182.176.148.27
{
"scan_id": 1769827595,
"ip": "182.176.148.27",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.176.148.0/22",
"postal_code": "35460",
"coordinates": {
"latitude": "31.756",
"longitude": "72.9186"
},
"geo_point": "31.756, 72.9186",
"locale_code": "en",
"continent": "Asia",
"country_code": "PK",
"country_name": "Pakistan",
"city": "Rabwah"
},
"location_updated_at": "2026-02-02T12:41:26Z",
"asn": {
"number": "AS17557",
"organization": "Pakistan Telecommunication Company Limited",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.176.0.0/13",
"organization": "Pakistan Telecommuication company limited",
"descr": "Pakistan Telecommuication company limited,\nCDDT Building, H-9/1, Training Block,\nPakistan Telecommunication Company Limited,\nGM, Multimedia & Broadband",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:22Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-02-02T12:41:26Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-02-02T13:31:16Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-02-02T12:41:26Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "6.47.9",
"product": "MikroTik router ftpd",
"extra_info": "",
"tunnel": "",
"modules": {
"ftp": {
"banner": "220 District Jail Layyah FTP server (MikroTik 6.47.9) ready\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-04T15:44:17.001Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "",
"product": "MikroTik RouterOS sshd",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:mikrotik:routeros",
"part": "o",
"vendor": "mikrotik",
"product": "routeros",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-ROSSSH",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"aes192-cbc",
"aes256-cbc",
"blowfish-cbc",
"3des-cbc"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"hmac-sha1",
"hmac-md5"
],
"host_key_algorithms": [
"ssh-dss",
"rsa-sha2-256",
"ssh-rsa"
],
"kex_algorithms": [
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group-exchange-sha1",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "a405f4f7d5f43034643db088ece3638f5e87c4ce63885cc6d2f4074bd9bc3bef",
"raw": "AAAAB3NzaC1yc2EAAAABAwAAAQEAwC5OxtN3RhgW/ejB4hNn9rVLpL1s1/W7HBVtAMZa9JGukdHxA0uU1TelPAv7H0v7PUlhP7AiI9Dqb5ISQ5HTJK9gDww+qM7p/V8ri1ydMuQdw8tDrGSgMiQR3Fqh9aGZ5JuI2NCDTg9gkNpH3o1vluS3bSIJ3iRAyoqCsQHSEd6oQA/MLV48DjvpRnRNwBFplhEOrwFo8KtlSf7Qykj3Cl6K5kMm8jQ9TjH1Z0PXLROACdVC9DiyKp2jsgx07LDeClgQVfolEz7421UCnsu5IIKyTZskTbvRzLM8CkjJ6kesFQ1PzPrZrehEqafZrC8CjkpTDOCOSYRxQOKmKaJpiw=="
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"aes192-cbc",
"aes256-cbc",
"blowfish-cbc",
"3des-cbc"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"hmac-sha1",
"hmac-md5"
],
"software": "ROSSSH",
"version": "2.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-04T17:29:55.622Z"
},
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Linux telnetd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"telnet": {
"banner": "Login: "
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-03T10:59:37.945Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "MikroTik router config httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:mikrotik:routeros",
"part": "o",
"vendor": "mikrotik",
"product": "routeros",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\r\n<link rel=\"icon\" href=\"/favicon.png\"/>\r\n<title>RouterOS router configuration page</title>\r\n<style type=\"text/css\">\r\nbody {\r\nfont-family: Verdana, Geneva, sans-serif;\r\nfont-size: 11px;\r\n}\r\nimg {border: none}\r\nimg:hover {opacity: 0.8;}\r\nh1 {\r\nfont-size: 1.7em;\r\ndisplay: inline;\r\nmargin-bottom: 10px;\r\n}\r\nfieldset {\r\nmargin-top: 20px;\r\nbackground: #fff;\r\npadding: 20px;\r\nborder: 1px solid #c1c1c1; \r\n}\r\n#container {\r\nwidth: 70%;\r\nmargin: 10% auto;\r\n}\r\n#box {\r\nbackground-color: #fff; \r\n-moz-border-radius: 7px; \r\n-webkit-border-radius: 7px; \r\nborder: 1px solid #c1c1c1; \r\npadding: 30px;\r\nfilter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#ffffff', endColorstr='#f3f3f3'); /* for IE */\r\nbackground: -webkit-gradient(linear, left top, left bottom, from(#fff), to(#f3f3f3)); /* for webkit browsers */\r\nbackground: -moz-linear-gradient(top, #fff, #f3f3f3); /* for firefox 3.6+ */\r\n}\r\n.floater {float: left; margin-right: 10px;}\r\n.floater label {display: block; text-align: center;}\r\n\r\n#login {\r\n margin: 2em 0 4em 0;\r\n}\r\n#login h2 {\r\n font-weight: normal;\r\n font-size: 14px;\r\n margin: 0 0 0.5em 1em;\r\n}\r\n#login td {\r\n padding: 0 4px 0 0;\r\n}\r\n#login td.label {\r\n text-align: right;\r\n}\r\n#login td.toolbar {\r\n padding: 0 0 0 1em;\r\n vertical-align: top;\r\n}\r\n#login ul.toolbar {\r\n margin: 0;\r\n}\r\n#login input {\r\n margin: 2px;\r\n padding: 2px;\r\n