arial;font-size:20px;\">Home Gateway</font></span>');\r\ndocument.write('<span><font color=\"#006699\" style=\"font-family:Arial;font-size:28px;\"><b>家 庭 网 关</b></font></span>');\r\neHomeMediaCenter,Rockchip Media Renderer, DLNA(DMR)\r\nelse if (lang == 'zh')\r\nempty or is not available to view\r\nenabled = yes\r\nength: 11\r\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\r\ngnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin\r\nhello world!\r\nhermanosingles (DS215j),Synology NAS\r\nhome_wan.htm\r\niNeXT_TV_715: Realtek Media Render,Intel DLNA DMR Using Auto-Generated UPnP Stack\r\nif (lang == 'en')\r\nirc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin\r\njava.lang.ProcessBuilder\r\njaws123456\r\nlighttpd/1.4.34\r\nlinux--2017\r\nlist:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin\r\nlogin\r\nlogin:\r\nlp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin\r\nls3k\r\nmail:x:8:8:mail:/var/mail:/usr/sbin/nologin\r\nman:x:6:12:man:/var/cache/man:/usr/sbin/nologin\r\nmsfc (DS418),Synology NAS\r\nnetis_WF2471 Wireless AP,netis_WF2471 Wireless AP\r\nnews:x:9:9:news:/var/spool/news:/usr/sbin/nologin\r\nnobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\r\nnuuo123456\r\nnvr,NVR\r\nomg1337hax\r\npassword\r\npassword:\r\npermit=0.0.0.0/0.0.0.0\r\npermit=127.0.0.1/255.255.255.0\r\nphpmyadmin\r\nport = 5038\r\npppoe_password\r\nproxy:x:13:13:proxy:/bin:/usr/sbin/nologin\r\nputmsg(mPingCount);\r\npwdAdmin\r\npwdAdmin = 123\r\npwdSupport\r\npwdSupport = 123\r\npwdUser\r\npwdUser = admin\r\nread = system,call,log,verbose,command,agent,user,originate\r\nreport.db.server.name\r\nreport.db.server.sa.pass\r\nreport.db.server.user.pass\r\nroot:\r\nroot:x:0:0:root:/root:/bin/bash\r\nsecret = p@ssword!\r\nstatus=\"doing\"\r\nsuccess\r\nsync:x:4:65534:sync:/bin:/bin/sync\r\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\r\nszPassword\r\nszUsername\r\ntomcat\r\nuShare,GeeXboX uShare : UPnP Media Server\r\nuucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin\r\nvar COPYRIGHT_YEAR = \"2013\";\r\nvar DEFAULT_LANG = \"en\";\r\nvar DEFAULT_PASSWD = \"admin\";\r\nvar NEED_UPLOAD_FROM_DISK = true;\r\nvar OEM_TYPE = false;\r\nvar PROJECT_NAME = \"NVRmini 2\";\r\nvar SUPPORT_ABNORMAL_DISK_EVENT = true;\r\nvar SUPPORT_BUILDIN_DHCP = false;\r\nvar SUPPORT_DAILY_SYSTEM_REPORT = true;\r\nvar SUPPORT_HW_LOG = true;\r\nvar SUPPORT_IO = true;\r\nvar SUPPORT_LICENSE_TRANSFER = true;\r\nvar SUPPORT_LOCAL_DISPAY = false;\r\nvar SUPPORT_NETWORK_SETTING = true;\r\nvar SUPPORT_OVERHEAT_EVENT = true;\r\nvar SUPPORT_POS = true;\r\nvar SUPPORT_POWER_ON_EVENT = true;\r\nvar SUPPORT_RAID_SETTING = true;\r\nvar SUPPORT_SYSTEM_SETTING = true;\r\nvar SUPPORT_TRIAL = false;\r\nvar SUPPORT_WEB_SERVICE = true;\r\nvar VENDOR_CONTACT_WINDOW = \"www.nuuo.com/eHelpdesk.php\";\r\nvar VENDOR_DISPLAY_NAME = \"NUUO\";\r\nvar VENDOR_NAME = \"NUUO\";\r\nvar XOntName = 'GPON Home Gateway';\r\nvar cmdResult = new Array(\r\nvar gHashCookie = new Hash.Cookie('WebClientCookie', {duration:30});\r\nvar model = \"LW-N605R\";\r\nvar refreshUrl = \"/view/view.shtml?id=665\";var questMark = refreshUrl.indexOf('?') < 0 ? \"?\" : \"&\";var imagepath = \"/mjpg/video.mjpg\";var completePath = \"imagepath=\" + encodeURIComponent(imagepath) + \"&size=1\";if (refreshUrl.indexOf(\"view.shtml\") >= 0) {window.location.href = refreshUrl + questMark + completePath;}else {window.location.href = refreshUrl;}\r\nvar vendor = \"LINK-NET\";\r\nwctesthellosec!!!\r\nwebenabled = no\r\nwiki-content\r\nwindow.location.href=\"login_pic.asp\";\r\nwindow.location=\"/global-protect/login.esp\";\r\nwindows--2017\r\nwrite = system,call,log,verbose,command,agent,user,originate\r\nwww-data:x:33:33:www-data:/var/www:/usr/sbin/nologin\r\n},\r\n荣耀立方\r\nWelcome to the Apache ActiveMQ Console of localhost\r\nallow_url_include\r\nPHP Extension Build\r\nprocessor\t: 0\r\nvendor_id\t: GenuineIntel\r\ncpu family\t: 6\r\nmodel\t\t: 63\r\nmodel name\t: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz\r\nstepping\t: 2\r\nmicrocode\t: 0x38\r\ncpu MHz\t\t: 2599.951\r\ncache size\t: 20480 KB\r\nphysical id\t: 0\r\nsiblings\t: 16\r\ncore id\t\t: 0\r\ncpu cores\t: 8\r\napicid\t\t: 0\r\ninitial apicid\t: 0\r\nfpu\t\t: yes\r\nfpu_exception\t: yes\r\ncpuid level\t: 15\r\nwp\t\t: yes\r\nbogomips\t: 4788.78\r\nclflush size\t: 64\r\ncache_alignment\t: 64\r\naddress sizes\t: 46 bits physical, 48 bits virtual\r\npower management:\r\n-->\r\n</p>\r\n",
"body_murmur": -864955752,
"body_sha256": "e789b28a02927a6e19d17cd1127bcde3d078fcf221dc60e2d1be7c0d590c0bab",
"component": [
"AngularJS"
],
"content_length": 20382,
"headers": {
"content_length": [
"20382"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Thu, 20 Nov 2025 06:25:54 GMT"
],
"server": [
"Spark"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8087",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "\" + ID_VC_Welcome + \""
}
},
"url": "http://182.160.17.247:8087/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-20T06:31:02.665Z"
},
{
"port": 8500,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8500",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:8500/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T15:45:11.417Z"
},
{
"port": 8883,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8883",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:8883/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T04:48:01.659Z"
},
{
"port": 8983,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD HTML 4.01//EN\" \"http://www.w3.org/TR/html4/strict.dtd\">\n<html ng-app=\"solrAdminApp\">\n<!--\nLicensed to the Apache Software Foundation (ASF) under one or more\ncontributor license agreements. See the NOTICE file distributed with\nthis work for additional information regarding copyright ownership.\nThe ASF licenses this file to You under the Apache License, Version 2.0\n(the \"License\"); you may not use this file except in compliance with\nthe License. You may obtain a copy of the License at\n\nhttp://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n-->\n\n<head>\n <title>Solr Admin</title>\n\n <link rel=\"icon\" type=\"image/x-icon\" href=\"img/favicon.ico?_=7.5.0\">\n <link rel=\"shortcut icon\" type=\"image/x-icon\" href=\"img/favicon.ico?_=7.5.0\">\n\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/common.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/analysis.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/cloud.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/cores.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/collections.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/dashboard.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/dataimport.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/files.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/index.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/java-properties.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/logging.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/menu.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/plugins.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/documents.