Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.176.78.83

SummaryCVE DetailsRaw Data
21 Nov 2025, 15:53:38 UTC
{
  "scan_id": 1763609656,
  "ip": "182.176.78.83",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.176.78.0/23",
    "postal_code": "52250",
    "coordinates": {
      "latitude": "32.1537",
      "longitude": "74.2199"
    },
    "geo_point": "32.1537, 74.2199",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "PK",
    "country_name": "Pakistan",
    "city": "Gujranwala"
  },
  "location_updated_at": "2025-11-20T00:43:28Z",
  "asn": {
    "number": "AS17557",
    "organization": "Pakistan Telecommunication Company Limited",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.176.72.0/21",
    "organization": "Pakistan Telecommuication company limited",
    "descr": "Pakistan Telecommuication company limited,\nCDDT Building, H-9/1, Training Block,\nPakistan Telecommunication Company Limited,\nGM, Multimedia & Broadband",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:27:19Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-11-20T00:43:28Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-11-20T01:11:59Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-11-20T00:43:28Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "10.0",
      "product": "Microsoft IIS httpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:internet_information_services:10.0",
          "part": "a",
          "vendor": "microsoft",
          "product": "internet_information_services",
          "version": "10\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\" />\r\n<title>IIS Windows Server</title>\r\n<style type=\"text/css\">\r\n<!--\r\nbody {\r\n\tcolor:#000000;\r\n\tbackground-color:#0072C6;\r\n\tmargin:0;\r\n}\r\n\r\n#container {\r\n\tmargin-left:auto;\r\n\tmargin-right:auto;\r\n\ttext-align:center;\r\n\t}\r\n\r\na img {\r\n\tborder:none;\r\n}\r\n\r\n-->\r\n</style>\r\n</head>\r\n<body>\r\n<div id=\"container\">\r\n<a href=\"http://go.microsoft.com/fwlink/?linkid=66138&amp;clcid=0x409\"><img src=\"iisstart.png\" alt=\"IIS\" width=\"960\" height=\"600\" /></a>\r\n</div>\r\n</body>\r\n</html>",
          "body_murmur": 703707298,
          "body_sha256": "557b5e9015b4963a130c7039e077b3ec0306d401b6ee13d631721d5d969d2917",
          "component": [
            "IIS:10.0",
            "Windows Server"
          ],
          "content_length": 703,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "703"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 22 Nov 2025 04:53:22 GMT"
            ],
            "etag": [
              "\"664bec99425dc1:0\""
            ],
            "last_modified": [
              "Sun, 14 Sep 2025 16:29:48 GMT"
            ],
            "server": [
              "Microsoft-IIS/10.0"
            ],
            "x_powered_by": [
              "ASP.NET"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.176.78.83",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "IIS Windows Server"
        }
      },
      "url": "http://182.176.78.83/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-21T15:53:38.815Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "10.0",
      "product": "Microsoft IIS httpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:internet_information_services:10.0",
          "part": "a",
          "vendor": "microsoft",
          "product": "internet_information_services",
          "version": "10\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\" />\r\n<title>IIS Windows Server</title>\r\n<style type=\"text/css\">\r\n<!--\r\nbody {\r\n\tcolor:#000000;\r\n\tbackground-color:#0072C6;\r\n\tmargin:0;\r\n}\r\n\r\n#container {\r\n\tmargin-left:auto;\r\n\tmargin-right:auto;\r\n\ttext-align:center;\r\n\t}\r\n\r\na img {\r\n\tborder:none;\r\n}\r\n\r\n-->\r\n</style>\r\n</head>\r\n<body>\r\n<div id=\"container\">\r\n<a href=\"http://go.microsoft.com/fwlink/?linkid=66138&amp;clcid=0x409\"><img src=\"iisstart.png\" alt=\"IIS\" width=\"960\" height=\"600\" /></a>\r\n</div>\r\n</body>\r\n</html>",
          "body_murmur": 703707298,
          "body_sha256": "557b5e9015b4963a130c7039e077b3ec0306d401b6ee13d631721d5d969d2917",
          "component": [
            "IIS:10.0",
            "Windows Server"
          ],
          "content_length": 703,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "703"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 22 Nov 2025 03:23:56 GMT"
            ],
            "etag": [
              "\"664bec99425dc1:0\""
            ],
            "last_modified": [
              "Sun, 14 Sep 2025 16:29:48 GMT"
            ],
            "server": [
              "Microsoft-IIS/10.0"
            ],
            "x_powered_by": [
              "ASP.NET"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.176.78.83",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "IIS Windows Server"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": true,
                "decipher_only": false,
                "digital_signature": false,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              }
            },
            "fingerprint_md5": "1239953366B374E3D17CA750837D5C4B",
            "fingerprint_sha1": "CDF23598ACE3A7938B5E01C263CA98331CABA4B2",
            "fingerprint_sha256": "5D566845850205920B633FCC62F2A4DEEE95C068BE7DC7796538433193994588",
            "issuer": {
              "common_name": [
                "ZEETECH-SERVER"
              ]
            },
            "issuer_dn": "/CN=ZEETECH-SERVER",
