Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

191.252.179.212

SummaryCVE DetailsRaw Data
15 Dec 2025, 13:50:50 UTC
{
  "scan_id": 1765693530,
  "ip": "191.252.179.212",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "191.252.160.0/19",
    "postal_code": "",
    "coordinates": {
      "latitude": "-22.8305",
      "longitude": "-43.2192"
    },
    "geo_point": "-22.8305, -43.2192",
    "locale_code": "en",
    "continent": "South America",
    "country_code": "BR",
    "country_name": "Brazil",
    "city": ""
  },
  "location_updated_at": "2025-12-12T16:44:53Z",
  "asn": {
    "number": "AS27715",
    "organization": "Locaweb Servicos de Internet SA",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "",
    "organization": "",
    "descr": "",
    "_encoding": {
      "raw": ""
    }
  },
  "whois_updated_at": "0001-01-01T00:00:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-12-12T16:44:53Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-12-12T23:30:49Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-12-12T16:44:53Z"
    }
  ],
  "hostnames": [
    {
      "name": "vps26014.publiccloud.com.br",
      "last_updated_at": "2025-12-12T23:30:49Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.41",
      "product": "Apache httpd",
      "extra_info": "(Ubuntu)",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.41",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.41",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "component": [
            "Ubuntu",
            "Apache HTTP Server:2.4.41"
          ],
          "headers": {
            "content_length": [
              "0"
            ],
            "content_type": [
              "text/html; charset=UTF-8"
            ],
            "date": [
              "Fri, 21 Nov 2025 01:25:00 GMT"
            ],
            "server": [
              "Apache/2.4.41 (Ubuntu)"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "191.252.179.212",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200
        }
      },
      "cve": [
        {
          "id": "CVE-2006-20001",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2019-17567",
          "score": 5.3,
          "severity": "medium"
        },
        {
          "id": "CVE-2020-11984",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "http://191.252.179.212/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-21T01:30:18.625Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.41",
      "product": "Apache httpd",
      "extra_info": "(Ubuntu)",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.41",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.41",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n\n<html>\n\n<head>\n  <meta charset=\"utf-8\">\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n  <title>Orthanc Explorer</title>\n\n  <link rel=\"stylesheet\" href=\"libs/jquery.mobile.min.css\" />\n  <link rel=\"stylesheet\" href=\"libs/jqtree.css\" />\n  <link rel=\"stylesheet\" href=\"libs/jquery.mobile.simpledialog.min.css\" />\n  <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/style.css\" />\n  <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/jquery.fileupload-ui.css\" />\n  <link rel=\"stylesheet\" href=\"libs/slimbox2/slimbox2.css\" />\n\n  <script src=\"libs/jquery.min.js\"></script>\n  <script src=\"libs/jquery.mobile.min.js\"></script>\n  <script src=\"libs/jqm.page.params.js\"></script>\n  <script src=\"libs/tree.jquery.js\"></script>\n  <script src=\"libs/date.js\"></script>\n  <script src=\"libs/jquery.mobile.simpledialog2.js\"></script>\n  <script src=\"libs/slimbox2.js\"></script>\n  <script src=\"libs/jquery.blockui.js\"></script>\n\n  <!-- https://github.com/blueimp/jQuery-File-Upload/wiki/Basic-plugin -->\n  <script src=\"libs/jquery-file-upload/js/vendor/jquery.ui.widget.js\"></script>\n  <script src=\"libs/jquery-file-upload/js/jquery.iframe-transport.js\"></script>\n  <script src=\"libs/jquery-file-upload/js/jquery.fileupload.js\"></script>\n\n  <link rel=\"stylesheet\" href=\"explorer.css\" />\n  <script src=\"file-upload.js\"></script>\n  <script src=\"explorer.js\"></script>\n  <script src=\"query-retrieve.js\"></script>\n  <script src=\"../plugins/explorer.js\"></script>\n</head>\n\n<body>\n  <div data-role=\"page\" id=\"lookup\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Lookup studies</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div data-role=\"content\" id=\"content\" style=\"padding:0px\">\n        <p align=\"center\">\n          <a href=\"http://www.orthanc-server.com/\" target=\"_blank\" alt=\"Orthanc homepage\">\n            <img src=\"orthanc-logo.png\" alt=\"Orthanc\" style=\"max-width:100%\" />\n          </a>\n        </p>\n      </div>\n      \n      <form data-ajax=\"false\" id=\"lookup-form\">\n        <div data-role=\"fieldcontain\">\n          <label for=\"lookup-patient-id\">Patient ID:</label>\n          <input type=\"text\" name=\"lookup-patient-id\" id=\"lookup-patient-id\" value=\"\" />\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"lookup-patient-name\">Patient Name:</label>\n          <input type=\"text\" name=\"lookup-patient-name\" id=\"lookup-patient-name\" value=\"\" />\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"lookup-accession-number\">Accession Number:</label>\n          <input type=\"text\" name=\"lookup-accession-number\" id=\"lookup-accession-number\" value=\"\" />\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"lookup-study-description\">Study Description:</label>\n          <input type=\"text\" name=\"lookup-study-description\" id=\"lookup-study-description\" value=\"\" />\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"lookup-study-date\">Study Date:</label>\n          <select name=\"lookup-study-date\" id=\"lookup-study-date\">\n          </select>\n        </div>\n\n        <fieldset class=\"ui-grid-b\">\n          <div class=\"ui-block-a\">\n            <a href=\"#find-patients\" data-role=\"button\" data-theme=\"b\" data-direction=\"reverse\">All patients</a>\n          </div>\n          <div class=\"ui-block-b\">\n            <a href=\"#find-studies\" data-role=\"button\" data-theme=\"b\" data-direction=\"reverse\">All studies</a>\n          </div>\n          <div class=\"ui-block-c\">\n            <button id=\"lookup-submit\" type=\"submit\" data-theme=\"e\">Do lookup</button>\n          </div>\n        </fieldset>\n        <div>&nbsp;</div>\n      </form>\n      <div id=\"lookup-result\">\n        <div id=\"lookup-alert\">\n          <div class=\"ui-bar ui-bar-e\">\n            <h3>Warning:</h3> Your lookup led to many results!\n            Showing only <span id=\"lookup-count\">?</span> studies to\n            avoid performance issue. Please make your query more\n            specific, then relaunch the lookup.\n          </div>\n          <div>&nbsp;</div>\n        </div>\n        <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n        </ul>\n      </div>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"find-patients\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>All patients</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div id=\"alert-patients\">\n        <div class=\"ui-bar ui-bar-e\">\n          <h3>Warning:</h3> This is a large Orthanc server. Showing\n          only <span id=\"count-patients\">?</span> patients to avoid\n          performance issue. Make sure to use lookup if targeting\n          specific patients!\n        </div>\n        <div>&nbsp;</div>\n      </div>\n      <ul id=\"all-patients\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n      </ul>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"find-studies\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>All studies</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div id=\"alert-studies\">\n        <div class=\"ui-bar ui-bar-e\">\n          <h3>Warning:</h3> This is a large Orthanc server. Showing\n          only <span id=\"count-studies\">?</span> studies to avoid\n          performance issue. Make sure to use lookup if targeting\n          specific studies!\n        </div>\n        <div>&nbsp;</div>\n      </div>\n      <ul id=\"all-studies\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n      </ul>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"upload\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Upload DICOM files</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div>\n        <!-- It's very difficult to style a \"file\" input so we\n        actually hide it and create a \"proxy\" button that is\n        forwarding its click to the \"file\" input -->\n        <input id=\"fileupload\" type=\"file\" name=\"files[]\" data-url=\"../instances/\" style=\"display:none\" multiple>\n      </div>\n      <p>\n        <ul data-role=\"listview\" data-inset=\"true\">\n          <li id=\"fileupload-proxy\" onclick=\"$('#fileupload').click()\" data-icon=\"arrow-r\" data-theme=\"e\">\n            <a href=\"#\">Select files to upload ...</a>\n          </li>\n          <li data-icon=\"arrow-r\" data-theme=\"e\"><a href=\"#\" id=\"upload-button\">Start the upload</a></li>\n          <!--li data-icon=\"gear\" data-theme=\"e\"><a href=\"#\" id=\"upload-abort\" class=\"ui-disabled\">Abort the current upload</a></li-->\n          <li data-icon=\"delete\" data-theme=\"d\"><a href=\"#\" id=\"upload-clear\">Clear the pending uploads</a></li>\n        </ul>\n        <div id=\"progress\" class=\"ui-corner-all\">\n          <span class=\"bar ui-corner-all\"></span>\n          <div class=\"label\"></div>\n        </div>\n      </p>\n      <div class=\"ui-bar ui-bar-e\" id=\"issue-21-warning\">\n        <h3>Warning:</h3> Orthanc issue #21: On Firefox, especially on\n        Linux & OSX systems, files might be missing if using\n        drag-and-drop. Please use the \"Select files to upload\" button\n        instead, or use the command-line \"ImportDicomFiles.py\" script.\n      </div>\n      <ul id=\"upload-list\" data-role=\"listview\" data-inset=\"true\">\n        <li data-role=\"list-divider\">Drag and drop DICOM files here</li>\n      </ul>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"patient\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Patient</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div class=\"ui-grid-a\">\n        <div class=\"ui-block-a\" style=\"width:30%\">\n          <div style=\"padding-right:10px\">\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"patient-info\">\n            </ul>\n            <p>\n              <div class=\"switch-container\">\n                <select name=\"protection\" id=\"protection\" data-role=\"slider\">\n                  <option value=\"off\">Unprotected</option>\n                  <option value=\"on\">Protected</option>\n                </select>\n              </div>\n            </p>\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Interact</li>\n              <li data-icon=\"delete\"><a href=\"#\" id=\"patient-delete\">Delete this patient</a></li>\n              <li data-icon=\"forward\"><a href=\"#\" id=\"patient-store\">Send