Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.160.27.25

SummaryCVE DetailsRaw Data
27 Jan 2026, 11:28:55 UTC
{
  "scan_id": 1769233337,
  "ip": "182.160.27.25",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.160.24.0/21",
    "postal_code": "",
    "coordinates": {
      "latitude": "-33.4521",
      "longitude": "-70.6536"
    },
    "geo_point": "-33.4521, -70.6536",
    "locale_code": "en",
    "continent": "South America",
    "country_code": "CL",
    "country_name": "Chile",
    "city": "Santiago"
  },
  "location_updated_at": "2026-01-26T00:42:18Z",
  "asn": {
    "number": "AS136907",
    "organization": "HUAWEI CLOUDS",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.160.24.0/21",
    "organization": "Huawei Cloud Chile Region",
    "descr": "Huawei Cloud Chile Region",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:05:18Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-01-26T00:42:18Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-01-26T04:25:25Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-01-26T00:42:18Z"
    }
  ],
  "hostnames": [
    {
      "name": "ecs-182-160-27-25.compute.hwclouds-dns.com",
      "last_updated_at": "2026-01-26T04:25:25Z"
    }
  ],
  "services": [
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ecs-appserver.uac.cl ESMTP Postfix (Ubuntu)\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ecs-appserver.uac.cl"
                ]
              },
              "subject_key_id": "8d76720d9d5e3687d22c440ff1e0340791c57437"
            },
            "fingerprint_md5": "2742FF6946EB95C4CD3872BD9E5654F1",
            "fingerprint_sha1": "C59B3769AF67D628EFD49F4F4B897FB52C89978E",
            "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
            "issuer": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "246466276294302157320809117942709098495357926162",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ecs-appserver.uac.cl"
              ],
              "extended_dns_names": [
                {
                  "domain": "uac",
                  "fld": "uac.cl",
                  "subdomain": "ecs-appserver",
                  "tld": "cl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "eb1d00dc62e53e2bad0d482dc6402527c4baa018e8f6a55c2fc6f7dcf8936178",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "72e73380d3a11ef93473b75045deeb61c6ac2a4b3010f46375850e1cc0086120",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2035-02-21T16:33:01",
              "not_before": "2025-02-23T16:33:01"
            },
            "version": 2
          },
          "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-24T13:01:33.861Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.18.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.18\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1136959856,
          "body_sha256": "cb2af61ad14a112c7b5960afd9b27a8227db42b1d0fe838a882b8ab302cc6ccc",
          "component": [
            "Cloudflare",
            "Moodle",
            "PHP"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "135aed33c0a7b8f44f0227a71b9ce345",
            "murmur_hash": -438482901,
            "path": "https://campusvirtualqa.vallecentral.cl/theme/image.php/boost/theme/1745264857/favicon",
            "size": 1150
          },
          "headers": {
            "cache_control": [
              "no-store, no-cache, must-revalidate",
              "post-check=0, pre-check=0, no-transform"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_language": [
              "en"
            ],
            "content_type": [
              "text/html; charset=utf-8"
            ],
            "date": [
              "Sun, 25 Jan 2026 05:49:43 GMT"
            ],
            "expires": [
              "Mon, 20 Aug 1969 09:23:00 GMT"
            ],
            "last_modified": [
              "Sun, 25 Jan 2026 05:49:42 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "cloudflare"
            ],
            "set_cookie": [
              "MoodleSession=14444ed6afeda68509487e4f06f476b0; path=/; secure; HttpOnly"
            ],
            "unknown": [
              {
                "key": "nel",
                "value": [
                  "{\"report_to\":\"cf-nel\",\"success_fraction\":0.0,\"max_age\":604800}"
                ]
              },
              {
                "key": "content_style_type",
                "value": [
                  "text/css"
                ]
              },
              {
                "key": "content_script_type",
                "value": [
                  "text/javascript"
                ]
              },
              {
                "key": "report_to",
                "value": [
                  "{\"group\":\"cf-nel\",\"max_age\":604800,\"endpoints\":[{\"url\":\"https://a.nel.cloudflare.com/report/v4?s=5cgLLjC6k%2FX2nnk066C1joa3olkW1R2S9X4mMPvCpW2o9oVypv3gjFqj16WlJ82230BZKIiLD7WkrmD2TE5DCGNd41dErWyv3HTSnoHWR%2FQBXDdzckz4lZC%2Be57znM0%3D\"}]}"
                ]
              },
              {
                "key": "cf_ray",
                "value": [
                  "9c357d24ddbc9886-FRA"
                ]
              },
              {
                "key": "cf_cache_status",
                "value": [
                  "DYNAMIC"
                ]
              }
            ],
            "vary": [
              "accept-encoding"
            ],
            "x_frame_options": [
              "sameorigin"
            ],
            "x_ua_compatible": [
              "IE=edge"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "body_murmur": 340606299,
              "body_sha256": "f1347cf1352099a3003a1e8d963cc3da864cafbb54e5cc63d08c5cd0e1a6875a",
              "content_length": -1,
              "location": "https://campusvirtualqa.vallecentral.cl/",
              "status_code": 303,
              "status_line": "303 See Other"
            }
          ],
          "status_code": 200,
          "title": "Home | Campus Virtual QA Valle Central",
          "transfer_encoding": [
