182.93.78.39
{
"scan_id": 1745818139,
"ip": "182.93.78.39",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.93.78.0/24",
"postal_code": "",
"coordinates": {
"latitude": "27.7108",
"longitude": "85.3251"
},
"geo_point": "27.7108, 85.3251",
"locale_code": "en",
"continent": "Asia",
"country_code": "NP",
"country_name": "Nepal",
"city": "Kathmandu"
},
"location_updated_at": "2025-04-27T00:42:05Z",
"asn": {
"number": "AS4007",
"organization": "Subisu Cablenet Pvt Ltd, Baluwatar, Kathmandu, Nepal",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.93.64.0/19",
"organization": "SUBISU_ROUTE_OBJECT_D",
"descr": "SUBISU_ROUTE_OBJECT_D",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:54Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-04-27T00:42:05Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-04-27T04:28:05Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-04-27T00:42:05Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "",
"product": "Microsoft ftpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:ftp_service",
"part": "a",
"vendor": "microsoft",
"product": "ftp_service",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 Microsoft FTP Service\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-23T15:06:17.102Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
"body_murmur": 1489525118,
"body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
"component": [
"Microsoft HTTPAPI:2.0"
],
"content_length": 315,
"headers": {
"content_length": [
"315"
],
"content_type": [
"text/html; charset=us-ascii"
],
"date": [
"Sun, 27 Apr 2025 00:51:34 GMT"
],
"server": [
"Microsoft-HTTPAPI/2.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.93.78.39",
"path": "",
"scheme": "http"
}
},
"status_code": 404,
"title": "Not Found"
}
},
"url": "http://182.93.78.39/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-27T00:51:40.923Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
"body_murmur": 1489525118,
"body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
"component": [
"Microsoft HTTPAPI:2.0"
],
"content_length": 315,
"headers": {
"content_length": [
"315"
],
"content_type": [
"text/html; charset=us-ascii"
],
"date": [
"Tue, 29 Apr 2025 01:07:22 GMT"
],
"server": [
"Microsoft-HTTPAPI/2.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.93.78.39",
"path": "",
"scheme": "https"
}
},
"status_code": 404,
"title": "Not Found"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r11.i.lencr.org/"
],
"ocsp_urls": [
"http://r11.o.lencr.org"
]
},
"authority_key_id": "c5cf46a4eaf4c3c07a6c95c42db05e922f26e3b9",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:\n D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7\n Timestamp : Mar 7 04:13:52.634 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:28:2E:C4:AB:F8:2E:F9:9A:F7:DD:6A:FC:\n 35:2D:3D:52:00:13:23:DA:4B:8E:AD:A4:19:34:DD:FB:\n C6:AA:57:6D:02:20:4D:33:B8:EA:74:28:1A:05:73:8E:\n 8D:92:DD:D5:24:C3:B4:23:26:32:4C:95:90:81:5E:B0:\n 25:93:18:DD:CF:BC\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 13:4A:DF:1A:B5:98:42:09:78:0C:6F:EF:4C:7A:91:A4:\n 16:B7:23:49:CE:58:57:6A:DF:AE:DA:A7:C2:AB:E0:22\n Timestamp : Mar 7 04:13:53.063 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:AB:DD:86:85:D9:7D:B5:1B:9E:9D:75:\n D3:F0:AC:78:E5:2C:B9:21:6A:62:4B:0A:A8:9E:F8:74:\n 3E:3D:D9:98:0B:02:21:00:C4:58:79:EA:7C:75:0F:84:\n 87:9E:B3:C7:3A:CE:41:BF:3C:31:0B:C2:71:84:7B:BE:\n 99:FE:C0:3A:51:C3:58:F3",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"officehrm.continental.com.np"
]
},
"subject_key_id": "259a6c4b2824e707362360eeab268c4434acc7ec"
},
"fingerprint_md5": "6973F82D1710C3BA3BEF004E4B349C65",
"fingerprint_sha1": "17F9BC252E8309C1D86A5F3FCA11B3EC472046B9",
"fingerprint_sha256": "719BDCBBB77F20EEDA4DD8BEFC11F97044B7F1786E0494F79FE0C03A0748401B",
"issuer": {
"common_name": [
"R11"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R11",