border: 1px solid #888;\r\n box-shadow: 1px 1px 3px rgba(0,0,0,0.3);\r\n -webkit-box-shadow: 1px 1px 3px rgba(0,0,0,0.3);\r\n -moz-box-shadow: 1px 1px 3px rgba(0,0,0,0.3);\r\n}\r\n#error {\r\n display:none;\r\n color:red;\r\n padding: 1em 0 0 0;\r\n}\r\nul.toolbar {\r\n font-size: 11px;\r\n text-align: left;\r\n list-style-type: none;\r\n padding: 0;\r\n margin: 2px 0 4px 2px;\r\n}\r\nul.toolbar li {\r\n float: left;\r\n vertical-align: middle;\r\n}\r\nul.toolbar a {\r\n float: none;\r\n display: block;\r\n margin: 2px 4px 2px 0;\r\n padding: 5px;\r\n\r\n background: #ddd;\r\n border: 1px solid #888;\r\n border-radius: 3px;\r\n -moz-border-radius: 3px;\r\n box-shadow:\r\n 1px 1px 2px rgba(255,255,255,0.8) inset,\r\n\t0 10px 10px -5px rgba(255,255,255,0.5) inset, /* top gradient */\r\n\t1px 1px 2px rgba(0,0,0,0.2); /* shadow */\r\n -webkit-box-shadow:\r\n 1px 1px 2px rgba(255,255,255,0.8) inset,\r\n\t0 10px 10px -5px rgba(255,255,255,0.5) inset,\r\n\t1px 1px 2px rgba(0,0,0,0.2);\r\n -moz-box-shadow:\r\n 1px 1px 2px rgba(255,255,255,0.8) inset,\r\n\t0 10px 10px -5px rgba(255,255,255,0.5) inset,\r\n\t1px 1px 2px rgba(0,0,0,0.2);\r\n color: #000;\r\n\r\n text-decoration: none;\r\n text-align: center;\r\n white-space: nowrap;\r\n cursor: inherit;\r\n min-width: 4em;\r\n\r\n -webkit-transition: background 0.2s linear, box-shadow 0.2s ease-out;\r\n -moz-transition: background 0.2s linear, box-shadow 0.2s ease-out;\r\n}\r\nul.toolbar a:hover {\r\n background: #eee;\r\n}\r\nul.toolbar a:active {\r\n background: #aaa;\r\n box-shadow: 1px 1px 2px #999 inset;\r\n -webkit-box-shadow: 1px 1px 2px #999 inset;\r\n -moz-box-shadow: 1px 1px 2px #999 inset;\r\n}\r\n</style>\r\n<script>\r\nfunction get(id) {\r\n return document.getElementById(id);\r\n}\r\nfunction trim(str) {\r\n return str.replace(/^\\s+|\\s+$/g, '');\r\n}\r\nfunction login(user, pwd, autologin) {\r\n var expires = new Date();\r\n expires.setTime(expires.getTime() + (30 * 24 * 60 * 60 * 1000));\r\n document.cookie = 'username=' + user +\r\n '; expires=' + expires.toGMTString() + '; path=/';\r\n\r\n window.name = (autologin ? 'autologin=' : 'login=') + user + '|' + pwd;\r\n window.location.replace('/webfig/' + window.location.hash);\r\n}\r\nfunction dologin() {\r\n login(get('name').value, get('password').value);\r\n}\r\nfunction loaded() {\r\n var p = window.name.split('=');\r\n if (p[0] == 'error' && p[1]) {\r\n var err = get('error');\r\n err.appendChild(document.createTextNode(p[1]));\r\n err.style.display = 'block';\r\n } else if (p[0] != 'noautologin' || p[1] != 1) {\r\n var user = '';\r\n if (user) {\r\n login(user, '', true);\r\n return;\r\n }\r\n }\r\n window.name = '';\r\n\r\n document.onkeydown = function(e) {\r\n e = e || event;\r\n if (e.keyCode == 13) {\r\n dologin();\r\n return false;\r\n }\r\n return true;\r\n };\r\n\r\n var username = null;\r\n var cookies = document.cookie.split(';');\r\n for (var i in cookies) {\r\n\tvar c = trim(cookies[i]).split('=');\r\n\tif (c[0] == 'username') {\r\n\t username = c[1];\r\n\t break;\r\n\t}\r\n }\r\n \r\n if (username != null) {\r\n\tget('name').value = username;\r\n\tget('password').focus();\r\n } else {\r\n get('name').value = 'admin';\r\n\tget('name').focus();\r\n }\r\n}\r\n</script>\r\n</head>\r\n\r\n<body onload=\"loaded()\">\r\n\r\n<div id=\"container\">\r\n\r\n <div id=\"box\">\r\n <a href=\"http://mikrotik.com\"><img src=\"mikrotik_logo.png\" style=\"float: right;\" /></a>\r\n\r\n <br style=\"clear: both;\"/>\r\n \r\n\t\t<h1>RouterOS v6.47.9</h1>\r\n \r\n <p>You have connected to a router. Administrative access only. If this device is not in your possession, please contact your local network administrator. </p>\r\n \r\n <table id=\"login\">\r\n\t<tr><td colspan=\"3\"><h2>WebFig Login:</h2>\r\n <tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\r\n\t <td class=\"toolbar\" rowspan=\"2\">\r\n <ul class=\"toolbar\">\r\n\t <li><a onclick=\"dologin()\" ondragstart=\"return false;\"><span>Login</span></a></li>\r\n </ul>\r\n <tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\r\n\t<tr><td colspan=\"3\">\r\n\t <div id=\"error\"></div>\r\n </table>\r\n \r\n <fieldset>\r\n <div class=\"floater\"> \r\n \t<a href=\"http://www.mikrotik.com/download/winbox.exe\"><img src=\"winbox.png\"/></a><br/>\r\n <label>Winbox</label>\r\n </div>\r\n \r\n <div class=\"floater\"> \r\n \t<a href=\"telnet://182.176.148.27\"><img src=\"console.png\"/></a><br/>\r\n <label>Telnet</label>\r\n </div>\r\n\r\n \r\n \r\n <div class=\"floater\"> \r\n \t<a href=\"/graphs\"><img src=\"green.png\"/></a><br/>\r\n <label>Graphs</label>\r\n </div>\r\n \r\n \r\n <div class=\"floater\"> \r\n \t<a href=\"/help/license.html\"><img src=\"license.png\"/></a><br/>\r\n <label>License</label>\r\n </div>\r\n \r\n\t\t\t<div class=\"floater\"> \r\n \t<a href=\"http://wiki.mikrotik.com\"><img src=\"help.png\"/></a><br/>\r\n <label>Help</label>\r\n </div>\r\n\r\n</fieldset>\r\n \r\n <br style=\"clear: both\"/> \r\n <div style=\"float: right\">© mikrotik</div>\r\n\r\n </div>\r\n</div>\r\n\r\n</div>\r\n\r\n</body>\r\n</html>\r\n",