to remote modality</a></li>\n              <li data-icon=\"star\"><a href=\"#\" id=\"patient-anonymize\">Anonymize</a></li>\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Access</li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"patient-anonymized-from\">Before anonymization</a>\n              </li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"patient-modified-from\">Before modification</a>\n              </li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"patient-archive\">Download ZIP</a></li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"patient-media\">Download DICOMDIR</a></li>\n            </ul>\n          </div>\n        </div>\n        <div class=\"ui-block-b\" style=\"width:70%\">\n          <div style=\"padding:10px\">\n            <ul id=\"list-studies\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n            </ul>\n          </div>\n        </div>\n      </div>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"study\">\n    <div data-role=\"header\">\n      <h1>\n        <span class=\"orthanc-name\"></span>\n        <a href=\"#\" class=\"patient-link\">Patient</a> &raquo;\n        Study\n      </h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div class=\"ui-grid-a\">\n        <div class=\"ui-block-a\" style=\"width:30%\">\n          <div style=\"padding-right:10px\">\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"study-info\">\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Interact</li>\n              <li data-icon=\"delete\"><a href=\"#\" id=\"study-delete\">Delete this study</a></li>\n              <li data-icon=\"forward\"><a href=\"#\" id=\"study-store\">Send to DICOM modality</a></li>\n              <li data-icon=\"star\"><a href=\"#\" id=\"study-anonymize\">Anonymize</a></li>\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Access</li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"study-anonymized-from\">Before anonymization</a>\n              </li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"study-modified-from\">Before modification</a>\n              </li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"study-archive\">Download ZIP</a></li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"study-media\">Download DICOMDIR</a></li>\n            </ul>\n          </div>\n        </div>\n        <div class=\"ui-block-b\" style=\"width:70%\">\n          <div style=\"padding:10px\">\n            <ul id=\"list-series\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n            </ul>\n          </div>\n        </div>\n      </div>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"series\">\n    <div data-role=\"header\">\n      <h1>\n        <span class=\"orthanc-name\"></span>\n        <a href=\"#\" class=\"patient-link\">Patient</a> &raquo;\n        <a href=\"#\" class=\"study-link\">Study</a> &raquo;\n        Series\n      </h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div class=\"ui-grid-a\">\n        <div class=\"ui-block-a\" style=\"width:30%\">\n          <div style=\"padding-right:10px\">\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"series-info\">\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Interact</li>\n              <li data-icon=\"delete\"><a href=\"#\" id=\"series-delete\">Delete this series</a></li>\n              <li data-icon=\"forward\"><a href=\"#\" id=\"series-store\">Send to DICOM modality</a></li>\n              <li data-icon=\"star\"><a href=\"#\" id=\"series-anonymize\">Anonymize</a></li>\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Access</li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"series-anonymized-from\">Before anonymization</a>\n              </li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"series-modified-from\">Before modification</a>\n              </li>\n              <li data-icon=\"search\"><a href=\"#\" id=\"series-preview\">Preview this series</a></li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"series-archive\">Download ZIP</a></li>\n              <li data-icon=\"gear\"><a href=\"#\" id=\"series-media\">Download DICOMDIR</a></li>\n            </ul>\n          </div>\n        </div>\n        <div class=\"ui-block-b\" style=\"width:70%\">\n          <div style=\"padding:10px\">\n            <ul id=\"list-instances\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n            </ul>\n          </div>\n        </div>\n      </div>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"instance\">\n    <div data-role=\"header\">\n      <h1>\n        <span class=\"orthanc-name\"></span>\n        <a href=\"#\" class=\"patient-link\">Patient</a> &raquo;\n        <a href=\"#\" class=\"study-link\">Study</a> &raquo;\n        <a href=\"#\" class=\"series-link\">Series</a> &raquo;\n        Instance\n      </h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n        <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <div class=\"ui-grid-a\">\n        <div class=\"ui-block-a\" style=\"width:30%\">\n          <div style=\"padding-right:10px\">\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"instance-info\">\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Interact</li>\n              <li data-icon=\"delete\"><a href=\"#\" id=\"instance-delete\">Delete this instance</a></li>\n              <li data-icon=\"forward\"><a href=\"#\" id=\"instance-store\">Send to DICOM modality</a></li>\n            </ul>\n\n            <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n              <li