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/query.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/stream.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/replication.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/schema.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/suggestions.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/segments.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/threads.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/chosen.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/jquery-ui.min.css?_=7.5.0\">\n <link rel=\"stylesheet\" type=\"text/css\" href=\"css/angular/jquery-ui.structure.min.css?_=7.5.0\">\n\n <meta http-equiv=\"x-ua-compatible\" content=\"IE=9\">\n <script src=\"libs/jquery-2.1.3.min.js\"></script>\n <script src=\"libs/chosen.jquery.js\"></script>\n <script src=\"libs/jquery.jstree.js\"></script>\n <script src=\"libs/angular.js\"></script>\n <script src=\"libs/angular-chosen.js\"></script>\n <script src=\"libs/angular-resource.min.js\"></script>\n <script src=\"libs/angular-route.min.js\"></script>\n <script src=\"libs/angular-cookies.min.js\"></script>\n <script src=\"libs/ngtimeago.js\"></script>\n <script src=\"libs/highlight.js\"></script>\n <script src=\"libs/d3.js\"></script>\n <script src=\"libs/jquery-ui.min.js\"></script>\n <script src=\"js/angular/app.js\"></script>\n <script src=\"js/angular/services.js\"></script>\n <script src=\"js/angular/controllers/index.js\"></script>\n <script src=\"js/angular/controllers/logging.js\"></script>\n <script src=\"js/angular/controllers/cloud.js\"></script>\n <script src=\"js/angular/controllers/collections.js\"></script>\n <script src=\"js/angular/controllers/cores.js\"></script>\n <script src=\"js/angular/controllers/threads.js\"></script>\n <script src=\"js/angular/controllers/java-properties.js\"></script>\n <script src=\"js/angular/controllers/core-overview.js\"></script>\n <script src=\"js/angular/controllers/collection-overview.js\"></script>\n <script src=\"js/angular/controllers/analysis.js\"></script>\n <script src=\"js/angular/controllers/dataimport.js\"></script>\n <script src=\"js/angular/controllers/documents.js\"></script>\n <script src=\"js/angular/controllers/files.js\"></script>\n <script src=\"js/angular/controllers/query.js\"></script>\n <script src=\"js/angular/controllers/stream.js\"></script>\n <script src=\"js/angular/controllers/plugins.js\"></script>\n <script src=\"js/angular/controllers/replication.js\"></script>\n <script src=\"js/angular/controllers/schema.js\"></script>\n <script src=\"js/angular/controllers/segments.js\"></script>\n <script src=\"js/angular/controllers/cluster-suggestions.js\"></script>\n\n\n</head>\n<body ng-controller=\"MainController\">\n\n <div id=\"wrapper\" scrollable-when-small>\n\n <div id=\"header\">\n\n <a href=\"#/\" id=\"solr\"><span>Apache SOLR</span></a>\n\n <p id=\"environment\"> </p>\n\n </div>\n\n <div id=\"main\" class=\"clearfix\">\n\n <div class=\"header-message\" id=\"init-failures\" ng-show=\"showInitFailures\">\n\n <h2>SolrCore Initialization Failures</h2>\n <ul>\n <li ng-repeat=\"(core,error) in initFailures\"><strong>{{core}}:</strong> {{error}}</li>\n </ul>\n <p>Please check your logs for more information</p>\n\n </div>\n\n <div id=\"loading\" class=\"loader universal-loader\" loading-status-message> </div>\n\n <div id=\"connection-box\" connection-message>\n <div id=\"connection-status-modal\">\n </div>\n\n <div class=\"connection-status header-message\">\n <h2>Connection to Solr lost</h2>\n <p>Please check the Solr instance.</p>\n </div>\n <div class=\"connection-status header-message\" id=\"connection-status-recovered\" ng-show=\"connectionRecovered\">\n <h2>Connection recovered...</h2>\n <p>Continuing to load data...</p>\n </div>\n </div>\n <div id=\"http-exception\" class=\"header-message\" ng-repeat=\"(url, exception) in exceptions\">\n <div class=\"exception\">{{exception.msg}}</div>\n </div>\n\n <div id=\"content-wrapper\">\n <div ng-view id=\"content\">\n\n </div>\n </div>\n\n <div id=\"menu-wrapper\">\n <div>\n\n <ul id=\"menu\">\n\n <li id=\"index\" class=\"global\" ng-class=\"{active:page=='index'}\"><p><a href=\"#/\">Dashboard</a></p></li>\n\n <li id=\"logging\" class=\"global\" ng-class=\"{active:page=='logging'}\"><p><a href=\"#/~logging\">Logging</a></p>\n <ul ng-show=\"showingLogging\">\n <li class=\"level\" ng-class=\"{active:page=='logging-levels'}\"><a href=\"#/~logging/level\">Level</a></li>\n </ul>\n </li>\n\n <li id=\"cloud\" class=\"global optional\" ng-show=\"isCloudEnabled\" ng-class=\"{active:showingCloud}\"><p><a href=\"#/~cloud\">Cloud</a></p>\n <ul ng-show=\"showingCloud\">\n <li class=\"nodes\" ng-class=\"{active:page=='cloud-nodes'}\"><a href=\"#/~cloud?view=nodes\">Nodes</a></li>\n <li class=\"tree\" ng-class=\"{active:page=='cloud-tree'}\"><a href=\"#/~cloud?view=tree\">Tree</a></li>\n <li class=\"zkstatus\" ng-class=\"{active:page=='cloud-zkstatus'}\"><a href=\"#/~cloud?view=zkstatus\">ZK Status</a></li>\n <li class=\"graph\" ng-class=\"{active:page=='cloud-graph'}\"><a href=\"#/~cloud?view=graph\">Graph</a></li>\n <li class=\"rgraph\" ng-class=\"{active:page=='cloud-rgraph'}\"><a href=\"#/~cloud?view=rgraph\">Graph (Radial)</a></li>\n </ul>\n </li>\n\n <li ng-show=\"isCloudEnabled\" id=\"collections\" class=\"global\" ng-class=\"{active:page=='collections'}\"><p><a href=\"#/~collections\">Collections</a></p></li>\n <li ng-hide=\"isCloudEnabled\" id=\"cores\" class=\"global\" ng-class=\"{active:page=='cores'}\"><p><a href=\"#/~cores\">Core Admin</a></p></li>\n\n <li id=\"java-properties\" class=\"global\" ng-class=\"{active:page=='java-props'}\"><p><a href=\"#/~java-properties\">Java Properties</a></li>\n\n <li id=\"threads\" class=\"global\" ng-class=\"{active:page=='threads'}\"><p><a href=\"#/~threads\">Thread Dump</a></p></li>\n <li ng-show=\"isCloudEnabled\" id=\"cluster-suggestions\" class=\"global\" ng-class=\"{active:page=='cluster-suggestions'}\"><p><a href=\"#/~cluster-suggestions\">Suggestions</a></p></li>\n\n </ul>\n\n <div id=\"collection-selector\" ng-show=\"isCloudEnabled\">\n <div id=\"has-collections\" ng-show=\"collections.length!=0\">\n <select data-placeholder=\"Collection Selector\"\n ng-model=\"currentCollection\"\n chosen\n ng-change=\"showCollection(currentCollection)\"\n ng-options=\"collection.name for collection in collections\"></select>\n </div>\n <p id=\"has-no-collections\" ng-show=\"collections.length==0\"><a href=\"#/~collections\">\n No collections available\n <span>Go and create one</span>\n </a></p>\n </div>\n <div id=\"collection-menu\" class=\"sub-menu\" ng-show=\"currentCollection\">\n <ul>\n <li class=\"overview\" ng-class=\"{active:page=='collection-overview'}\"><a href=\"#/{{currentCollection.name}}/collection-overview\"><span>Overview</span></a></li>\n <li class=\"analysis\" ng-class=\"{active:page=='analysis'}\"><a href=\"#/{{currentCollection.name}}/analysis\"><span>Analysis</span></a></li>\n <li class=\"dataimport\" ng-class=\"{active:page=='dataimport'}\"><a href=\"#/{{currentCollection.name}}/dataimport\"><span>Dataimport</span></a></li>\n <li class=\"documents\" ng-class=\"{active:page=='documents'}\"><a href=\"#/{{currentCollection.name}}/documents\"><span>Documents</span></a></li>\n <li class=\"files\" ng-class=\"{active:page=='files'}\"><a href=\"#/{{currentCollection.name}}/files\"><span>Files</span></a></li>\n <li class=\"query\" ng-class=\"{active:page=='query'}\"><a href=\"#/{{currentCollection.name}}/query\"><span>Query</span></a></li>\n <li class=\"stream\" ng-class=\"{active:page=='stream'}\"><a href=\"#/{{currentCollection.name}}/stream\"><span>Stream</span></a></li>\n <li class=\"schema\" ng-class=\"{active:page=='schema'}\"><a href=\"#/{{currentCollection.name}}/schema\"><span>Schema</span></a></li>\n </ul>\n </div>\n <div id=\"core-selector\">\n <div id=\"has-cores\" ng-show=\"cores.length!