"body_murmur": -100129214,
"body_sha256": "4cf0d9aa8583eb770fee0f2190a45b4f6858fd61ee0bc53bc31a19c5a76167e6",
"content_length": 7065,
"favicon": {
"md5_hash": "77b2f4c09890ab658a72c4bad8c1077b",
"murmur_hash": 1924358485,
"path": "http://182.176.148.27:80/favicon.png",
"size": 1630
},
"headers": {
"connection": [
"Keep-Alive"
],
"content_length": [
"7065"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 25 Jan 2026 11:00:44 GMT"
],
"expires": [
"0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.176.148.27",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "RouterOS router configuration page"
}
},
"url": "http://182.176.148.27/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-25T11:00:45.879Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-02T08:07:18.589Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "8.0.32",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:8.0.32",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "8\\.0\\.32",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "8.0.32"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
}
},
"fingerprint_md5": "1B1D6CC1F7BB34C4090EF87097EF5058",
"fingerprint_sha1": "62ECF3F65CD2B4930B1C3C8E950696647909DCE2",
"fingerprint_sha256": "13DBB914695EED0C4F770A8B5649FA1BB61A549AA4D391A853903851C57ADEAC",
"issuer": {
"common_name": [
"MySQL_Server_8.0.32_Auto_Generated_CA_Certificate"
]
},
"issuer_dn": "/CN=MySQL_Server_8.0.32_Auto_Generated_CA_Certificate",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"MySQL_Server_8.0.32_Auto_Generated_Server_Certificate"
]
},
"subject_alt_name": {
"dns_names": [
"MySQL_Server_8.0.32_Auto_Generated_Server_Certificate"
],
"extended_dns_names": []
},
"subject_dn": "/CN=MySQL_Server_8.0.32_Auto_Generated_Server_Certificate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a0ec4a760c25e025142fdcb318416f0823b65be0443dd750e5ef009674914801",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHhiNWJmNzE5MzU1M2IyYzE2Y2YyNGUzZjU5MzE0ZGEzYWYxZTllNDkwNzhkMWZlZGVjZGJiMGZhMjM2MWE0ZjIzM2JkYWQyZTAwZTdhMDNjN2RmNWM4YjhmNjY4ZDA2ZDJhZWRhNTY0OGQwM2Y4NjJjMGQ4MmE1NGVmMjM2YjQzNzc5MjJjZDJkMWE4ODczMjRkZTExZjQ0ZGY2MTBhZGUzMDg5MzJhM2E0YTMwMTZmZDVlYWUzM2QxZDg2MGQ2MDBkZGM4OGY0YjkzNGY0YmMxOWM4ZTFlMWY4NzI4NjIzOWRmNDc1NzljYmYyOTM3NzgyN2NhNGU3NzgyNTVhOTFkYTJjZjVlZTVkZTYxNzQ5M2M5YmU2ZDk0NGVkMmM4NWZmMzU2NTk2MTdmNzFmOTlkNjVmNjZmOGNhZTU2YWMwZjAyNjA2MWEyYmE2MDUyMmUyNDNkZTkwNDI2N2IzMDE5NmY1MzJhOTlkNzYxYzY4NWU0YjYxMGU5ZjJlNzNmNjE2ODgxMDEwOGQwZDYzMjBlOGNjMTU5ODkxMGRjMGZkNzM2M2I4YjZhZmFmNjkwMmU2ZWIyOGEwYzkyZGU0MWQ4NTg2M2ViMDM5YWE5YmQ4ZDY0NGQ4ZjI4OGM5ZTdjN2QxNTQ5ODk2MmVkMDlkYjgxNzg1MGM2ZGExMGVhZjA5ZA=="
}
},
"tbs_fingerprint": "15c074b464a0e437bee72e47bd01f0d3422b5fb5132d23b128e3e2d6abde48aa",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2034-02-12T07:58:58",
"not_before": "2024-02-15T07:58:58"
},
"version": 2
},
"fingerprint_sha256": "13DBB914695EED0C4F770A8B5649FA1BB61A549AA4D391A853903851C57ADEAC",
"precert": false,
"raw": "MIIDBzCCAe+gAwIBAgIBAjANBgkqhkiG9w0BAQsFADA8MTowOAYDVQQDDDFNeVNRTF9TZXJ2ZXJfOC4wLjMyX0F1dG9fR2VuZXJhdGVkX0NBX0NlcnRpZmljYXRlMB4XDTI0MDIxNTA3NTg1OFoXDTM0MDIxMjA3NTg1OFowQDE+MDwGA1UEAww1TXlTUUxfU2VydmVyXzguMC4zMl9BdXRvX0dlbmVyYXRlZF9TZXJ2ZXJfQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1v3GTVTssFs8k4/WTFNo68enkkHjR/t7Nuw+iNhpPIzva0uAOegPH31yLj2aNBtKu2lZI0D+GLA2CpU7yNrQ3eSLNLRqIcyTeEfRN9hCt4wiTKjpKMBb9Xq4z0dhg1gDdyI9Lk09LwZyOHh+HKGI530dXnL8pN3gnyk53glWpHaLPXuXeYXSTyb5tlE7SyF/zVllhf3H5nWX2b4yuVqwPAmBhorpgUi4kPekEJnswGW9TKpnXYcaF5LYQ6fLnP2FogQEI0NYyDozBWYkQ3A/XNjuLavr2kC5usooMkt5B2Fhj6wOaqb2NZE2PKIyefH0VSYli7QnbgXhQxtoQ6vCdAgMBAAGjEDAOMAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggEBAHIqEFnsxuG84zfriX2p0IfZZdn5KH9ICL6Dw9rsAZStfsQc4A+zEWHKwLMux/Jxd5JOLOQGpyHGhTDmz09VPtcZop/5NpLsragDYLQ+2cisbcRXiITKkv2MWxRqg0DvwP9gzrGuzb7vqEwilxrLKo66mZnSVlN9RMmaaHmO8jwCRV+9/K9psCtl0qMPttQEMVybAUD5LAEZfwHiuJv0ygrf2tro4SjPjZSRwzX8NN6eap04icqxGZHbABlgmxa+sGLoA0BzgvE/fN0e0f8/X+qCgcvyOJuoCVa6PP/hqxYXooleunxsevtH+LYvKOH+3Egtk0mWb2D++kpD2T9H+8A=",
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-27T23:58:48.136Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "http",
"version": "2.4.57",
"product": "Apache httpd",
