182.48.12.60
{
"scan_id": 1748341798,
"ip": "182.48.12.60",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.48.0.0/18",
"postal_code": "",
"coordinates": {
"latitude": "35.69",
"longitude": "139.69"
},
"geo_point": "35.69, 139.69",
"locale_code": "en",
"continent": "Asia",
"country_code": "JP",
"country_name": "Japan",
"city": ""
},
"location_updated_at": "2025-05-27T16:40:38Z",
"asn": {
"number": "AS7684",
"organization": "SAKURA Internet Inc.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.48.0.0/18",
"organization": "SAKURA Internet Inc.",
"descr": "SAKURA Internet Inc.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-10T12:44:28Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-05-27T16:40:38Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-05-27T17:09:13Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-05-27T16:40:38Z"
}
],
"hostnames": [
{
"name": "www2060m.sakura.ne.jp",
"last_updated_at": "2025-05-30T01:20:34.79228682Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "",
"product": "ProFTPD",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:proftpd:proftpd",
"part": "a",
"vendor": "proftpd",
"product": "proftpd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 ProFTPD Server (SAKURA Internet FTP Server) [::ffff:182.48.12.60]\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-05T06:06:13",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-06-04T01:07:50",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-29T15:18:09.699Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "7.9",
"product": "OpenSSH",
"extra_info": "FreeBSD 20200214; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:7.9",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "7\\.9",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:freebsd:freebsd",
"part": "o",
"vendor": "freebsd",
"product": "freebsd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_7.9 FreeBSD-20200214",
"client_to_server_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes256-ctr",
"aes192-ctr",
"aes128-ctr"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ssh-rsa",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "ef941f7d712ff5cdce6cf25cde5c77aa68a0bd00e878161c7cd12064291c163b"
},
"server_to_client_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes256-ctr",
"aes192-ctr",
"aes128-ctr"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_7.9",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"severity": "high"
},
{
"id": "CVE-2016-20012",
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-30T00:08:52.089Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "8.16.1/8.16.1",
"product": "Sendmail",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.16.1%2F8.16.1",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.16\\.1\\/8\\.16\\.1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www2060m.sakura.ne.jp ESMTP Sendmail 8.16.1/8.16.1; Tue, 27 May 2025 02:27:09 +0900 (JST)\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-02T09:03:42",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-05-31T13:07:54",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-27T00:13:08.036Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -250332872,
"body_sha256": "a9f8ac0eed58cb18dcfc43baec4c0b4a04b18dccdced852b32450ca652c4d0c9",
"component": [
"Nginx"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 28 May 2025 05:41:48 GMT"
],
"server": [
"nginx"
]
},
"protocol": "HTTP/1.1",
"status_code": 403,
"title": "さくらのマネージドサーバ",
"transfer_encoding": [
"chunked"
]
}
},
"url": "http://182.48.12.60/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-28T05:41:49.788Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Courier pop3d",
"extra_info": "",
"tunnel": "",
"modules": {
"pop3": {
"banner": "+OK Hello there.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-04T07:05:32",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-06-04T01:07:50",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-28T12:30:51.51Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Courier Imapd",
"extra_info": "released 2017",
"tunnel": "",
"modules": {
"imap": {
"banner": "* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA IDLE ACL ACL2=UNION STARTTLS] Courier-IMAP ready. Copyright 1998-2017 Double Precision, Inc. See COPYING for distribution information.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-02T09:03:42",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-05-31T13:07:54",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-26T13:52:21.86Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -250332872,
"body_sha256": "a9f8ac0eed58cb18dcfc43baec4c0b4a04b18dccdced852b32450ca652c4d0c9",
"component": [
"Nginx"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 27 May 2025 12:54:36 GMT"
],
"server": [
"nginx"
]
},
"protocol": "HTTP/1.1",
"status_code": 403,