=0\">\n <select data-placeholder=\"Core Selector\"\n ng-model=\"currentCore\"\n chosen\n ng-change=\"showCore(currentCore)\"\n ng-options=\"core.name for core in cores\"></select>\n </div>\n <p id=\"has-no-cores\" ng-show=\"cores.length==0\"><a href=\"#/~cores\">\n No cores available\n <span>Go and create one</span>\n </a></p>\n </div>\n <div id=\"core-menu\" class=\"sub-menu\" ng-show=\"currentCore\">\n <ul>\n <li class=\"overview\" ng-class=\"{active:page=='overview'}\"><a href=\"#/{{currentCore.name}}\"><span>Overview</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"analysis\" ng-class=\"{active:page=='analysis'}\"><a href=\"#/{{currentCore.name}}/analysis\"><span>Analysis</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"dataimport\" ng-class=\"{active:page=='dataimport'}\"><a href=\"#/{{currentCore.name}}/dataimport\"><span>Dataimport</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"documents\" ng-class=\"{active:page=='documents'}\"><a href=\"#/{{currentCore.name}}/documents\"><span>Documents</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"files\" ng-class=\"{active:page=='files'}\"><a href=\"#/{{currentCore.name}}/files\"><span>Files</span></a></li>\n <li class=\"ping\" ng-class=\"{active:page=='ping'}\"><a ng-click=\"ping()\"><span>Ping</span><small class=\"qtime\" ng-show=\"showPing\"> (<span>{{pingMS}}ms</span>)</small></a></li>\n <li class=\"plugins\" ng-class=\"{active:page=='plugins'}\"><a href=\"#/{{currentCore.name}}/plugins\"><span>Plugins / Stats</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"query\" ng-class=\"{active:page=='query'}\"><a href=\"#/{{currentCore.name}}/query\"><span>Query</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"replication\" ng-class=\"{active:page=='replication'}\"><a href=\"#/{{currentCore.name}}/replication\"><span>Replication</span></a></li>\n <li ng-hide=\"isCloudEnabled\" class=\"schema\" ng-class=\"{active:page=='schema'}\"><a href=\"#/{{currentCore.name}}/schema\"><span>Schema</span></a></li>\n <li class=\"segments\" ng-class=\"{active:page=='segments'}\"><a href=\"#/{{currentCore.name}}/segments\"><span>Segments info</span></a></li>\n </ul>\n </div>\n\n </div>\n </div>\n\n <div id=\"meta\">\n\n <ul>\n\n <li class=\"documentation\"><a href=\"http://lucene.apache.org/solr/\"><span>Documentation</span></a></li>\n <li class=\"issues\"><a href=\"http://issues.apache.org/jira/browse/SOLR\"><span>Issue Tracker</span></a></li>\n <li class=\"irc\"><a href=\"http://webchat.freenode.net/?channels=#solr\"><span>IRC Channel</span></a></li>\n <li class=\"mailinglist\"><a href=\"http://wiki.apache.org/solr/UsingMailingLists\"><span>Community forum</span></a></li>\n <li class=\"wiki-query-syntax\"><a href=\"https://lucene.apache.org/solr/guide/query-syntax-and-parsing.html\"><span>Solr Query Syntax</span></a></li>\n\n </ul>\n\n </div>\n\n </div>\n\n </div>\n\n</body>\n</html>\n",
"body_murmur": 178919872,
"body_sha256": "54a66b2ec20daf9aab3c24a08f50af5b4384e3b763c2e75799a774c7b18260f9",
"component": [
"AngularJS"
],
"content_length": -1,
"headers": {
"cache_control": [
"max-age=2592000"
],
"content_type": [
"text/html; charset=utf-8"
],
"x_frame_options": [
"DENY"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"content_length": -1,
"headers": {
"location": [
"http://182.160.17.247:8983/solr/"
]
},
"location": "http://182.160.17.247:8983/solr/",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Found"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"http://182.160.17.247:8983"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:8983",
"path": "/solr/",
"scheme": "http"
}
},
"status_code": 200,
"title": "Solr Admin"
},
"solrdb": {
"directory": "/var/lib/solr",
"impl_version": "7.5.0-SNAPSHOT b5bf70b7e32d7ddd9742cc821d471c5fabd4e3df - systems - 2019-06-14 12:18:19",
"index": [
"storm_crawler"
],
"jvm": {
"stats": "Oracle Corporation OpenJDK 64-Bit Server VM",
"version": "1.8.0_212 25.212-b03"
},
"lucene": {
"impl_version": "7.5.0-SNAPSHOT b5bf70b7e32d7ddd9742cc821d471c5fabd4e3df - systems - 2019-06-14 12:13:19",
"spec_version": "7.5.0"
},
"system": {
"arch": "amd64",
"name": "Linux",
"uname": "Linux storm1 4.9.0-9-amd64 #1 SMP Debian 4.9.168-1+deb9u2 (2019-05-13) x86_64 GNU/Linux\n",
"version": "4.9.0-9-amd64"
},
"version": "7.5.0",
"vm": {
"name": "OpenJDK 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.212-b03"
}
}
},
"url": "http://182.160.17.247:8983/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T10:47:43.21Z"
},
{
"port": 9042,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:9042",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:9042/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T15:00:57.497Z"
},
{
"port": 9092,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:9092",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:9092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-19T03:19:38.858Z"
},
{
"port": 9093,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:9093",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:9093/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T15:20:10.108Z"
},
{
"port": 9200,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"elasticsearch": {
"info": {
"cluster_name": "elasticsearch",
"cluster_uuid": "rVWgvXS0Kf2TL2a075yU-A",
"name": "YR2TKCR",
"tagline": "You Know, for Search",
"version": {
"build_date": "2017-01-11T20:18:39.146Z",
"build_hash": "c8c3c41",
"lucene_version": "6.3.0",
"number": "5.1.2"
}
}
},
"http": {
"body": "{\r\n \"name\" : \"YR2TKCR\",\r\n \"cluster_name\" : \"elasticsearch\",\r\n \"cluster_uuid\" : \"rVWgvXS0Kf2TL2a075yU-A\",\r\n \"version\" : {\r\n \"number\" : \"5.1.2\",\r\n \"build_hash\" : \"c8c3c41\",\r\n \"build_date\" : \"2017-01-11T20:18:39.146Z\",\r\n \"build_snapshot\" : false,\r\n \"lucene_version\" : \"6.3.0\"\r\n },\r\n \"tagline\" : \"You Know, for Search\"\r\n}",
"body_murmur": 1701962934,
"body_sha256": "0d1c64ed728c404006b8de85487382dfd39eeb8ca06f344813bbe247f5cc708e",
"content_length": -1,
"headers": {
"content_type": [
"text/html; charset=UTF-8"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:9200",
"path": "",
"scheme": "http"
}
},
"status_code": 200
}
},
"url": "http://182.160.17.247:9200/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T21:29:41.135Z"
},
{
"port": 10250,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:10250",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:10250/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T10:52:16.762Z"