"jarm": "2ad2ad00000000022c2ad2ad2ad2ad89cb1e4a786a3a377716a803180489d2",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-05-05T07:25:58",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "432828209765618675036691067533031795292112",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "NmIyMGY3Nzc0YjJkMGExNmJhNTExYzgwZjJjMzNhMjg3Yzg2ZGVhMmViODRkNDlkYzhlYTJlMTA4ZmEwZWFmNjNlNjFkNzdlODg2OGZiZWNmOGIzZmJhMzdhZDI0MmNhMmRhYWZhYWIyNzUwODZhN2Y0YmFkNmUwYmU0OWZjODVkZmNhYjE5OWUwMjg3MTBmYzE2NzBkMTg3NDc0MmFkOWU1ZmM5NGFhNTVjMzllNTJhM2UzMGJlNGUzMmJlMGM3ZGUzYmNlY2UzOTU4NzkwYzgwNWFlMjk2OWU1NjI0M2M0ZWI4MWNmYTdjMDIzNzRjMWNmNGVhNzZlNWJiNjc3Y2RmYjY5MGE5Yzk4ZmVjODkyMTYxNTMzY2M3ZTZiMWNmNTE1YTk3OTY4MjJmY2NiNTMyYzE3YzY1ZGQwZmYzMDUyYmM2MzIzZWIxNTJmNGYyNjY1ZmEzODk0MjkxMGVmZjYzNDQ4NmJiZDkwYTZjYWQyMTQzZTc4Yjg2YWM3YzJlYWMzZmFkNzM2NzEyZTU3MmJjYzlmYmUzMjU1ZTJhYzBlYmQwZmRiMTlhMzYyMTdhY2RiZTEzYWIwNzI2ZjQ4MDNmZmQxNjQ5MmY5ZGY1YjgwNTQ4MWUzY2IyMjg0ZWM3NmVjNGRlOWUyMmU0YTgxMTI1MzUxMDJiYWQ3NmYyMTk="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "a2e30ae445efbdad9b7e38ed47677753d7825b8494d72b5e1b2cc4b950a447e7",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30440220282ec4abf82ef99af7dd6afc352d3d52001323da4b8eada41934ddfbc6aa576d02204d33b8ea74281a05738e8d92ddd524c3b42326324c9590815eb0259318ddcfbc"
},
"timestamp": "2025-03-07T04:13:52.634000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "134adf1ab5984209780c6fef4c7a91a416b72349ce58576adfaedaa7c2abe022",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100abdd8685d97db51b9e9d75d3f0ac78e52cb9216a624b0aa89ef8743e3dd9980b022100c45879ea7c750f84879eb3c73ace41bf3c310bc271847bbe99fec03a51c358f3"
},
"timestamp": "2025-03-07T04:13:53.063000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"officehrm.continental.com.np"
]
},
"subject_alt_name": {
"dns_names": [
"officehrm.continental.com.np"
],
"extended_dns_names": [
{
"domain": "continental",
"fld": "continental.com.np",
"subdomain": "officehrm",
"tld": "com.np"
}
]
},
"subject_dn": "/CN=officehrm.continental.com.np",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "46067e1e9e2e3bc22f5f4e1d010ffa980513a4f832e1c8173773ab23ffef344e",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 3072,
"modulus": "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"
}
},
"tbs_fingerprint": "be0c8555cff97661d8efb3e460df0812cffcc0d37fa9d84d1d4b0c2ff0d1d516",
"tbs_noct_fingerprint": "2c38af00930861978813f18f806e97266e3749979006a7448fcafdeeb422f31a",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-06-05T03:15:21",
"not_before": "2025-03-07T03:15:22"
},
"version": 2
},
"fingerprint_sha256": "719BDCBBB77F20EEDA4DD8BEFC11F97044B7F1786E0494F79FE0C03A0748401B",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://182.93.78.39/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-29T01:23:29.799Z"
},
{
"port": 445,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smb": {
"capabilities": {
"dfs_support": true,
"leasing_support": true,
"multicredit_support": true
},
"has_ntlm": true,
"negotiation": {
"authentication_types": [
"1.3.6.1.4.1.311.2.2.30",
"1.3.6.1.4.1.311.2.2.10"
],
"capabilities": 7,
"credits": 1,
"dialect_revision": 528,
"flags": 1,
"protocol_id": "AAAAAP5TTUI=",
"security_mode": 1,
"server_guid": "AAAAAAAAAAAAAAAAAAAAALA6wKR2DkJCp3Uvrmyn/fE=",
"server_start_time": "2009-04-22T19:24:48Z",
"system_time": "2025-04-27T10:02:01Z"
},
"smbv1_support": false,
"version": "2.1.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-27T10:02:02.079Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "15.00.2125",
"product": "Microsoft SQL Server 2019",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2019",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2019",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_ON",
"instance_name": "",
"version": "15.0.2125"
}
},
"cve": [
{
"id": "CVE-2007-5090",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2021-1636",
"score": 8.8,
"severity": "high"
},
{
"id": "CVE-2022-23276",
"score": 7.8,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-25T21:06:27.145Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "postgresql",
"version": "9.6.0 or later",
"product": "PostgreSQL DB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postgresql:postgresql",
"part": "a",