"extra_info": "(Oracle Linux Server) OpenSSL/3.0.7",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.57",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.57",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "\n<!DOCTYPE html>\n<html>\n <head>\n <meta charset=\"utf-8\">\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n <title>PMIS</title>\n <!-- Tell the browser to be responsive to screen width -->\n <meta content=\"width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no\" name=\"viewport\">\n <!-- Bootstrap 3.3.5 -->\n <link href=\"https://fonts.googleapis.com/css2?family=Lexend:wght@200;300;400;500;600;700&display=swap\" rel=\"stylesheet\">\n\n <link rel=\"shortcut icon\" href=\"http://182.176.148.27:8080/pmis/assets/dist/img/fav-ico.png\" type=\"image/x-icon\"> \n <link rel=\"stylesheet\" href=\"http://182.176.148.27:8080/pmis/assets/bootstrap/css/bootstrap.min.css\">\n <!-- Font Awesome -->\n <link rel=\"stylesheet\" href=\"http://182.176.148.27:8080/pmis/assets/css/font-awesome.min.css\">\n <!-- Ionicons -->\n <link rel=\"stylesheet\" href=\"http://182.176.148.27:8080/pmis/assets/css/ionicons.min.css\">\n <!-- Theme style -->\n <link rel=\"stylesheet\" href=\"http://182.176.148.27:8080/pmis/assets/dist/css/AdminLTE.min.css\">\n <!-- iCheck -->\n <!-- <link rel=\"stylesheet\" href=\"assets/plugins/iCheck/square/blue.css\"> -->\n <!-- <link rel=\"stylesheet\" href=\"assets/css/login.css\"> -->\n <!-- <link rel=\"stylesheet\" href=\"assets/css/hover.css\"> -->\n\n <!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->\n <!-- WARNING: Respond.js doesn't work if you view the page via file:// -->\n <!--[if lt IE 9]>\n <script src=\"https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js\"></script>\n <script src=\"https://oss.maxcdn.com/respond/1.4.2/respond.min.js\"></script>\n <![endif]-->\n\n <style type=\"text/css\">\n .login_sc{\n background: url('http://182.176.148.27:8080/pmis/assets/images/login_bg.jpg') no-repeat;\n background-size: cover;\n background-position: 0 15%;\n overflow-y: hidden;\n font-family: 'Lexend', sans-serif;\n }\n label{\n font-weight: 300;\n }\n .login_area{\n height: 100vh;\n }\n .btn-login,.btn-secondary{\n background: #374850 !important;\n border-color: #374850 !important;\n color: #fff;\n }\n :is(.btn-login, .btn-secondary):hover,\n :is(.btn-login, .btn-secondary):focus{\n background: #475b65 !important;\n border-color: #475b65 !important;\n color: #fff;\n }\n .login-block{\n color: #272833;\n font-size: 16px;\n }\n .btn{\n padding: 10px 15px;\n }\n .login-box {\n max-width: 450px;\n width: 100%;\n position: absolute;\n top: 50%;\n margin: unset;\n left: 50%;\n transform: translate(-50% ,-50%);\n }\n .logo_login{\n padding: 15px 20px;\n max-width: 400px;\n margin: 14% auto 0;\n /*border-bottom: 1px solid #f5f5f5;*/\n }\n .text-secondary{\n color: #374850 !important;\n }\n .logo_login img{\n width: 100%;\n }\n .login-box-body, .register-box-body{background: transparent;}\n .login-block input.form-control{\n /*background: rgba(0,0,0,.3);*/\n border-radius: 5px;\n min-height: 40px;\n }\n button.btn-warning{\n border-radius: 25px;\n padding: 8px 20px;\n min-width: 150px;\n min-height: 40px;\n }\n .login-block h1{\n margin-bottom: 30px;\n }\n .pswd i {\n position: absolute;\n right: 30px;\n top: 40px;\n cursor: pointer;\n }\n </style>\n </head>\n<style>\n #captchaImage {\n border: 1px solid #ddd;\n border-radius: 0 4px 4px 0;\n }\n</style>\n <body class=\"login_sc\">\n\n <div class=\"row\">\n\n <div class=\"col-lg-5\">\n <div class=\"logo_login\">\n <img src=\"http://182.176.148.27:8080/pmis/assets/images/login_logo.png\">\n </div>\n </div>\n <div class=\"col-lg-7 login_area\">\n <div class=\"mx-auto login-box\" id=\"login-box\">\n\n <div class=\"login-box-body\">\n\n\n <div id=\"frmMsgErr2\"\n class=\"callout callout-danger margin-top-10 hidden\">\n <p id=\"frmMsgErr2_text\">---</p>\n </div>\n\n <div id=\"frmMsgErr2_success\"\n class=\"callout callout-success margin-top-10 frmMsgErr2_success hidden\">\n <p id=\"frmMsgErr2_text_success\" class=\"frmMsgErr2_text_success\">---</p>\n </div>\n\n <!-- <h2 class=\"login-box-msg\">Sign in to start your session</h2> -->\n <form id=\"loginForm\" action=\"http://182.176.148.27:8080/\" method=\"post\">\n <div class=\"login-block\">\n\n <h3 class=\"text-center\" style=\"margin-bottom: 30px;\"><strong>MEMBER LOGIN</strong></h3>\n\n\n <input type=\"hidden\" name=\"logintype\" value=\"Jail\">\n <div class=\"clearfix\"></div>\n\n\n <div class=\"col-md-12 form-group \" style=\"display: none\" >\n <label>Login Type</label><br>\n \n <select class=\"form-control 0\" onchange=\"redirect_appr();\" id=\"login_app\" name=\"login_app\">\n <option value=\"\" >Select User Type</option>\n <option value=\"jail\" SELECTED>Jail\n </option>\n \n \n\n\n \n\n </select>\n <!