},
{
"port": 11211,
"protocol": "tcp",
"name": "memcached",
"version": "1.4.22",
"product": "Memcached",
"extra_info": "uptime 4119406 seconds",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:memcached:memcached:1.4.22",
"part": "a",
"vendor": "memcached",
"product": "memcached",
"version": "1\\.4\\.22",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"memcached": {
"settings": {
"auth_enabled_sasl": "no",
"binding_protocol": "auto-negotiate",
"cas_enabled": "yes",
"chunk_size": "48",
"detail_enabled": "no",
"domain_socket": "NULL",
"evictions": "on",
"flush_enabled": "yes",
"growth_factor": "1.25",
"hash_algorithm": "jenkins",
"hashpower_init": "0",
"inter": "10.2.2.118",
"item_size_max": "1048576",
"lru_crawler": "no",
"lru_crawler_sleep": "100",
"lru_crawler_tocrawl": "0",
"maxbytes": "4294967296",
"maxconns": "1024",
"maxconns_fast": "no",
"num_threads": "4",
"num_threads_per_udp": "4",
"oldest": "0",
"reqs_per_event": "20",
"slab_reassign": "no",
"stat_key_prefix": ":",
"tail_repair_time": "0",
"tcp_backlog": "1024",
"tcpport": "11211",
"udpport": "11211",
"umask": "700",
"verbosity": "0"
},
"stats": {
"accepting_conns": "1",
"auth_cmds": "0",
"auth_errors": "0",
"bytes": "1715130",
"bytes_read": "95465867",
"bytes_written": "70039601",
"cas_badval": "0",
"cas_hits": "0",
"cas_misses": "0",
"cmd_flush": "0",
"cmd_get": "458100",
"cmd_set": "458109",
"cmd_touch": "0",
"conn_yields": "0",
"connection_structures": "25",
"crawler_reclaimed": "0",
"curr_connections": "5",
"curr_items": "4631",
"decr_hits": "0",
"decr_misses": "0",
"delete_hits": "0",
"delete_misses": "0",
"evicted_unfetched": "0",
"evictions": "0",
"expired_unfetched": "18622",
"get_hits": "430915",
"get_misses": "27185",
"hash_bytes": "524288",
"hash_power_level": "16",
"incr_hits": "0",
"incr_misses": "0",
"libevent": "2.0.21-stable",
"limit_maxbytes": "4294967296",
"listen_disabled_num": "0",
"lrutail_reflocked": "0",
"malloc_fails": "0",
"pid": "1296",
"pointer_size": "64",
"reclaimed": "18624",
"reserved_fds": "20",
"rusage_system": "142.976000",
"rusage_user": "90.704000",
"threads": "4",
"time": "1502202008",
"total_connections": "458196",
"total_items": "458109",
"touch_hits": "0",
"touch_misses": "0",
"uptime": "4119406",
"version": "1.4.22"
}
}
},
"cve": [
{
"id": "CVE-2016-8704",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2016-8705",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2016-8706",
"score": 8.1,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T15:25:08.824Z"
},
{
"port": 11434,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:11434",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:11434/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-18T15:12:52.129Z"
},
{
"port": 15671,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:15671",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:15671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T03:27:53.903Z"
},
{
"port": 15672,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:15672",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:15672/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T14:16:07.314Z"
},
{
"port": 20000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:20000",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:20000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T21:09:48.319Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "mongodb",
"version": "2.4.9",
"product": "MongoDB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mongodb:mongodb:2.4.9",
"part": "a",
"vendor": "mongodb",
"product": "mongodb",
"version": "2\\.4\\.9",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mongodb": {
"allocator": "tcmalloc",
"bits": 64,
"cc": "",
"cc_flags": "",
"cxx": "",
"cxx_flags": "",
"databases": [
{
"empty": false,
"name": "merci",
"size_on_disk": 218103808
},
{
"empty": false,
"name": "local",
"size_on_disk": 83886080
},
{
"empty": false,
"name": "admin",
"size_on_disk": 218103808
}
],
"dist_arch": "",
"dist_mod": "",
"git_version": "52fe0d21959e32a5bdbecdc62057db386e4e029c",
"is_master": true,
"javascript_engine": "V8",
"link_flags": "",
"logical_session_timeout_minutes": 0,
"max_bson_object_size": 16777216,
"max_message_size_bytes": 48000000,
"max_wire_version": 0,
"max_write_batch_size": 0,
"read_only": false,
"storage_engines": null,
"sys_info": "Linux ip-10-2-29-40 2.6.21.7-2.ec2.v1.2.fc8xen #1 SMP Fri Nov 20 17:48:28 EST 2009 x86_64 BOOST_LIB_VERSION=1_49",
"target_arch": "",
"target_os": "",
"total_size": 520093696,
"version": "2.4.9"
}
},
"cve": [
{
"id": "CVE-2013-2132",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2014-8180",
"score": 5.5,
"severity": "medium"
},
{
"id": "CVE-2015-1609",
"score": 5,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T03:55:39.953Z"
},
{
"port": 27018,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:27018",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:27018/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T05:02:39.071Z"
},
{
"port": 27019,
"protocol": "tcp",
"name": "http",
"version": "4.07 UPnP/1.0",
"product": "Allegro RomPager",
"extra_info": "ZyXEL ZyWALL 2",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:allegro:rompager:4.07_upnp%2F1.0",
"part": "a",
"vendor": "allegro",
"product": "rompager",
"version": "4\\.07_upnp\\/1\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head>\r\n<title>Object Not Found</title></head><body>\r\n<h1>Object Not Found</h1>The requested URL '/' was not found on the RomPager server.<p>Return to <A HREF=\"\">last page</A><p>\r\n</body></html>",
"body_murmur": -2031469209,
"body_sha256": "dfc78db43f0a23b921497ac5680bcae8f5b6bc024aec019a3395a56b4826d2b6",
"content_length": 202,
"headers": {
"content_length": [
"202"
],
"content_type": [
"text/html; charset=UTF-8"
],
"server": [
"RomPager/4.07 UPnP/1.0"
],
"unknown": [
{
"key": "ext",
"value": [
""
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:27019",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Object Not Found"
}
},
"url": "http://182.160.17.247:27019/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-22T05:05:36.391Z"
},
{
"port": 29092,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html><head><title>Document Error: Unauthorized</title></head>\r\n<body><h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p></body></html>",
"body_murmur": -98713449,
"body_sha256": "a343e88a5646b4a898c6b28fd6fd0d630a78870ab568c2f2c5e0b9fc93415d15",
"component": [
"GoAhead"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-cache"
],
"content_type": [
"text/html"
],
"date": [
"Thu Aug 17 01:46:14 2017"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"www_authenticate": [
"Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"0226f7e42caa61d16d835f1717f7a475\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.160.17.247:29092",
"path": "",
"scheme": "http"
}
},
"status_code": 401,
"title": "Document Error: Unauthorized"
}
},
"url": "http://182.160.17.247:29092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-17T20:29:26.876Z"
}
],
"services_hash": "61065a140dfa7249215827f0cb4f2098e665201978852ddf62ff8a8083d8b12b",