"title": "さくらのマネージドサーバ",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "2ad2ad16d2ad2ad0002ad2ad2ad2addd500b789c2a68f74cdd870d7910152a",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-03T08:04:25",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-05-31T13:07:54",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://182.48.12.60/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-27T13:12:00.124Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "8.16.1/8.16.1",
"product": "Sendmail",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.16.1%2F8.16.1",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.16\\.1\\/8\\.16\\.1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-28T22:02:17.671Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "8.16.1/8.16.1",
"product": "Sendmail",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.16.1%2F8.16.1",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.16\\.1\\/8\\.16\\.1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www2060m.sakura.ne.jp ESMTP Sendmail 8.16.1/8.16.1; Fri, 30 May 2025 06:28:07 +0900 (JST)\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crt"
],
"ocsp_urls": [
"http://ocsp.usertrust.com"
]
},
"authority_key_id": "12e66a258671edcc8e690c5919c007bc1ca8ad4b",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://cps.usertrust.com"
],
"id": "1.3.6.1.4.1.6449.1.2.2.60"
},
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://crl.usertrust.com/GehirnManagedCertificationAuthorityRSADV.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
]
},
"subject_key_id": "166bae77366fdf001e3ae903f61ecc36b9f67001"
},
"fingerprint_md5": "0D02C87EB8B7581E010C76FB7AFB0926",
"fingerprint_sha1": "9F376D4A9E892D28E9501D06AA4236A776881C66",
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"issuer": {
"common_name": [
"Gehirn Managed Certification Authority - RSA DV"
],
"country": [
"JP"
],
"locality": [
"Chiyoda-ku"
],
"organization": [
"Gehirn Inc."
],
"province": [
"Tokyo"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-05T06:06:13",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-06-04T01:07:50",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "93244789895369952624153167781400487290",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e2ecd58f9f968eb8bf452cc75d16e5316fa98c0cad855cf5f02738cdb7ea365c0220541bfce91487e1521c9b59b7bafd3d1dcdf58cfa730f1c64ff3d0c3bba79a7f0"
},
"timestamp": "2025-04-29T07:04:53.381000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100bef55ba57c2107e52f85c528f709ebe7babb3f1e18a19abaaf370dbe599a594f022067bd9cd91ce631ed28adc0f6a0845d780acb12cb44081782120638f96d7c8851"
},
"timestamp": "2025-04-29T07:04:53.308000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204df83be0c17ef4256bc4bc24eea1b1a32c00e27071dde9a9b459d537e38e66be022100882892651b02021cd34e1572bbb0fb82e0095f242a33af7a868b9ee9298b9f2c"
},
"timestamp": "2025-04-29T07:04:53.276000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.sakura.ne.jp"
]
},
"subject_alt_name": {
"dns_names": [
"*.sakura.ne.jp",
"*.180r.com",
"*.2-d.jp",
"*.achoo.jp",
"*.amaretto.jp",
"*.bona.jp",
"*.chew.jp",
"*.crap.jp",
"*.daynight.jp",
"*.deko8.jp",
"*.dojin.com",
"*.eek.jp",
"*.flop.jp",
"*.from.tv",
"*.fubuki.info",
"*.gokujou.biz",
"*.grats.jp",
"*.grrr.jp",
"*.halfmoon.jp",
"*.ivory.ne.jp",
"*.jeez.jp",
"*.jpn.org",
"*.kirara.st",
"*.kokage.cc",
"*.mail-box.ne.jp",
"*.matrix.jp",
"*.mimoza.jp",
"*.mints.ne.jp",
"*.mokuren.ne.jp",
"*.nazo.cc",
"*.netgamers.jp",
"*.noob.jp",
"*.nyanta.jp",
"*.o0o0.jp",
"*.opal.ne.jp",
"*.rash.jp",
"*.razor.jp",
"*.rdy.jp",
"*.rgr.jp",
"*.rojo.jp",
"*.rossa.cc",
"*.rulez.jp",
"*.rusk.to",
"*.saikyou.biz",
"*.sakura.tv",
"*.sakuratan.com",
"*.sakuraweb.com",
"*.saloon.jp",
"*.sblo.jp",
"*.silk.to",
"*.skr.jp",
"*.spawn.jp",
"*.squares.net",
"*.sumomo.ne.jp",
"*.tank.jp",
"*.thyme.jp",
"*.topaz.ne.jp",
"*.uh-oh.jp",
"*.undo.jp",
"*.websozai.jp",
"*.whoa.jp",
"*.x0.com",
"*.x0.to",
"*.xii.jp"
],
"extended_dns_names": [
{
"domain": "sakura",
"fld": "sakura.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "180r",
"fld": "180r.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "2-d",
"fld": "2-d.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "achoo",
"fld": "achoo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "amaretto",
"fld": "amaretto.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "bona",
"fld": "bona.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "chew",
"fld": "chew.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "crap",
"fld": "crap.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "daynight",
"fld": "daynight.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "deko8",
"fld": "deko8.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "dojin",
"fld": "dojin.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "eek",
"fld": "eek.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "flop",