data-role=\"list-divider\">Access</li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"instance-anonymized-from\">Before anonymization</a>\n              </li>\n              <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n                <a href=\"#\" id=\"instance-modified-from\">Before modification</a>\n              </li>\n              <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-dicom\">Download the DICOM file</a></li>\n              <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-json\">Download the JSON file</a></li>\n              <li data-icon=\"search\"><a href=\"#\" id=\"instance-preview\">Preview the instance</a></li>\n            </ul>\n          </div>\n        </div>\n        <div class=\"ui-block-b\" style=\"width:70%\">\n          <div style=\"padding:10px\">\n            <div class=\"ui-body ui-body-b\">\n              <h1>DICOM Tags</h1>\n              <p align=\"right\">\n                <input type=\"checkbox\" id=\"show-tag-name\" checked=\"checked\" class=\"custom\" data-mini=\"true\" />\n                <label for=\"show-tag-name\">Show tag description</label>\n              </p>\n              <div id=\"dicom-tree\"></div>\n            </div>\n          </div>\n        </div>\n      </div>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"plugins\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Plugins</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <ul id=\"all-plugins\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n      </ul>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"query-retrieve\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (1/4)</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <form data-ajax=\"false\">\n        <div data-role=\"fieldcontain\">\n          <label for=\"qr-server\">DICOM server:</label>\n          <select name=\"qr-server\" id=\"qr-server\">\n          </select>\n        </div>\n\n        <div data-role=\"fieldcontain\" id=\"qr-fields\">\n          <fieldset data-role=\"controlgroup\">\n            <legend>Field of interest:</legend>\n            <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-id\" value=\"PatientID\" checked=\"checked\" />\n            <label for=\"qr-patient-id\">Patient ID</label>\n            <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-name\" value=\"PatientName\" />\n            <label for=\"qr-patient-name\">Patient Name</label>\n            <input type=\"radio\" name=\"qr-field\" id=\"qr-accession-number\" value=\"AccessionNumber\" />\n            <label for=\"qr-accession-number\">Accession Number</label>\n            <input type=\"radio\" name=\"qr-field\" id=\"qr-study-description\" value=\"StudyDescription\" />\n            <label for=\"qr-study-description\">Study Description</label>\n          </fieldset>\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"qr-value\">Value for this field:</label>\n          <input type=\"text\" name=\"qr-value\" id=\"qr-value\" value=\"*\" />\n        </div>\n\n        <div data-role=\"fieldcontain\">\n          <label for=\"qr-date\">Study date:</label>\n          <select name=\"qr-date\" id=\"qr-date\">\n          </select>\n        </div>\n\n        <div data-role=\"fieldcontain\" id=\"qr-modalities\">\n          <div data-role=\"fieldcontain\">\n            <fieldset data-role=\"controlgroup\" data-type=\"horizontal\">\n              <legend>Modalities:</legend>\n              <input type=\"checkbox\" name=\"CR\" id=\"qr-cr\" class=\"custom\" /> <label for=\"qr-cr\">CR</label>\n              <input type=\"checkbox\" name=\"CT\" id=\"qr-ct\" class=\"custom\" /> <label for=\"qr-ct\">CT</label>\n              <input type=\"checkbox\" name=\"MR\" id=\"qr-mr\" class=\"custom\" /> <label for=\"qr-mr\">MR</label>\n              <input type=\"checkbox\" name=\"NM\" id=\"qr-nm\" class=\"custom\" /> <label for=\"qr-nm\">NM</label>\n              <input type=\"checkbox\" name=\"PT\" id=\"qr-pt\" class=\"custom\" /> <label for=\"qr-pt\">PT</label>\n              <input type=\"checkbox\" name=\"US\" id=\"qr-us\" class=\"custom\" /> <label for=\"qr-us\">US</label>\n              <input type=\"checkbox\" name=\"XA\" id=\"qr-xa\" class=\"custom\" /> <label for=\"qr-xa\">XA</label>\n              <input type=\"checkbox\" name=\"DR\" id=\"qr-dr\" class=\"custom\" /> <label for=\"qr-dr\">DR</label>\n              <input type=\"checkbox\" name=\"DX\" id=\"qr-dx\" class=\"custom\" /> <label for=\"qr-dx\">DX</label>\n              <input type=\"checkbox\" name=\"MG\" id=\"qr-mg\" class=\"custom\" /> <label for=\"qr-mg\">MG</label>\n            </fieldset>\n          </div>\n        </div>\n\n        <fieldset class=\"ui-grid-a\">\n          <div class=\"ui-block-a\">\n            <button id=\"qr-echo\" data-theme=\"a\">Test Echo</button>\n          </div>\n          <div class=\"ui-block-b\">\n            <button id=\"qr-submit\" type=\"submit\" data-theme=\"b\">Search studies</button>\n          </div>\n        </fieldset>\n      </form>\n    </div>\n  </div>\n\n\n  <div data-role=\"page\" id=\"query-retrieve-2\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (2/4)</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n    </div>\n    <div data-role=\"content\">\n      <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\" data-split-icon=\"arrow-d\" data-split-theme=\"b\">\n      </ul>\n    </div>\n  </div>\n\n\n  <div data-role=\"page\" id=\"query-retrieve-3\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (3/4)</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n    </div>\n    <div data-role=\"content\">\n      <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n      </ul>\n    </div>\n  </div>\n\n\n  <div data-role=\"page\" id=\"query-retrieve-4\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (4/4)</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n    </div>\n\n    <div data-role=\"content\">\n      <form data-ajax=\"false\" id=\"retrieve-form\">\n        <div data-role=\"fieldcontain\">\n          <label for=\"retrieve-target\">Target AET:</label>\n          <input type=\"text\" name=\"retrieve-target\" id=\"retrieve-target\"></input>\n        </div>\n\n        <fieldset class=\"ui-grid-b\">\n          <div class=\"ui-block-a\"></div>\n          <div class=\"ui-block-b\">\n            <button id=\"retrieve-submit\" type=\"submit\" data-theme=\"b\">Retrieve</button>\n          </div>\n          <div class=\"ui-block-c\"></div>\n        </fieldset>\n      </form>\n    </div>\n  </div>\n\n\n  <div data-role=\"page\" id=\"jobs\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Jobs</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <ul id=\"all-jobs\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n      </ul>\n    </div>\n  </div>\n\n  <div data-role=\"page\" id=\"job\">\n    <div data-role=\"header\">\n      <h1><span class=\"orthanc-name\"></span>Job</h1>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n        <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n        <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n      </div>\n      <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n        <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n      </div>\n    </div>\n    <div data-role=\"content\">\n      <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\" id=\"job-info\">\n      </ul>\n\n      <fieldset class=\"ui-grid-b\">\n        <div class=\"ui-block-a\"></div>\n        <div class=\"ui-block-b\">\n          <button id=\"job-cancel\" data-theme=\"b\">Cancel job</button>\n          <button id=\"job-resubmit\" data-theme=\"b\">Resubmit job</button>\n          <button id=\"job-pause\" data-theme=\"b\">Pause job</button>\n          <button id=\"job-resume\" data-theme=\"b\">Resume job</button>\n        </div>\n        <div class=\"ui-block-c\"></div>\n      </fieldset>\n    </div>\n  </div>\n\n  <div id=\"peer-store\" style=\"display:none;\" class=\"ui-body-c\">\n    <p align=\"center\"><b>Sending to Orthanc peer...</b></p>\n    <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n  </div>\n\n  <div id=\"dicom-store\" style=\"display:none;\" class=\"ui-body-c\">\n    <p align=\"center\"><b>Sending to DICOM modality...</b></p>\n    <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n  </div>\n\n  <div id=\"info-retrieve\" style=\"display:none;\" class=\"ui-body-c\">\n    <p align=\"center\"><b>Retrieving images from DICOM modality...</b></p>\n    <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n  </div>\n\n  <div id=\"dialog\" style=\"display:none\">\n  </div>\n\n  <div id=\"template-insecure\" style=\"display:none\">\n    <div class=\"warning-insecure ui-body ui-body-e\">\n      <h1>Insecure setup</h1>\n      <p>\n        Your Orthanc server is accepting remote connections, but is\n\tusing the default username and password, or has user\n\tauthentication explicitly turned off. Please carefully read\n\tyour logs and review your configuration, especially\n\toptions <tt>RemoteAccessAllowed</tt>, <tt>AuthenticationEnabled</tt>,\n\tand <tt>RegisteredUsers</tt>.\n      </p>\n    </div>\n  </div>\n</body>\n\n</html>\n",
          "body_murmur": 743255895,
          "body_sha256": "8798654aa75ab5916502f6471f14f168704c25ae3fc2b2b6627c9a458648228c",
          "component": [
            "Apache HTTP Server:2.4.41",
            "Ubuntu"
          ],
          "content_length": -1,
          "headers": {
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sun, 14 Dec 2025 16:49:16 GMT"
            ],
            "server": [
              "Apache/2.4.41 (Ubuntu)"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "headers": {
                "content_length": [
                  "0"
                ],
                "date": [
                  "Sun, 14 Dec 2025 16:49:16 GMT"
                ],
                "location": [
                  "app/explorer.html"
                ],
                "server": [
                  "Apache/2.4.41 (Ubuntu)"
                ]
              },
              "location": "app/explorer.html",
              "protocol": "HTTP/1.1",
              "status_code": 301,
              "status_line": "301 Moved Permanently"
            }
          ],
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "referer": [
                "https://191.252.179.212"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "191.252.179.212",
              "path": "/app/explorer.html",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "Orthanc Explorer"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://r3.i.lencr.org/"
                ],
                "ocsp_urls": [
                  "http://r3.o.lencr.org"
                ]
              },
              "authority_key_id": "142eb317b75856cbae500940e61faf9d8b14c2c6",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "cps": [
                    "http://cps.letsencrypt.org"
                  ],
                  "id": "1.3.6.1.4.1.44947.1.1.1"
                }