"last_updated_at": "2025-11-22T09:17:39.943Z",
"banner": [
"http",
"mysql",
"tls",
"couchdb",
"solrdb",
"redis",
"elasticsearch",
"memcached",
"mongodb",
"ftp",
"ssh",
"telnet",
"smtp",
"pop3",
"imap",
"smb"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"21/ftp"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"21/ftp"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"21/ftp"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"21/ftp"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2005-2089": {
"id": "CVE-2005-2089",
"references": [
"http://seclists.org/lists/bugtraq/2005/Jun/0025.html",
"http://www.securiteam.com/securityreviews/5GP0220G0U.html",
"http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/42899"
],
"score": 4.3,
"services": [
"8086/http"
],
"severity": "medium",
"summary": "Microsoft IIS 5.0 and 6.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes IIS to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\"",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-444"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-1446": {
"id": "CVE-2008-1446",
"references": [
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://secunia.com/advisories/32248",
"http://www.kb.cert.org/vuls/id/793233",
"http://www.securityfocus.com/bid/31682",
"http://www.securitytracker.com/id?1021048",
"http://www.us-cert.gov/cas/techalerts/TA08-288A.html",
"http://www.vupen.com/english/advisories/2008/2813",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45545",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45548",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://secunia.com/advisories/32248",
"http://www.kb.cert.org/vuls/id/793233",
"http://www.securityfocus.com/bid/31682",
"http://www.securitytracker.com/id?1021048",
"http://www.us-cert.gov/cas/techalerts/TA08-288A.html",
"http://www.vupen.com/english/advisories/2008/2813",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45545",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45548",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764"
],
"score": 9,
"services": [
"8086/http"
],
"severity": "high",
"summary": "Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka \"Integer Overflow in IPP Service Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"weakness": "CWE-190"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2009-1535": {
"id": "CVE-2009-1535",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0135.html",
"http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0139.html",
"http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0144.html",
"http://archives.neohapsis.com/archives/fulldisclosure/2009-05/att-0135/IIS_Advisory.pdf",
"http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html",
"http://isc.sans.org/diary.html?n&storyid=6397",
"http://view.samurajdata.se/psview.php?id=023287d6&page=1",
"http://www.attrition.org/pipermail/vim/2009-June/002192.html",
"http://www.us-cert.gov/cas/techalerts/TA09-160A.html",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6029"
],
"score": 7.5,
"services": [
"8086/http"
],
"severity": "high",
"summary": "The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a \"/protected/\" initial pathname component to bypass the password protection on the protected\\ folder, aka \"IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability,\" a different vulnerability than CVE-2009-1122.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-287"
},
"CVE-2009-2521": {
"id": "CVE-2009-2521",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0040.html",
"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ975191",
"http://www.us-cert.gov/cas/techalerts/TA09-286A.html",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-053",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6508",
"http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0040.html",
"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ975191",
"http://www.us-cert.gov/cas/techalerts/TA09-286A.html",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-053",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6508"
],
"score": 5,
"services": [
"8086/http"
],
"severity": "medium",
"summary": "Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka \"IIS FTP Service DoS Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-400"
},
"CVE-2009-4444": {
"id": "CVE-2009-4444",
"references": [
"http://blogs.technet.com/msrc/archive/2009/12/27/new-reports-of-a-vulnerability-in-iis.aspx",
"http://secunia.com/advisories/37831",
"http://securitytracker.com/id?1023387",
"http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
"http://www.securityfocus.com/bid/37460",
"http://www.vupen.com/english/advisories/2009/3634"
],
"score": 6,
"services": [
"8086/http"
],
"severity": "medium",
"summary": "Microsoft Internet Information Services (IIS) 5.x and 6.x uses only the portion of a filename before a ; (semicolon) character to determine the file extension, which allows remote attackers to bypass intended extension restrictions of third-party upload applications via a filename with a (1) .asp, (2) .cer, or (3) .asa first extension, followed by a semicolon and a safe extension, as demonstrated by the use of asp.dll to handle a .asp;.jpg file.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2009-4445": {
"id": "CVE-2009-4445",
"references": [
"http://securitytracker.com/id?1023387",
"http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/55308",
"http://securitytracker.com/id?1023387",
"http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/55308"
],
"score": 6,
"services": [
"8086/http"
],
"severity": "medium",
"summary": "Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax. NOTE: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"weakness": "CWE-20"
},
"CVE-2013-2132": {
"id": "CVE-2013-2132",
"references": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597",
"http://lists.opensuse.org/opensuse-updates/2013-06/msg00180.html",
"http://seclists.org/oss-sec/2013/q2/447",
"http://ubuntu.com/usn/usn-1897-1",
"http://www.debian.org/security/2013/dsa-2705",
"http://www.osvdb.org/93804",
"http://www.securityfocus.com/bid/60252",
"https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2",
"https://jira.mongodb.org/browse/PYTHON-532",
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597",
"http://lists.opensuse.org/opensuse-updates/2013-06/msg00180.html",
"http://seclists.org/oss-sec/2013/q2/447",
"http://ubuntu.com/usn/usn-1897-1",
"http://www.debian.org/security/2013/dsa-2705",
"http://www.osvdb.org/93804",
"http://www.securityfocus.com/bid/60252",
"https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2",
"https://jira.mongodb.org/browse/PYTHON-532"
],
"score": 4.3,
"services": [
"27017/mongodb"
],
"severity": "medium",
"summary": "bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an \"invalid DBRef.\"",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2013-7458": {
"id": "CVE-2013-7458",
"references": [
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00029.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00030.html",