"fld": "flop.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "from",
"fld": "from.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "fubuki",
"fld": "fubuki.info",
"subdomain": "*",
"tld": "info"
},
{
"domain": "gokujou",
"fld": "gokujou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "grats",
"fld": "grats.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "grrr",
"fld": "grrr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "halfmoon",
"fld": "halfmoon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "ivory",
"fld": "ivory.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "jeez",
"fld": "jeez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "jpn",
"fld": "jpn.org",
"subdomain": "*",
"tld": "org"
},
{
"domain": "kirara",
"fld": "kirara.st",
"subdomain": "*",
"tld": "st"
},
{
"domain": "kokage",
"fld": "kokage.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "mail-box",
"fld": "mail-box.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "matrix",
"fld": "matrix.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mimoza",
"fld": "mimoza.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "mints",
"fld": "mints.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "mokuren",
"fld": "mokuren.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "nazo",
"fld": "nazo.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "netgamers",
"fld": "netgamers.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "noob",
"fld": "noob.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "nyanta",
"fld": "nyanta.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "o0o0",
"fld": "o0o0.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "opal",
"fld": "opal.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "rash",
"fld": "rash.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "razor",
"fld": "razor.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rdy",
"fld": "rdy.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rgr",
"fld": "rgr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rojo",
"fld": "rojo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rossa",
"fld": "rossa.cc",
"subdomain": "*",
"tld": "cc"
},
{
"domain": "rulez",
"fld": "rulez.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "rusk",
"fld": "rusk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "saikyou",
"fld": "saikyou.biz",
"subdomain": "*",
"tld": "biz"
},
{
"domain": "sakura",
"fld": "sakura.tv",
"subdomain": "*",
"tld": "tv"
},
{
"domain": "sakuratan",
"fld": "sakuratan.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "sakuraweb",
"fld": "sakuraweb.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "saloon",
"fld": "saloon.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "sblo",
"fld": "sblo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "silk",
"fld": "silk.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "skr",
"fld": "skr.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "spawn",
"fld": "spawn.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "squares",
"fld": "squares.net",
"subdomain": "*",
"tld": "net"
},
{
"domain": "sumomo",
"fld": "sumomo.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "tank",
"fld": "tank.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "thyme",
"fld": "thyme.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "topaz",
"fld": "topaz.ne.jp",
"subdomain": "*",
"tld": "ne.jp"
},
{
"domain": "uh-oh",
"fld": "uh-oh.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "undo",
"fld": "undo.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "websozai",
"fld": "websozai.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "whoa",
"fld": "whoa.jp",
"subdomain": "*",
"tld": "jp"
},
{
"domain": "x0",
"fld": "x0.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "x0",
"fld": "x0.to",
"subdomain": "*",
"tld": "to"
},
{
"domain": "xii",
"fld": "xii.jp",
"subdomain": "*",
"tld": "jp"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "810060207e02f6eef66d6de9c827bc20170a28b837a9391659d2cd445dae8676",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "c43eab878aae7618511e353fa57de391f98aa3ed20ed0e1ac6c83346aa62c354",
"tbs_noct_fingerprint": "b1939aabfa85ef3ea3fe52fb94b4fd1f35f05e74bd32aacc40863cec2340706d",
"validation_level": "DV",
"validity": {
"length_seconds": 33350400,
"not_after": "2026-05-19T23:59:59",
"not_before": "2025-04-29T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "E662C1CDAA19AC86EBA165C07F008F7DC276F4CC2A2842A62FACF868F105F27C",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-29T23:36:25.679Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Courier Imapd",
"extra_info": "released 2017",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-29T00:07:12.47Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Courier pop3d",
"extra_info": "",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-26T08:06:40.836Z"