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : B7:3E:FB:24:DF:9C:4D:BA:75:F2:39:C5:BA:58:F4:6C:\n                5D:FC:42:CF:7A:9F:35:C4:9E:1D:09:81:25:ED:B4:99\n    Timestamp : May 11 19:28:40.924 2023 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:40:51:33:1A:40:54:8E:61:5A:0F:F7:6E:\n                80:2E:B0:B7:AF:33:29:7D:8D:3A:94:6E:36:E1:6F:6A:\n                F5:29:54:AA:02:20:36:D3:72:06:B0:E6:55:49:87:D8:\n                D1:7A:9B:E2:BF:17:59:34:EE:0C:AF:14:09:86:41:E6:\n                33:B4:9E:9E:38:0F\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:\n                03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E\n    Timestamp : May 11 19:28:40.915 2023 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:D6:BE:C5:A1:A9:A1:95:E6:84:BD:2F:\n                E5:12:55:B9:1A:9B:98:A0:87:8B:26:56:55:62:BD:2B:\n                80:9D:B7:FF:46:02:21:00:A0:76:B6:41:6B:12:F2:9F:\n                FD:90:29:11:93:1F:B0:83:05:1F:ED:A1:1F:0C:4A:55:\n                15:E6:62:CA:E0:D7:42:C0",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "inrad.raioss.com"
                ]
              },
              "subject_key_id": "e1d09d07506bc9710b227901009aa4c8f904f1e4"
            },
            "fingerprint_md5": "C2434AE51986D20961A705B9517E152C",
            "fingerprint_sha1": "FF91D6C5238A21AF3DE91AE018602A376E36A33B",
            "fingerprint_sha256": "7B25691CB777DDDD6803C993696F8EEF6D1A2C7F30D6B3EAB3923AB0501B7D56",
            "issuer": {
              "common_name": [
                "R3"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "Let's Encrypt"
              ]
            },
            "issuer_dn": "/C=US/O=Let's Encrypt/CN=R3",
            "jarm": "3fd3fd15d3fd3fd00042d42d00000061256d32ed7779c14686ad100544dc8d",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "396481405896453847330939327119967290150877",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "MzlmMTgyZDlkZTYwMDUzM2RmM2Q4Njc3YWY4MDFlOGFjNjRlODk5MTMwMGIwYTVlMDA2MWE0MWY3YjU0YWRiOWYzYWIxNTkyOGY2ZGY2NmViYzI2MmUxYmM5NDJhZjM2NzkxMjI5Y2IxZDA2NTg5MjliNmI0Y2FhNzM4MzNjZmVjNjhkYmUwZDNjYzllMjViMDVhMjI5ZmNmZDQ5ODA2NDI0ZGU3MGY2ZDdjNDIwYjRjNDFjNmJiZWU2NmIyYmMxODU5YjJlMWM2ZjI3YzY0MzBhNWQ1MzllMmI5NmFkYWIzM2Y4YjY5NjBmZmUyZjg3ZTAxNWQyYTAwY2NiYTYxZWE1N2ZjMjU5MTk1ZDFiMTg2N2RlMDIxZGQzMDczYWIyZWU3Y2I3NWZlZmYwNTRiZDllN2VmMWVmMzEyZTM3NzRiMzE5MGJmZmE0OTU4ODFkMzY1MGFmMDVlN2YyOWIyYTIzYjFjYzAxZjkzZTZmNjQ0YmVlYjY5YTBkZDYzYzVmOWZmZGQ5MmNkMzFjMjg1NWExZGVlMTI3N2I1YWQyODU0ZmY1MTJjMTdiMDU5ZWFiYzdiZTdhNGZjM2FlMDI0OGM5OWRiZTkzMDczMGRkZDVhY2VmNGVkNzQyNjk5Nzc3MTQxZDgwZTUwNjZkNjUxZDBmOWUyNmNkNDYxNjZhZjM="
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "b73efb24df9c4dba75f239c5ba58f46c5dfc42cf7a9f35c49e1d098125edb499",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304402204051331a40548e615a0ff76e802eb0b7af33297d8d3a946e36e16f6af52954aa022036d37206b0e6554987d8d17a9be2bf175934ee0caf14098641e633b49e9e380f"
                },
                "timestamp": "2023-05-11T19:28:40.924000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "e83ed0da3ef5063532e75728bc896bc903d3cbd1116beceb69e1777d6d06bd6e",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100d6bec5a1a9a195e684bd2fe51255b91a9b98a0878b26565562bd2b809db7ff46022100a076b6416b12f29ffd902911931fb083051feda11f0c4a5515e662cae0d742c0"
                },
                "timestamp": "2023-05-11T19:28:40.915000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "inrad.raioss.com"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "inrad.raioss.com"
              ],
              "extended_dns_names": [
                {
                  "domain": "raioss",
                  "fld": "raioss.com",
                  "subdomain": "inrad",
                  "tld": "com"
                }
              ]
            },
            "subject_dn": "/CN=inrad.raioss.com",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "20ee0c24d5be6b90459aee7bbcc6dd4adfa710689ebd86ffa194487e3dd69723",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "5f6fecc9d0cd90e4ab9bcad2d02357a73edaa19335e8b18471eecf7b53997c74",
            "tbs_noct_fingerprint": "22e142d59bc3809299ec20806d560f9fffeb8d078c41a59a38492b01077ef18e",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7775999,
              "not_after": "2023-08-09T18:28:39",
              "not_before": "2023-05-11T18:28:40"
            },
            "version": 2
          },
          "fingerprint_sha256": "7B25691CB777DDDD6803C993696F8EEF6D1A2C7F30D6B3EAB3923AB0501B7D56",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2006-20001",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2019-17567",
          "score": 5.3,
          "severity": "medium"
        },
        {
          "id": "CVE-2020-11984",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "https://191.252.179.212/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-15T13:50:50.667Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "8.0.42-0ubuntu0.20.04.1",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:8.0.42-0ubuntu0.20.04.1",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "8\\.0\\.42\\-0ubuntu0\\.20\\.04\\.1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_SSL": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "8.0.42-0ubuntu0.20.04.1"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              }
            },
            "fingerprint_md5": "C70204D5F70E19256F5321FBD16CC856",
            "fingerprint_sha1": "FD925E63A4E0F12ABED8252F3A1FB07C2AF1CAB2",
            "fingerprint_sha256": "26944A7A2019F06881874B0C02CBF52A355697F10F8F26EFD17EA0A0E65F9767",
            "issuer": {
              "common_name": [
                "MySQL_Server_8.0.28_Auto_Generated_CA_Certificate"