"vendor": "postgresql",
"product": "postgresql",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"postgres": {
"errors": [
{
"code": "0A000",
"file": "d:\\pginstaller_13.auto\\postgres.windows-x64\\src\\backend\\postmaster\\postmaster.c",
"line": "2109",
"message": "unsupported frontend protocol 255.255: server supports 2.0 to 3.0",
"routine": "ProcessStartupPacket",
"severity": "FATAL"
},
{
"code": "",
"file": "ATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
"line": "",
"message": "",
"routine": "",
"severity": ""
},
{
"code": "",
"file": "ATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
"line": "",
"message": "",
"routine": "",
"severity": ""
}
],
"is_ssl": false,
"supported_versions": "FATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-25T18:41:01.329Z"
}
],
"services_hash": "15d71db391e32d1b57b9a814f5e2befb0416a6bd33ff052a313987a1ca50a112",
"last_updated_at": "2025-04-29T01:23:29.799Z",
"banner": [
"http",
"tls",
"mssql",
"postgres",
"ftp",
"smb"
],
"is_vuln": true,
"cveDetails": {
"CVE-2007-5090": {
"id": "CVE-2007-5090",
"references": [
"http://osvdb.org/40598",
"http://secunia.com/advisories/26899",
"http://www-1.ibm.com/support/docview.wss?uid=swg21268116",
"http://www.securityfocus.com/bid/25810",
"http://www.securitytracker.com/id?1018735",
"http://www.vupen.com/english/advisories/2007/3264",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36771"
],
"score": 7.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Unspecified vulnerability in IBM Rational ClearQuest (CQ), when a Microsoft SQL Server or an IBM DB2 database is used, allows attackers to corrupt data via unspecified vectors.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-264"
},
"CVE-2021-1636": {
"id": "CVE-2021-1636",
"references": [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Elevation of Privilege Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-89"
},
"CVE-2022-23276": {
"id": "CVE-2022-23276",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23276"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "SQL Server for Linux Containers Elevation of Privilege Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-269"
},
"CVE-2022-29143": {
"id": "CVE-2022-29143",
"references": [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143"
],
"score": 7.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21528": {
"id": "CVE-2023-21528",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21528"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21704": {
"id": "CVE-2023-21704",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21705": {
"id": "CVE-2023-21705",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21705"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21713": {
"id": "CVE-2023-21713",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21713"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21718": {
"id": "CVE-2023-21718",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-23384": {
"id": "CVE-2023-23384",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384"
],
"score": 7.3,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-29349": {
"id": "CVE-2023-29349",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29349"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC and OLE DB Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-29356": {
"id": "CVE-2023-29356",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29356"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32025": {
"id": "CVE-2023-32025",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32025"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32026": {
"id": "CVE-2023-32026",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32027": {
"id": "CVE-2023-32027",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32027"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32028": {
"id": "CVE-2023-32028",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32028"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft OLE DB Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
}
}
}