            "chunked"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "severity": "low"
        }
      ],
      "url": "http://182.160.27.25/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-25T05:49:44.702Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Dovecot pop3d",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "pop3": {
          "banner": "+OK Dovecot (Ubuntu) ready.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ecs-appserver.uac.cl"
                ]
              },
              "subject_key_id": "8d76720d9d5e3687d22c440ff1e0340791c57437"
            },
            "fingerprint_md5": "2742FF6946EB95C4CD3872BD9E5654F1",
            "fingerprint_sha1": "C59B3769AF67D628EFD49F4F4B897FB52C89978E",
            "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
            "issuer": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "246466276294302157320809117942709098495357926162",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ecs-appserver.uac.cl"
              ],
              "extended_dns_names": [
                {
                  "domain": "uac",
                  "fld": "uac.cl",
                  "subdomain": "ecs-appserver",
                  "tld": "cl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "eb1d00dc62e53e2bad0d482dc6402527c4baa018e8f6a55c2fc6f7dcf8936178",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "72e73380d3a11ef93473b75045deeb61c6ac2a4b3010f46375850e1cc0086120",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2035-02-21T16:33:01",
              "not_before": "2025-02-23T16:33:01"
            },
            "version": 2
          },
          "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-26T00:24:44.373Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "imap",
      "version": "",
      "product": "Dovecot imapd",
      "extra_info": "Ubuntu",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "imap": {
          "banner": "* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ecs-appserver.uac.cl"
                ]
              },
              "subject_key_id": "8d76720d9d5e3687d22c440ff1e0340791c57437"
            },
            "fingerprint_md5": "2742FF6946EB95C4CD3872BD9E5654F1",
            "fingerprint_sha1": "C59B3769AF67D628EFD49F4F4B897FB52C89978E",
            "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
            "issuer": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "246466276294302157320809117942709098495357926162",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ecs-appserver.uac.cl"
              ],
              "extended_dns_names": [
                {
                  "domain": "uac",
                  "fld": "uac.cl",
                  "subdomain": "ecs-appserver",
                  "tld": "cl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "eb1d00dc62e53e2bad0d482dc6402527c4baa018e8f6a55c2fc6f7dcf8936178",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "72e73380d3a11ef93473b75045deeb61c6ac2a4b3010f46375850e1cc0086120",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2035-02-21T16:33:01",
              "not_before": "2025-02-23T16:33:01"
            },
            "version": 2
          },
          "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "severity": "low"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-15T12:57:36.698Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "1.18.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.18\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -1582284768,
          "body_sha256": "59b9af3ff18c735b9f6bfddf02de8e818c55f54a0df6d518a958a86df117fc57",
          "component": [
            "Moodle",
            "PHP",
            "Cloudflare"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "135aed33c0a7b8f44f0227a71b9ce345",
            "murmur_hash": -438482901,
            "path": "https://campusvirtualqa.vallecentral.cl/theme/image.php/boost/theme/1745264857/favicon",
            "size": 1150
          },
          "headers": {
            "cache_control": [
              "no-store, no-cache, must-revalidate",
              "post-check=0, pre-check=0, no-transform"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_language": [
              "en"
            ],
            "content_type": [
              "text/html; charset=utf-8"
            ],
            "date": [
              "Sat, 24 Jan 2026 17:52:16 GMT"
            ],
            "expires": [
              "Mon, 20 Aug 1969 09:23:00 GMT"
            ],
            "last_modified": [
              "Sat, 24 Jan 2026 17:52:16 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "cloudflare"
            ],
            "set_cookie": [
              "MoodleSession=372da6bc9bff26d23da76561766875d3; path=/; secure; HttpOnly"
            ],
            "unknown": [
              {
                "key": "nel",
                "value": [
                  "{\"report_to\":\"cf-nel\",\"success_fraction\":0.0,\"max_age\":604800}"
                ]
              },
              {
                "key": "content_script_type",
                "value": [
                  "text/javascript"
                ]
              },
              {
                "key": "cf_ray",
                "value": [
                  "9c3162363d028ebb-FRA"
                ]
              },
              {
                "key": "content_style_type",
                "value": [
                  "text/css"
                ]
              },
              {
                "key": "cf_cache_status",
                "value": [
                  "DYNAMIC"
                ]
              },
              {
                "key": "report_to",
                "value": [
                  "{\"group\":\"cf-nel\",\"max_age\":604800,\"endpoints\":[{\"url\":\"https://a.nel.cloudflare.com/report/v4?s=oXhP9tkNhkk5KGgH0oTgzwqlnG8WrtY%2FKQwjFfFTb%2FG96ry45jQxNDJd4kzXJsWGlAg9WrSpJr4SzzszuVGIazM4MJvR1Lgckawvy7rSc%2FSmWeYU6FFka4miYX7iGO0%3D\"}]}"
                ]
              }
            ],
            "vary": [
              "accept-encoding"
            ],
            "x_frame_options": [