              ]
            },
            "issuer_dn": "/CN=MySQL_Server_8.0.28_Auto_Generated_CA_Certificate",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "MySQL_Server_8.0.28_Auto_Generated_Server_Certificate"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "MySQL_Server_8.0.28_Auto_Generated_Server_Certificate"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=MySQL_Server_8.0.28_Auto_Generated_Server_Certificate",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "504a306d32d91926d87258782d5f93148aebac4b405677123a1f56cde0046567",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "3d5b6a72791e56245add4e628e49d9878ca26bba033776f6801c7fbae52ec8d6",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2032-02-13T23:21:37",
              "not_before": "2022-02-15T23:21:37"
            },
            "version": 2
          },
          "fingerprint_sha256": "26944A7A2019F06881874B0C02CBF52A355697F10F8F26EFD17EA0A0E65F9767",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-15T09:16:51.675Z"
    }
  ],
  "services_hash": "8ea7c159917af90100027b90f654fc4aab26dc87358402b784136e5ce4faa7e8",
  "last_updated_at": "2025-12-15T13:50:50.667Z",
  "banner": [
    "mysql",
    "tls",
    "http"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2006-20001": {
      "id": "CVE-2006-20001",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://security.netapp.com/advisory/ntap-20230316-0005/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2019-17567": {
      "id": "CVE-2019-17567",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/2",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/2",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2020-11984": {
      "id": "CVE-2020-11984",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html",
        "http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html",
        "http://www.openwall.com/lists/oss-security/2020/08/08/1",
        "http://www.openwall.com/lists/oss-security/2020/08/08/10",
        "http://www.openwall.com/lists/oss-security/2020/08/08/8",
        "http://www.openwall.com/lists/oss-security/2020/08/08/9",
        "http://www.openwall.com/lists/oss-security/2020/08/10/5",
        "http://www.openwall.com/lists/oss-security/2020/08/17/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.gentoo.org/glsa/202008-04",
        "https://security.netapp.com/advisory/ntap-20200814-0005/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2020-11993": {
      "id": "CVE-2020-11993",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html",
        "http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/",
        "https://security.gentoo.org/glsa/202008-04",
        "https://security.netapp.com/advisory/ntap-20200814-0005/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above \"info\" will mitigate this vulnerability for unpatched servers.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2020-13938": {
      "id": "CVE-2020-13938",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/3",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/3",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20210702-0001/"
      ],
      "score": 5.5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-862"
    },
    "CVE-2020-13950": {
      "id": "CVE-2020-13950",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/4",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rbe197409ae4a58b629fb792d1aed541ccbbf865121a80e1c5938d223%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2020-1927": {
      "id": "CVE-2020-1927",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "http://www.openwall.com/lists/oss-security/2020/04/03/1",
        "http://www.openwall.com/lists/oss-security/2020/04/04/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "http://www.openwall.com/lists/oss-security/2020/04/03/1",
        "http://www.openwall.com/lists/oss-security/2020/04/04/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 6.1,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-601"
    },
    "CVE-2020-1934": {
      "id": "CVE-2020-1934",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-908"
    },
    "CVE-2020-35452": {
      "id": "CVE-2020-35452",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/5",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/5",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.3,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
      "weakness": "CWE-787"
    },
    "CVE-2020-9490": {
      "id": "CVE-2020-9490",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html",
        "http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r0b6541c5fb2f8fb383861333400add7def625bc993300300de0b4f8d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9e485ce5a01c9dc3d4d785a7d28aa7400ead1e81884034ff1f03cfee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra4da876037477c06f2677d7a1e10b5a8613000fca99c813958070fe9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfed9fea918e090383da33e393eb6c2755fccf05032bd7d6eb4737c9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/",
        "https://security.gentoo.org/glsa/202008-04",
        "https://security.netapp.com/advisory/ntap-20200814-0005/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2021-26690": {
      "id": "CVE-2021-26690",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/6",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/6",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-26691": {
      "id": "CVE-2021-26691",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/7",