"http://www.debian.org/security/2016/dsa-3634",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832460",
"https://github.com/antirez/linenoise/issues/121",
"https://github.com/antirez/linenoise/pull/122",
"https://github.com/antirez/redis/blob/3.2/00-RELEASENOTES",
"https://github.com/antirez/redis/issues/3284",
"https://github.com/antirez/redis/pull/1418",
"https://github.com/antirez/redis/pull/3322",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00029.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00030.html",
"http://www.debian.org/security/2016/dsa-3634",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832460",
"https://github.com/antirez/linenoise/issues/121",
"https://github.com/antirez/linenoise/pull/122",
"https://github.com/antirez/redis/blob/3.2/00-RELEASENOTES",
"https://github.com/antirez/redis/issues/3284",
"https://github.com/antirez/redis/pull/1418",
"https://github.com/antirez/redis/pull/3322"
],
"score": 3.3,
"services": [
"6379/redis"
],
"severity": "low",
"summary": "linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2014-8180": {
"id": "CVE-2014-8180",
"references": [
"https://access.redhat.com/documentation/en-us/red_hat_satellite/6.2/html/installation_guide/preparing_your_environment_for_installation#restricting_access_to_mongod",
"https://bugzilla.redhat.com/show_bug.cgi?id=1301703",
"https://access.redhat.com/documentation/en-us/red_hat_satellite/6.2/html/installation_guide/preparing_your_environment_for_installation#restricting_access_to_mongod",
"https://bugzilla.redhat.com/show_bug.cgi?id=1301703"
],
"score": 5.5,
"services": [
"27017/mongodb"
],
"severity": "medium",
"summary": "MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-287"
},
"CVE-2015-1609": {
"id": "CVE-2015-1609",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152493.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153690.html",
"http://www.securitytracker.com/id/1034466",
"http://www.splunk.com/view/SP-CAAAPC3",
"https://jira.mongodb.org/browse/SERVER-17264",
"https://security.gentoo.org/glsa/201611-13",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152493.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153690.html",
"http://www.securitytracker.com/id/1034466",
"http://www.splunk.com/view/SP-CAAAPC3",
"https://jira.mongodb.org/browse/SERVER-17264",
"https://security.gentoo.org/glsa/201611-13"
],
"score": 5,
"services": [
"27017/mongodb"
],
"severity": "medium",
"summary": "MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2015-1761": {
"id": "CVE-2015-1761",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
],
"score": 6.5,
"services": [
"1433/ms-sql-s"
],
"severity": "medium",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "CWE-284"
},
"CVE-2015-1762": {
"id": "CVE-2015-1762",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 7.1,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"weakness": "CWE-74"
},
"CVE-2015-1763": {
"id": "CVE-2015-1763",
"references": [
"http://www.securitytracker.com/id/1032893",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
],
"score": 8.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
"vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"weakness": "CWE-284"
},
"CVE-2015-4335": {
"id": "CVE-2015-4335",
"references": [
"http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html",
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html",
"http://rhn.redhat.com/errata/RHSA-2015-1676.html",
"http://www.debian.org/security/2015/dsa-3279",
"http://www.openwall.com/lists/oss-security/2015/06/04/12",
"http://www.openwall.com/lists/oss-security/2015/06/04/8",
"http://www.openwall.com/lists/oss-security/2015/06/05/3",
"http://www.securityfocus.com/bid/75034",
"https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411",
"https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ",
"https://security.gentoo.org/glsa/201702-16",
"http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html",
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html",
"http://rhn.redhat.com/errata/RHSA-2015-1676.html",
"http://www.debian.org/security/2015/dsa-3279",
"http://www.openwall.com/lists/oss-security/2015/06/04/12",
"http://www.openwall.com/lists/oss-security/2015/06/04/8",
"http://www.openwall.com/lists/oss-security/2015/06/05/3",
"http://www.securityfocus.com/bid/75034",
"https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411",
"https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ",
"https://security.gentoo.org/glsa/201702-16"
],
"score": 10,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "CWE-17"
},
"CVE-2015-8080": {
"id": "CVE-2015-8080",
"references": [
"http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html",
"http://rhn.redhat.com/errata/RHSA-2016-0095.html",
"http://rhn.redhat.com/errata/RHSA-2016-0096.html",
"http://rhn.redhat.com/errata/RHSA-2016-0097.html",
"http://www.debian.org/security/2015/dsa-3412",
"http://www.openwall.com/lists/oss-security/2015/11/06/2",
"http://www.openwall.com/lists/oss-security/2015/11/06/4",
"http://www.securityfocus.com/bid/77507",
"https://github.com/antirez/redis/issues/2855",
"https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201702-16",
"http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html",
"http://rhn.redhat.com/errata/RHSA-2016-0095.html",
"http://rhn.redhat.com/errata/RHSA-2016-0096.html",
"http://rhn.redhat.com/errata/RHSA-2016-0097.html",
"http://www.debian.org/security/2015/dsa-3412",
"http://www.openwall.com/lists/oss-security/2015/11/06/2",
"http://www.openwall.com/lists/oss-security/2015/11/06/4",
"http://www.securityfocus.com/bid/77507",
"https://github.com/antirez/redis/issues/2855",
"https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201702-16"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2016-10517": {
"id": "CVE-2016-10517",
"references": [
"http://www.securityfocus.com/bid/101572",
"https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50",
"https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/",
"http://www.securityfocus.com/bid/101572",
"https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50",
"https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/"
],
"score": 7.4,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "networking.c in Redis before 3.2.7 allows \"Cross Protocol Scripting\" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"weakness": "CWE-254"
},
"CVE-2016-6494": {
"id": "CVE-2016-6494",
"references": [
"http://www.openwall.com/lists/oss-security/2016/07/29/4",
"http://www.openwall.com/lists/oss-security/2016/07/29/8",
"http://www.securityfocus.com/bid/92204",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908",
"https://bugzilla.redhat.com/show_bug.cgi?id=1362553",
"https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0",
"https://jira.mongodb.org/browse/SERVER-25335",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MCE2ZLFBNOK3TTWSTXZJQGZVP4EEJDL/",
"http://www.openwall.com/lists/oss-security/2016/07/29/4",
"http://www.openwall.com/lists/oss-security/2016/07/29/8",
"http://www.securityfocus.com/bid/92204",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908",
"https://bugzilla.redhat.com/show_bug.cgi?id=1362553",