}
],
"services_hash": "a8a115ddd5ef50e4e9b249488ad15ef5977ac12691b5deb8ac7cb8f6d93f0820",
"last_updated_at": "2025-05-30T00:08:52.089Z",
"banner": [
"ssh",
"http",
"pop3",
"tls",
"smtp",
"ftp",
"imap"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-1298": {
"id": "CVE-1999-1298",
"references": [
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc",
"http://www.iss.net/security_center/static/7537.php",
"http://www.osvdb.org/6087",
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc",
"http://www.iss.net/security_center/static/7537.php",
"http://www.osvdb.org/6087"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1301": {
"id": "CVE-1999-1301",
"references": [
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:17.rzsz.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-31.shtml",
"http://www.iss.net/security_center/static/7540.php",
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:17.rzsz.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-31.shtml",
"http://www.iss.net/security_center/static/7540.php"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1313": {
"id": "CVE-1999-1313",
"references": [
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/7348",
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/7348"
],
"score": 4.6,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1314": {
"id": "CVE-1999-1314",
"references": [
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml",
"http://www.iss.net/security_center/static/7429.php",
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc",
"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml",
"http://www.iss.net/security_center/static/7429.php"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1385": {
"id": "CVE-1999-1385",
"references": [
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:20.stack-overflow.asc",
"http://marc.info/?l=bugtraq&m=87602167420332&w=2",
"http://www.iss.net/security_center/static/7465.php",
"http://www.osvdb.org/6085",
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:20.stack-overflow.asc",
"http://marc.info/?l=bugtraq&m=87602167420332&w=2",
"http://www.iss.net/security_center/static/7465.php",
"http://www.osvdb.org/6085"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Buffer overflow in ppp program in FreeBSD 2.1 and earlier allows local users to gain privileges via a long HOME environment variable.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2016-20012": {
"id": "CVE-2016-20012",
"references": [
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1",
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2018-20685": {
"id": "CVE-2018-20685",
"references": [
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"weakness": "CWE-863"
},
"CVE-2019-16905": {
"id": "CVE-2019-16905",
"references": [
"https://0day.life/exploits/0day-1009.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1153537",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c.diff?r1=1.5&r2=1.6&f=h",
"https://security.gentoo.org/glsa/201911-01",
"https://security.netapp.com/advisory/ntap-20191024-0003/",
"https://ssd-disclosure.com/archives/4033/ssd-advisory-openssh-pre-auth-xmss-integer-overflow",
"https://www.openssh.com/releasenotes.html",
"https://www.openwall.com/lists/oss-security/2019/10/09/1"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2019-6109": {
"id": "CVE-2019-6109",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-116"
},
"CVE-2019-6110": {
"id": "CVE-2019-6110",
"references": [
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-838"
},
"CVE-2019-6111": {
"id": "CVE-2019-6111",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-22"
},
"CVE-2020-14145": {
"id": "CVE-2020-14145",
"references": [
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-203"
},
"CVE-2020-15778": {
"id": "CVE-2020-15778",
"references": [
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html",
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-78"
},
"CVE-2021-36368": {
"id": "CVE-2021-36368",
"references": [
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html",
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html"
],
"score": 3.7,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-287"
},
"CVE-2021-41617": {
"id": "CVE-2021-41617",
"references": [
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174",
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-38408": {
"id": "CVE-2023-38408",
"references": [
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-428"
},
"CVE-2023-48795": {
"id": "CVE-2023-48795",
"references": [
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-354"
},
"CVE-2023-51384": {
"id": "CVE-2023-51384",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-51385": {
"id": "CVE-2023-51385",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"weakness": "CWE-78"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
}
}
}