              "sameorigin"
            ],
            "x_ua_compatible": [
              "IE=edge"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "body_murmur": 340606299,
              "body_sha256": "f1347cf1352099a3003a1e8d963cc3da864cafbb54e5cc63d08c5cd0e1a6875a",
              "content_length": -1,
              "location": "https://campusvirtualqa.vallecentral.cl/",
              "status_code": 303,
              "status_line": "303 See Other"
            }
          ],
          "status_code": 200,
          "title": "Home | Campus Virtual QA Valle Central",
          "transfer_encoding": [
            "chunked"
          ]
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "5c925dd89b888daa85c03d2477744533c792094e",
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.campusvirtualqa.vallecentral.cl",
                  "campusvirtualqa.vallecentral.cl",
                  "localhost",
                  "ecs-appserver.uac.cl",
                  "ecs-appserver"
                ]
              },
              "subject_key_id": "5c925dd89b888daa85c03d2477744533c792094e"
            },
            "fingerprint_md5": "B4426AF7F129DDC017D00ABE3B093EE4",
            "fingerprint_sha1": "7CE2DB7B39C04BAC35C5795BFDE67DC937A32697",
            "fingerprint_sha256": "9D2D5EDE4B8F900C15889E8222E29BA9859E3A87CB6BC17F0826049CBFCE4074",
            "issuer": {
              "common_name": [
                "*.campusvirtualqa.vallecentral.cl"
              ]
            },
            "jarm": "2ad2ad0002ad2ad00042d42d000000301510f56407964db9434a9bb0d4ee4a",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "286018275418140007381296633418485922758352611731",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "*.campusvirtualqa.vallecentral.cl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.campusvirtualqa.vallecentral.cl",
                "campusvirtualqa.vallecentral.cl",
                "localhost",
                "ecs-appserver.uac.cl",
                "ecs-appserver"
              ],
              "extended_dns_names": [
                {
                  "domain": "vallecentral",
                  "fld": "vallecentral.cl",
                  "subdomain": "*.campusvirtualqa",
                  "tld": "cl"
                },
                {
                  "domain": "vallecentral",
                  "fld": "vallecentral.cl",
                  "subdomain": "campusvirtualqa",
                  "tld": "cl"
                },
                {
                  "domain": "uac",
                  "fld": "uac.cl",
                  "subdomain": "ecs-appserver",
                  "tld": "cl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e984e3db8f71c619e3398354e9c1115a4cdddeb605945fd9fde57f90f35d3c6d",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "945a05ab3549c19a7d8c4a6cdc000fc5c3d892b1c9f71504600f7cfe04916a7c",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 157680000,
              "not_after": "2030-04-20T19:35:07",
              "not_before": "2025-04-21T19:35:07"
            },
            "version": 2
          },
          "fingerprint_sha256": "9D2D5EDE4B8F900C15889E8222E29BA9859E3A87CB6BC17F0826049CBFCE4074",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "severity": "low"
        }
      ],
      "url": "https://182.160.27.25/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-24T20:29:13.914Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-26T11:45:31.471Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ecs-appserver.uac.cl ESMTP Postfix (Ubuntu)\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ecs-appserver.uac.cl"
                ]
              },
              "subject_key_id": "8d76720d9d5e3687d22c440ff1e0340791c57437"
            },
            "fingerprint_md5": "2742FF6946EB95C4CD3872BD9E5654F1",
            "fingerprint_sha1": "C59B3769AF67D628EFD49F4F4B897FB52C89978E",
            "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
            "issuer": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "246466276294302157320809117942709098495357926162",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "ecs-appserver.uac.cl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ecs-appserver.uac.cl"
              ],
              "extended_dns_names": [
                {
                  "domain": "uac",
                  "fld": "uac.cl",
                  "subdomain": "ecs-appserver",
                  "tld": "cl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "eb1d00dc62e53e2bad0d482dc6402527c4baa018e8f6a55c2fc6f7dcf8936178",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "72e73380d3a11ef93473b75045deeb61c6ac2a4b3010f46375850e1cc0086120",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2035-02-21T16:33:01",
              "not_before": "2025-02-23T16:33:01"
            },
            "version": 2
          },
          "fingerprint_sha256": "C6F9059AFB3A15DE8FE52BB8E71CE7FE6AE9528549AF8579D5F048F9B8819723",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-27T11:28:55.864Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "imap",
      "version": "",
      "product": "Dovecot imapd",
      "extra_info": "Ubuntu",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "cve": [
        {
          "id": "CVE-1999-0431",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "severity": "low"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-26T17:50:48.543Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Dovecot pop3d",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:dovecot:dovecot",
          "part": "a",
          "vendor": "dovecot",
          "product": "dovecot",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-19T07:10:14.621Z"
    }
  ],
  "services_hash": "1d216acff65606e1fee3736cc44deae2489a9462db4ebb3a65c61e0c7d4ee717",
  "last_updated_at": "2026-01-27T11:28:55.864Z",
  "banner": [
    "smtp",
    "tls",
    "http",
    "pop3",
    "imap"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "80/http"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    }
  }
}