"https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0",
"https://jira.mongodb.org/browse/SERVER-25335",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MCE2ZLFBNOK3TTWSTXZJQGZVP4EEJDL/"
],
"score": 5.5,
"services": [
"27017/mongodb"
],
"severity": "medium",
"summary": "The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2016-8704": {
"id": "CVE-2016-8704",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://rhn.redhat.com/errata/RHSA-2016-2820.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0219/",
"https://access.redhat.com/errata/RHSA-2017:0059",
"https://security.gentoo.org/glsa/201701-12",
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://rhn.redhat.com/errata/RHSA-2016-2820.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0219/",
"https://access.redhat.com/errata/RHSA-2017:0059",
"https://security.gentoo.org/glsa/201701-12"
],
"score": 9.8,
"services": [
"11211/memcached"
],
"severity": "critical",
"summary": "An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2016-8705": {
"id": "CVE-2016-8705",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://rhn.redhat.com/errata/RHSA-2016-2820.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0220/",
"https://access.redhat.com/errata/RHSA-2017:0059",
"https://security.gentoo.org/glsa/201701-12",
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://rhn.redhat.com/errata/RHSA-2016-2820.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0220/",
"https://access.redhat.com/errata/RHSA-2017:0059",
"https://security.gentoo.org/glsa/201701-12"
],
"score": 9.8,
"services": [
"11211/memcached"
],
"severity": "critical",
"summary": "Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2016-8706": {
"id": "CVE-2016-8706",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0221/",
"https://security.gentoo.org/glsa/201701-12",
"http://rhn.redhat.com/errata/RHSA-2016-2819.html",
"http://www.debian.org/security/2016/dsa-3704",
"http://www.securityfocus.com/bid/94083",
"http://www.securitytracker.com/id/1037333",
"http://www.talosintelligence.com/reports/TALOS-2016-0221/",
"https://security.gentoo.org/glsa/201701-12"
],
"score": 8.1,
"services": [
"11211/memcached"
],
"severity": "high",
"summary": "An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2017-9951": {
"id": "CVE-2017-9951",
"references": [
"http://www.securityfocus.com/bid/99874",
"https://github.com/memcached/memcached/wiki/ReleaseNotes1439",
"https://groups.google.com/forum/message/raw?msg=memcached/ubGWrkmrr4E/nrm1SeVJAQAJ",
"https://usn.ubuntu.com/3588-1/",
"https://www.debian.org/security/2018/dsa-4218",
"https://www.twistlock.com/2017/07/13/cve-2017-9951-heap-overflow-memcached-server-1-4-38-twistlock-vulnerability-report/",
"http://www.securityfocus.com/bid/99874",
"https://github.com/memcached/memcached/wiki/ReleaseNotes1439",
"https://groups.google.com/forum/message/raw?msg=memcached/ubGWrkmrr4E/nrm1SeVJAQAJ",
"https://usn.ubuntu.com/3588-1/",
"https://www.debian.org/security/2018/dsa-4218",
"https://www.twistlock.com/2017/07/13/cve-2017-9951-heap-overflow-memcached-server-1-4-38-twistlock-vulnerability-report/"
],
"score": 7.5,
"services": [
"11211/memcached"
],
"severity": "high",
"summary": "The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-1000127": {
"id": "CVE-2018-1000127",
"references": [
"https://access.redhat.com/errata/RHSA-2018:2290",
"https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00",
"https://github.com/memcached/memcached/issues/271",
"https://github.com/memcached/memcached/wiki/ReleaseNotes1437",
"https://lists.debian.org/debian-lts-announce/2018/03/msg00031.html",
"https://usn.ubuntu.com/3601-1/",
"https://www.debian.org/security/2018/dsa-4218",
"https://access.redhat.com/errata/RHSA-2018:2290",
"https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00",
"https://github.com/memcached/memcached/issues/271",
"https://github.com/memcached/memcached/wiki/ReleaseNotes1437",
"https://lists.debian.org/debian-lts-announce/2018/03/msg00031.html",
"https://usn.ubuntu.com/3601-1/",
"https://www.debian.org/security/2018/dsa-4218"
],
"score": 7.5,
"services": [
"11211/memcached"
],
"severity": "high",
"summary": "memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2018-11218": {
"id": "CVE-2018-11218",
"references": [
"http://antirez.com/news/119",
"http://www.securityfocus.com/bid/104553",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3",
"https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0",
"https://github.com/antirez/redis/issues/5017",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201908-04",
"https://www.debian.org/security/2018/dsa-4230",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"http://antirez.com/news/119",
"http://www.securityfocus.com/bid/104553",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3",
"https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0",
"https://github.com/antirez/redis/issues/5017",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201908-04",
"https://www.debian.org/security/2018/dsa-4230",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
],
"score": 9.8,
"services": [
"6379/redis"
],
"severity": "critical",
"summary": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2018-11219": {
"id": "CVE-2018-11219",
"references": [
"http://antirez.com/news/119",
"http://www.securityfocus.com/bid/104552",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3",
"https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936",
"https://github.com/antirez/redis/issues/5017",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201908-04",
"https://www.debian.org/security/2018/dsa-4230",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"http://antirez.com/news/119",
"http://www.securityfocus.com/bid/104552",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3",
"https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936",
"https://github.com/antirez/redis/issues/5017",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://security.gentoo.org/glsa/201908-04",
"https://www.debian.org/security/2018/dsa-4230",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
],
"score": 9.8,
"services": [
"6379/redis"
],
"severity": "critical",
"summary": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2018-12326": {
"id": "CVE-2018-12326",
"references": [
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/",
"https://access.redhat.com/errata/RHSA-2019:0052",
"https://access.redhat.com/errata/RHSA-2019:0094",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
"https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"https://www.exploit-db.com/exploits/44904/"
],
"score": 8.4,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.",
"vector_string": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2018-12453": {
"id": "CVE-2018-12453",
"references": [
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/",
"https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
"https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
"https://www.exploit-db.com/exploits/44908/"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-704"
},
"CVE-2019-11596": {
"id": "CVE-2019-11596",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html",