-- <label class=\"radio-inline\"><input type=\"radio\" value=\"jail\" name=\"login_app\" CHECKED>Jail</label>\n <label class=\"radio-inline\"><input type=\"radio\" value=\"hrm\" name=\"login_app\" >HRM</label>\n -->\n </div>\n <div class=\"clearfix\"></div>\n <div class=\"row\">\n <div class=\"col-md-12 cnicdiv form-group hidden \" id=\"cnicField\">\n <div class=\"col-md-8 form-group\">\n <label for=\"cnicFieldInput\">CNIC</label>\n <div class=\"input-group\">\n <input type=\"text\" id=\"cnicFieldInput\"\n name=\"cnic\" class=\"form-control hidden\"\n placeholder=\"Enter CNIC\">\n </div>\n </div>\n <div class=\"col-md-4 \" style=\"margin-top: 25px\">\n <div class=\"input-group-append mt-4\">\n <button class=\"btn btn-success\" type=\"button\" id=\"verifyBtn\">\n Verify\n </button>\n </div>\n </div>\n\n </div>\n </div>\n\n\n\n <div class=\"row\">\n <div class=\"col-md-12 regiondiv form-group hidden \" id=\"regionField\">\n <div class=\"col-md-8 form-group\">\n <label for=\"regionFieldInput\">Region</label>\n <div class=\"input-group\">\n <select id=\"regionFieldInput\"\n name=\"region\" class=\"form-control hidden\"\n >\n <option value=\"\">--</option>\n <option value=\"355\">Region Office Sahiwal</option><option value=\"356\">Region Office Sargodha</option><option value=\"357\">Region Office Bahawalpur</option>\n </select>\n </div>\n </div>\n\n <div class=\"col-md-8 form-group hidden\" id=\"cnicFieldInput2div\">\n <label for=\"cnicFieldInput2\">CNIC</label>\n <div class=\"input-group\">\n <input type=\"text\" id=\"cnicFieldInput2\"\n name=\"cnic2\" class=\"form-control\"\n placeholder=\"Enter CNIC\">\n </div>\n </div>\n\n\n </div>\n </div>\n\n <div id=\"usernamediv\" class=\"col-md-12 form-group \">\n <label for=\"\">Username</label>\n <input type=\"text\" class=\"form-control usernamediv\"\n value=\"\"\n placeholder=\"User Name\" id=\"userName\" name=\"userName\"/>\n\n\n </div>\n <div id=\"passworddiv\" class=\"col-md-12 pswd form-group \" >\n <label for=\"\">Password</label>\n <input type=\"password\" class=\"form-control\" value=\"\" placeholder=\"Password\"\n id=\"password\" name=\"password\"/>\n <i class=\"fa fa-eye-slash toggle-password\"></i>\n </div>\n\n\n <div class=\"col-md-12 form-group\">\n\n <div class=\"input-group\">\n <div class=\"input-group-append\">\n <span class=\"input-group-text p-0\">\n <img src=\"captcha.php\" class=\"\" alt=\"CAPTCHA\" id=\"captchaImage\" style=\"height: 50px; cursor: pointer;\" title=\"Click to refresh\">\n </span>\n </div>\n <input type=\"text\" class=\"form-control \" name=\"captcha\" id=\"captcha\" autocomplete=\"off\" placeholder=\"Enter CAPTCHA\" required>\n\n </div>\n </div>\n\n \n <div id=\"login\" class=\"col-md-12 \" >\n <button type=\"submit\" class=\"btn btn-secondary btn-block\">Login</button>\n <div class=\"clearfix\"></div>\n </div>\n </div>\n </form>\n\n <br>\n\n </div>\n </div>\n <div class=\"col-md-4 pull-right\">\n <div class=\"alert alert-warning alert-dismissible\" id=\"offlinestatus\" style=\"display:none;\">\n <a href=\"#\" class=\"close\" data-dismiss=\"alert\" aria-label=\"close\">×</a>\n <strong> You are currently offline.!</strong>\n </div>\n </div>\n </div>\n\n\n </div>\n </body>\n<!-- <script src=\"https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js\"></script>-->\n<!-- <script src=\"https://code.jquery.com/jquery-3.6.4.min.js\"></script>-->\n\n <!-- Inputmask library -->\n<!-- <script src=\"https://cdnjs.cloudflare.com/ajax/libs/jquery.inputmask/5.0.6/jquery.inputmask.min.js\"></script>-->\n <!-- jQuery -->\n <script src=\"https://code.jquery.com/jquery-3.6.4.min.js\"></script>\n\n <!-- Inputmask library -->\n <script src=\"https://cdnjs.cloudflare.com/ajax/libs/jquery.inputmask/5.0.6/jquery.inputmask.min.js\"></script>\n <script>\n $(document).ready(function () {\n $(\"#frmMsgErr2\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text\").addClass(\"hidden\");\n\n $(\"#frmMsgErr2_success\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text_success\").addClass(\"hidden\");\n\n\n // Handle the button click\n $(\"#verifyBtn\").click(function () {\n // Get the CNIC value\n var cnicValue = $(\"#cnicFieldInput\").val();\n\n // Make the AJAX call\n $.ajax({\n url: 'server.php', // Replace with the actual PHP script to handle the verification\n method: 'POST',\n data: {\n cnic: cnicValue\n },\n success: function (response) {\n\n // Parse the JSON string into a JavaScript object\n const responseObject = JSON.parse(response);\n\n // Access the properties without spaces\n var status = responseObject.status;\n var count = responseObject.count;\n\n\n\n if (response && status === 'exists' && count == 1) {\n\n\n $(\"#usernamediv\").removeClass('hidden');\n $(\"#passworddiv\").removeClass('hidden');\n $(\"#login\").removeClass('hidden');\n $(\"#captcha\").removeClass('hidden');\n $(\"#captchaImage\").removeClass('hidden');\n\n $(\"#verifyBtn\").text('Verified');\n\n $(\".frmMsgErr2_text_success\").text('CNIC VERIFIED , Please Fill User & Paasword to Login ');\n $(\".frmMsgErr2_text_success\").removeClass('hidden');\n $(\".frmMsgErr2_success\").removeClass('hidden');\n\n $(\"#frmMsgErr2\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text\").addClass(\"hidden\");\n\n $(\"#frmMsgErr\").addClass(\"hidden\");\n\n }\n else if (response && status === 'exists_without_user') {\n\n $(\"#verifyBtn\").text('Verified');\n $(\".frmMsgErr2_text_success\").text('CNIC VERIFIED, Click link to create user ');\n $(\".frmMsgErr2_text_success\").removeClass('hidden');\n $(\".frmMsgErr2_success\").removeClass('hidden');\n\n // Creating a link with a parameter and setting its href\n var button = $('<button>', {\n // text: cnicValue,\n text: 'Create',\n class: 'create-user-button',\n style: 'color: Blue;' // Set your desired color here\n });\n\n // Appending the link to frmMsgErr2_text_success\n $(\".frmMsgErr2_text_success\").append(button);\n\n\n }\n\n else if(response && status === 'not_exists'){\n $(\"#verifyBtn\").text('Verify');\n\n $(\"#frmMsgErr\").addClass(\"hidden\");\n $(\"#frmMsgErr2\").removeClass('hidden');\n $(\"#frmMsgErr2_text\").removeClass('hidden');\n\n $(\"#frmMsgErr2_text\").text('CNIC Can Not Be Verified !!');\n $(\"#frmMsgErr2_success\").addClass(\"hidden\");\n $(\"#usernamediv\").addClass('hidden');\n $(\"#passworddiv\").addClass('hidden');\n $(\"#login\").addClass('hidden');\n $(\"#captcha\").addClass('hidden');\n $(\"#captchaImage\").addClass('hidden');\n\n }\n else if(response && status === 'exists' && count > 1){\n $(\"#verifyBtn\").text('Verify');\n\n $(\"#frmMsgErr\").addClass(\"hidden\");\n $(\"#frmMsgErr2\").removeClass('hidden');\n $(\"#frmMsgErr2_text\").removeClass('hidden');\n\n $(\"#frmMsgErr2_text\").text('CNIC Exists with more then 1 employee profile . please correct !!');\n $(\"#frmMsgErr2_success\").addClass(\"hidden\");\n $(\"#usernamediv\").addClass('hidden');\n $(\"#passworddiv\").addClass('hidden');\n $(\"#login\").addClass('hidden');\n $(\"#captchaImage\").addClass('hidden');\n $(\"#captcha\").addClass('hidden');\n\n }\n },\n error: function () {\n // Handle the AJAX error\n }\n });\n });\n $(document).on('click', '.create-user-button', function () {\n // Make the AJAX call\n var cnicValue = $(\"#cnicFieldInput\").val();\n console.log('in second');\n $.ajax({\n url: 'server.php',\n method: 'POST',\n data: {\n cnic: cnicValue,\n create_user: true,\n ajax_request: true // Adding a parameter to indicate it's an AJAX request\n },\n success: function (response) {\n // Handle the response as needed\n\n response = JSON.parse(response);\n\n $(\"#usernamediv\").removeClass('hidden');\n $(\"#passworddiv\").removeClass('hidden');\n $(\"#login\").removeClass('hidden');\n $(\"#captcha\").removeClass('hidden');\n $(\"#captchaImage\").removeClass('hidden');\n $(\"#verifyBtn\").text('Verified');\n\n\n\n\n// Display user information\n $(\".frmMsgErr2_text_success\").text('User Created , Please Fill User & Password to Login ');\n\n $(\".frmMsgErr2_text_success\").append('<br>User name: ' + response.user_name);\n $(\".frmMsgErr2_text_success\").append('<br>Password: ' + response.password);\n $(\".frmMsgErr2_text_success\").append('<br>CNIC: ' + response.cnic);\n\n $(\".frmMsgErr2_text_success\").removeClass('hidden');\n $(\".frmMsgErr2_success\").removeClass('hidden');\n\n\n $(\"#frmMsgErr2\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text\").addClass(\"hidden\");\n\n $(\"#frmMsgErr\").addClass(\"hidden\");\n\n // Perform additional actions based on the response\n },\n error: function (xhr, status, error) {\n // Handle errors if any\n console.error(xhr.responseText);\n }\n });\n });\n });\n </script>\n <script>\n document.addEventListener(\"DOMContentLoaded\", function () {\n // Add an event listener to the select dropdown\n\n var initialSelectedValue = document.getElementById(\"login_app\").value;\n\n if (initialSelectedValue === \"jail\"\n || initialSelectedValue === \"inspectorate\"\n || initialSelectedValue === \"approval_portal\") {\n var usernamediv = document.getElementById(\"usernamediv\");\n var passworddiv = document.getElementById(\"passworddiv\");\n var logindiv = document.getElementById(\"login\");\n var captcha = document.getElementById(\"captcha\");\n var captchaImage = document.getElementById(\"captchaImage\");\n cnicField.classList.add(\"hidden\");\n cnicFieldInput.classList.add(\"hidden\");\n usernamediv.classList.remove(\"hidden\");\n passworddiv.classList.remove(\"hidden\");\n logindiv.classList.remove(\"hidden\");\n captcha.classList.remove(\"hidden\");\n captchaImage.classList.remove(\"hidden\");\n }\n\n