            "jarm": "2ad2ad16d00000022c2ad2ad2ad2ad46ff59a659b30fd8aeaa6755c67691b4",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "141344165565689199543334114223315804601",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "ZEETECH-SERVER"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ZEETECH-SERVER"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=ZEETECH-SERVER",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "9c07f6877270cb2f3a7b524f2793d5d57075325105d80d03a3b6deb5f7b66161",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "731a9bf470fd59908072a9e2d3015379294e6225e8d6f90982ae153b4e4e5fbf",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 15811200,
              "not_after": "2026-03-15T16:30:33",
              "not_before": "2025-09-13T16:30:33"
            },
            "version": 2
          },
          "fingerprint_sha256": "5D566845850205920B633FCC62F2A4DEEE95C068BE7DC7796538433193994588",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://182.176.78.83/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-21T14:44:57.174Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "ms-sql-s",
      "version": "15.00.2000",
      "product": "Microsoft SQL Server 2019",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:sql_server:2019",
          "part": "a",
          "vendor": "microsoft",
          "product": "sql_server",
          "version": "2019",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_ON",
          "instance_name": "",
          "version": "15.0.2000"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-5090",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2021-1636",
          "score": 8.8,
          "severity": "high"
        },
        {
          "id": "CVE-2022-23276",
          "score": 7.8,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-21T02:36:41.767Z"
    }
  ],
  "services_hash": "e80571f6e3490d177ca24daf4c2f8f2e501e03df35377831a6e831ed425ed937",
  "last_updated_at": "2025-11-21T15:53:38.815Z",
  "banner": [
    "mssql",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2007-5090": {
      "id": "CVE-2007-5090",
      "references": [
        "http://osvdb.org/40598",
        "http://secunia.com/advisories/26899",
        "http://www-1.ibm.com/support/docview.wss?uid=swg21268116",
        "http://www.securityfocus.com/bid/25810",
        "http://www.securitytracker.com/id?1018735",
        "http://www.vupen.com/english/advisories/2007/3264",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/36771"
      ],
      "score": 7.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in IBM Rational ClearQuest (CQ), when a Microsoft SQL Server or an IBM DB2 database is used, allows attackers to corrupt data via unspecified vectors.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-264"
    },
    "CVE-2021-1636": {
      "id": "CVE-2021-1636",
      "references": [
        "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Elevation of Privilege Vulnerability",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-89"
    },
    "CVE-2022-23276": {
      "id": "CVE-2022-23276",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23276"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "SQL Server for Linux Containers Elevation of Privilege Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2022-29143": {
      "id": "CVE-2022-29143",
      "references": [
        "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143"
      ],
      "score": 7.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Remote Code Execution Vulnerability.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-21528": {
      "id": "CVE-2023-21528",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21528"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-21704": {
      "id": "CVE-2023-21704",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-21705": {
      "id": "CVE-2023-21705",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21705"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-21713": {
      "id": "CVE-2023-21713",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21713"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-21718": {
      "id": "CVE-2023-21718",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-23384": {
      "id": "CVE-2023-23384",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384"
      ],
      "score": 7.3,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-29349": {
      "id": "CVE-2023-29349",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29349"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC and OLE DB Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-29356": {
      "id": "CVE-2023-29356",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29356"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-32025": {
      "id": "CVE-2023-32025",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32025"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-32026": {
      "id": "CVE-2023-32026",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-32027": {
      "id": "CVE-2023-32027",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32027"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-32028": {
      "id": "CVE-2023-32028",
      "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32028"
      ],
      "score": 7.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft OLE DB Remote Code Execution Vulnerability",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    }
  }
}