"https://github.com/memcached/memcached/commit/d35334f368817a77a6bd1f33c6a5676b2c402c02",
"https://github.com/memcached/memcached/compare/ee1cfe3...50bdc9f",
"https://github.com/memcached/memcached/issues/474",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUE3QBMP5UWTXMPKJREUICH6DIK6SOBX/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2CCWRM4LHB253KG5SPOKRVDCXQX5VZR/",
"https://usn.ubuntu.com/3963-1/",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html",
"https://github.com/memcached/memcached/commit/d35334f368817a77a6bd1f33c6a5676b2c402c02",
"https://github.com/memcached/memcached/compare/ee1cfe3...50bdc9f",
"https://github.com/memcached/memcached/issues/474",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUE3QBMP5UWTXMPKJREUICH6DIK6SOBX/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2CCWRM4LHB253KG5SPOKRVDCXQX5VZR/",
"https://usn.ubuntu.com/3963-1/"
],
"score": 7.5,
"services": [
"11211/memcached"
],
"severity": "high",
"summary": "In memcached before 1.5.14, a NULL pointer dereference was found in the \"lru mode\" and \"lru temp_ttl\" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2020-14147": {
"id": "CVE-2020-14147",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
"https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
"https://github.com/antirez/redis/pull/6875",
"https://security.gentoo.org/glsa/202008-17",
"https://www.debian.org/security/2020/dsa-4731",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 7.7,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-32036": {
"id": "CVE-2021-32036",
"references": [
"https://jira.mongodb.org/browse/SERVER-59294",
"https://jira.mongodb.org/browse/SERVER-59294"
],
"score": 5.4,
"services": [
"27017/mongodb"
],
"severity": "medium",
"summary": "An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.3; MongoDB Server v4.4 versions prior to and including 4.4.9; MongoDB Server v4.2 versions prior to and including 4.2.16 and MongoDB Server v4.0 versions prior to and including 4.0.28",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"weakness": "CWE-770"
},
"CVE-2021-32761": {
"id": "CVE-2021-32761",
"references": [
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001",
"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
"https://security.gentoo.org/glsa/202209-17",
"https://security.netapp.com/advisory/ntap-20210827-0004/",
"https://www.debian.org/security/2021/dsa-5001"
],
"score": 7.5,
"services": [
"6379/redis"
],
"severity": "high",
"summary": "Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-125"
},
"CVE-2021-3470": {
"id": "CVE-2021-3470",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
"https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
],
"score": 5.3,
"services": [
"6379/redis"
],
"severity": "medium",
"summary": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-119"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"21/ftp"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"21/ftp"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"21/ftp"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"21/ftp"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"21/ftp"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-28531": {
"id": "CVE-2023-28531",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230413-0008/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openwall.com/lists/oss-security/2023/03/15/8",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230413-0008/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openwall.com/lists/oss-security/2023/03/15/8"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-38408": {
"id": "CVE-2023-38408",
"references": [
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-428"
},
"CVE-2023-46852": {
"id": "CVE-2023-46852",
"references": [
"https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767",
"https://github.com/memcached/memcached/compare/1.6.21...1.6.22",
"https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767",
"https://github.com/memcached/memcached/compare/1.6.21...1.6.22"
],
"score": 7.5,
"services": [
"11211/memcached"
],
"severity": "high",
"summary": "In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the \"get\" substring.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-120"
},
"CVE-2023-46853": {
"id": "CVE-2023-46853",
"references": [
"https://github.com/memcached/memcached/commit/6987918e9a3094ec4fc8976f01f769f624d790fa",
"https://github.com/memcached/memcached/compare/1.6.21...1.6.22",
"https://github.com/memcached/memcached/commit/6987918e9a3094ec4fc8976f01f769f624d790fa",
"https://github.com/memcached/memcached/compare/1.6.21...1.6.22"
],
"score": 9.8,
"services": [
"11211/memcached"
],
"severity": "critical",
"summary": "In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \\n is used instead of \\r\\n.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-193"
},
"CVE-2023-48795": {
"id": "CVE-2023-48795",
"references": [
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html",
"https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-354"
},
"CVE-2023-51384": {
"id": "CVE-2023-51384",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-51385": {
"id": "CVE-2023-51385",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"http://www.openwall.com/lists/oss-security/2025/10/07/1",
"http://www.openwall.com/lists/oss-security/2025/10/12/1",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"weakness": "CWE-78"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/2",
"http://www.openwall.com/lists/oss-security/2025/09/23/1",
"http://www.openwall.com/lists/oss-security/2025/09/23/3",
"http://www.openwall.com/lists/oss-security/2025/09/23/4",
"http://www.openwall.com/lists/oss-security/2025/09/23/5",
"http://www.openwall.com/lists/oss-security/2025/09/24/4",
"http://www.openwall.com/lists/oss-security/2025/09/24/7",
"http://www.openwall.com/lists/oss-security/2025/09/25/2",
"http://www.openwall.com/lists/oss-security/2025/09/25/6",
"http://www.openwall.com/lists/oss-security/2025/09/26/2",
"http://www.openwall.com/lists/oss-security/2025/09/26/4",
"http://www.openwall.com/lists/oss-security/2025/09/27/1",
"http://www.openwall.com/lists/oss-security/2025/09/27/2",
"http://www.openwall.com/lists/oss-security/2025/09/27/3",
"http://www.openwall.com/lists/oss-security/2025/09/27/4",
"http://www.openwall.com/lists/oss-security/2025/09/27/5",
"http://www.openwall.com/lists/oss-security/2025/09/27/6",
"http://www.openwall.com/lists/oss-security/2025/09/27/7",
"http://www.openwall.com/lists/oss-security/2025/09/28/7",
"http://www.openwall.com/lists/oss-security/2025/09/29/1",
"http://www.openwall.com/lists/oss-security/2025/09/29/4",
"http://www.openwall.com/lists/oss-security/2025/09/29/5",
"http://www.openwall.com/lists/oss-security/2025/09/29/6",
"http://www.openwall.com/lists/oss-security/2025/10/01/1",
"http://www.openwall.com/lists/oss-security/2025/10/01/2",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://packetstorm.news/files/id/190587/",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.exploit-db.com/exploits/52269",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}