        "https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/7",
        "https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-122"
    },
    "CVE-2021-30641": {
      "id": "CVE-2021-30641",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/8",
        "https://lists.apache.org/thread.html/r2b4773944d83d2799de9fbaeee7fe0f3fd72669467787e02f434cb10%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2021-33193": {
      "id": "CVE-2021-33193",
      "references": [
        "https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch",
        "https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2023/03/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/",
        "https://portswigger.net/research/http2",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20210917-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2021-34798": {
      "id": "CVE-2021-34798",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-36160": {
      "id": "CVE-2021-36160",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2021-39275": {
      "id": "CVE-2021-39275",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2021-40438": {
      "id": "CVE-2021-40438",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17",
        "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438"
      ],
      "score": 9,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-918"
    },
    "CVE-2021-44224": {
      "id": "CVE-2021-44224",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/3",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/3",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03"
      ],
      "score": 8.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-44790": {
      "id": "CVE-2021-44790",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/4",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/4",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2022-22719": {
      "id": "CVE-2022-22719",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-665"
    },
    "CVE-2022-22720": {
      "id": "CVE-2022-22720",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2022-22721": {
      "id": "CVE-2022-22721",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.1,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-23943": {
      "id": "CVE-2022-23943",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/03/14/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.tenable.com/security/tns-2022-08",
        "https://www.tenable.com/security/tns-2022-09",
        "http://www.openwall.com/lists/oss-security/2022/03/14/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.tenable.com/security/tns-2022-08",
        "https://www.tenable.com/security/tns-2022-09"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-26377": {
      "id": "CVE-2022-26377",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2022-28330": {
      "id": "CVE-2022-28330",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2022-28614": {
      "id": "CVE-2022-28614",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-190"
    },
    "CVE-2022-28615": {
      "id": "CVE-2022-28615",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 9.1,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-29404": {
      "id": "CVE-2022-29404",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/5",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/5",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2022-30556": {
      "id": "CVE-2022-30556",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2022-31813": {
      "id": "CVE-2022-31813",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/8",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/8",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-348"
    },
    "CVE-2022-36760": {
      "id": "CVE-2022-36760",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.  This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2022-37436": {
      "id": "CVE-2022-37436",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 5.3,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-113"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-27522": {
      "id": "CVE-2023-27522",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2023-31122": {
      "id": "CVE-2023-31122",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2023-45802": {
      "id": "CVE-2023-45802",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 5.9,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2024-27316": {
      "id": "CVE-2024-27316",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Jul/18",
        "http://www.openwall.com/lists/oss-security/2024/04/04/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://support.apple.com/kb/HT214119",
        "https://www.openwall.com/lists/oss-security/2024/04/03/16"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2024-38474": {
      "id": "CVE-2024-38474",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-116"
    },
    "CVE-2024-38476": {
      "id": "CVE-2024-38476",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-829"
    },
    "CVE-2024-38477": {
      "id": "CVE-2024-38477",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/10",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2024-40898": {
      "id": "CVE-2024-40898",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2024/07/17/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240808-0006/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-918"
    }
  }
}