document.getElementById(\"login_app\").addEventListener(\"change\", function () {\n // Get the selected value\n var selectedValue = this.value;\n\n // Get the CNIC input field\n var usernamediv = document.getElementById(\"usernamediv\");\n var passworddiv = document.getElementById(\"passworddiv\");\n var cnicField = document.getElementById(\"cnicField\");\n var cnicFieldInput = document.getElementById(\"cnicFieldInput\");\n var logindiv = document.getElementById(\"login\");\n var captcha = document.getElementById(\"captcha\");\n var captchaImage = document.getElementById(\"captchaImage\");\n var regionField = document.getElementById(\"regionField\");\n var regionFieldInput = document.getElementById(\"regionFieldInput\");\n var cnicFieldInput2div = document.getElementById(\"cnicFieldInput2div\");\n\n\n\n\n $(\"#frmMsgErr2\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text\").addClass(\"hidden\");\n\n $(\"#frmMsgErr2_success\").addClass(\"hidden\");\n $(\"#frmMsgErr2_text_success\").addClass(\"hidden\");\n\n\n\n // Check if HRM is selected\n if (selectedValue === \"hrm\") {\n cnicField.classList.remove(\"hidden\");\n cnicFieldInput.classList.remove(\"hidden\");\n usernamediv.classList.add(\"hidden\");\n passworddiv.classList.add(\"hidden\");\n logindiv.classList.add(\"hidden\");\n captcha.classList.add(\"hidden\");\n captchaImage.classList.add(\"hidden\");\n regionField.classList.add(\"hidden\");\n regionFieldInput.classList.add(\"hidden\");\n cnicFieldInput2div.classList.add(\"hidden\");\n\n\n\n // Add the input mask using a library or custom code\n // For example, you can use an input mask library like Inputmask (https://github.com/RobinHerbots/Inputmask)\n // Alternatively, you can implement a custom function to apply the mask.\n // applyCNICMask();\n }\n\n\n else if (selectedValue === \"region\") {\n\n regionField.classList.remove(\"hidden\");\n regionFieldInput.classList.remove(\"hidden\");\n usernamediv.classList.add(\"hidden\");\n passworddiv.classList.add(\"hidden\");\n logindiv.classList.add(\"hidden\");\n captcha.classList.add(\"hidden\");\n captchaImage.classList.add(\"hidden\");\n cnicField.classList.add(\"hidden\");\n cnicFieldInput.classList.add(\"hidden\");\n //cnicFieldInput2div.classList.remove(\"hidden\");\n }\n else if (selectedValue === \"jail\") {\n\n cnicField.classList.add(\"hidden\");\n cnicFieldInput.classList.add(\"hidden\");\n usernamediv.classList.remove(\"hidden\");\n passworddiv.classList.remove(\"hidden\");\n logindiv.classList.remove(\"hidden\");\n captcha.classList.remove(\"hidden\");\n captchaImage.classList.remove(\"hidden\");\n regionField.classList.add(\"hidden\");\n regionFieldInput.classList.add(\"hidden\");\n cnicFieldInput2div.classList.add(\"hidden\");\n\n }\n\n\n else {\n\n // Hide the CNIC input field if another option is selected\n cnicField.classList.add(\"hidden\");\n cnicFieldInput.classList.add(\"hidden\");\n\n usernamediv.classList.remove(\"hidden\");\n passworddiv.classList.remove(\"hidden\");\n logindiv.classList.remove(\"hidden\");\n captcha.classList.remove(\"hidden\");\n captchaImage.classList.remove(\"hidden\");\n regionField.classList.add(\"hidden\");\n regionFieldInput.classList.add(\"hidden\");\n cnicFieldInput2div.classList.add(\"hidden\");\n }\n });\n });\n\n // Function to apply CNIC mask (you may need to implement your own logic)\n function applyCNICMask() {\n // Implement your logic to apply the CNIC mask here\n // For example, you can use a library or write custom code\n // Example:\n // $('#cnicFieldInput').inputmask('99999-9999999-9');\n }\n </script>\n <script>\n\n\n $(function(){\n\n $('#regionFieldInput').on(\"change\", function(){\n var JailID = $(this).val();\n\n if(JailID!==''){\n $(\"#usernamediv\").removeClass('hidden');\n $(\"#passworddiv\").removeClass('hidden');\n $(\"#captcha\").removeClass('hidden');\n $(\"#captchaImage\").removeClass('hidden');\n $(\"#login\").removeClass('hidden');\n $(\"#cnicFieldInput2div\").removeClass('hidden');\n\n } else {\n $(\"#usernamediv\").addClass('hidden');\n $(\"#passworddiv\").addClass('hidden');\n $(\"#captcha\").addClass('hidden');\n $(\"#captchaImage\").addClass('hidden');\n $(\"#login\").addClass('hidden');\n $(\"#cnicFieldInput2div\").addClass('hidden');\n }\n\n });\n\n });\n\n $(\"body\").on('click', '.toggle-password', function() {\n $(this).toggleClass(\"fa-eye fa-eye-slash\");\n var input = $(\"#password\");\n if (input.attr(\"type\") === \"password\") {\n input.attr(\"type\", \"text\");\n } else {\n input.attr(\"type\", \"password\");\n }\n\n });\n\n function updateOnlineStatus() {\n if (navigator.onLine) {\n $(\"#offlinestatus\").fadeOut();\n } else {\n $(\"#offlinestatus\").fadeIn();\n }\n // let content = document.getElementById(\"status\");\n // let textContent = navigator.onLine ? \"\" : \" You are currently offline\";\n // content.textContent = textContent;\n }\n\n document.addEventListener(\"DOMContentLoaded\", function () {\n updateOnlineStatus();\n window.addEventListener('online', updateOnlineStatus);\n window.addEventListener('offline', updateOnlineStatus);\n });\n\n function redirect_appr(){\n logintype = document.getElementById(\"login_app\").value;\n if(logintype=='dashboard'){\n location.href = 'main_dashboard';\n }\n }\n\n // Get the current URL\n var currentUrl = window.location.href;\n\n // Parse the URL to extract parameters\n var urlParams = new URLSearchParams(currentUrl);\n\n // Get the value of the login_app parameter\n var loginAppValue = urlParams.get('login_app');\n var cnicField = document.getElementById(\"cnicField\");\n var cnicFieldInput = document.getElementById(\"cnicFieldInput\");\n // Check if the parameter is present\n if (loginAppValue == 'hrm') {\n cnicField.classList.remove(\"hidden\");\n cnicFieldInput.classList.remove(\"hidden\");\n } else {\n cnicField.classList.add(\"hidden\");\n cnicFieldInput.classList.add(\"hidden\");\n }\n\n $('#cnicFieldInput, #cnicFieldInput2').inputmask('99999-9999999-9');\n\n\ndocument.getElementById('captchaImage').addEventListener('click', function() {\n this.src = 'captcha.php?' + new Date().getTime();\n});\n\n </script>\n<!-- jQuery 2.1.4 -->\n<script src=\"http://182.176.148.27:8080/pmis/assets/plugins/jQuery/jQuery-2.1.4.min.js\"></script>\n<!-- Bootstrap 3.3.5 -->\n<script src=\"http://182.176.148.27:8080/pmis/assets/bootstrap/js/bootstrap.min.js\"></script>\n<!-- <script src=\"https://www.google.com/recaptcha/api.js\" async defer></script> -->\n</html>",
"body_murmur": 1308862344,
"body_sha256": "4616b0152d3133adfaba0b70a71e645f4a7cc4d0a138c1325681d2bcf031207b",
"component": [
"OpenSSL:3.0.7",
"Apache HTTP Server:2.4.57",
"Bootstrap"
],
"content_length": -1,
"favicon": {
"md5_hash": "16e4aa61aea66f43b0ab55488717997a",
"murmur_hash": 1341402980,
"path": "http://182.176.148.27:8080/pmis/assets/dist/img/fav-ico.png",
"size": 3606
},
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Sun, 25 Jan 2026 23:20:25 GMT"
],
"expires": [
"Thu, 19 Nov 1981 08:52:00 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Apache/2.4.57 (Oracle Linux Server) OpenSSL/3.0.7"
],
"set_cookie": [
"PHPSESSID=omimcn87m859quid2bka9sp34l; path=/"
],
"x_powered_by": [
"PHP/7.4.33"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.176.148.27:8080",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "PMIS",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-2023-31122",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2023-43622",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2023-45802",
"score": 5.9,
"severity": "medium"
}
],
"url": "http://182.176.148.27:8080/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-25T23:20:26.319Z"
}
],
"services_hash": "cfb5451cf35549acdffeba24776e3206222433bfd8ee34f592d720b7bba905a3",
"last_updated_at": "2026-02-04T17:29:55.622Z",
"banner": [
"ftp",
"ssh",
"telnet",
"mysql",
"tls",
"http"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"23/telnet"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-31122": {
"id": "CVE-2023-31122",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-43622": {
"id": "CVE-2023-43622",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known \"slow loris\" attack pattern.nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.nnThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.nn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2023-45802": {
"id": "CVE-2023-45802",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 5.9,
"services": [
"8080/http"
],
"severity": "medium",
"summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/FO73U3SLBYFGIW2YKXOK7RI4D6DJSZ2B/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MIUBKSCJGPJ6M2U63V6BKFDF725ODLG7/",
"https://security.netapp.com/advisory/ntap-20240415-0013/",
"https://support.apple.com/kb/HT214119",
"https://www.kb.cert.org/vuls/id/421644",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8080/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://seclists.org/fulldisclosure/2024/Oct/11",
"http://www.openwall.com/lists/oss-security/2024/07/01/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8080/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-829"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://seclists.org/fulldisclosure/2024/Oct/11",
"http://www.openwall.com/lists/oss-security/2024/07/01/10",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2024/07/17/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240808-0006/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
}
}
}