Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

217.6.8.90

SummaryCVE DetailsRaw Data
01 Jan 2026, 02:21:35 UTC
{
  "scan_id": 1766953139,
  "ip": "217.6.8.90",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "217.6.8.0/24",
    "postal_code": "24409",
    "coordinates": {
      "latitude": "54.701",
      "longitude": "9.8885"
    },
    "geo_point": "54.701, 9.8885",
    "locale_code": "en",
    "continent": "Europe",
    "country_code": "DE",
    "country_name": "Germany",
    "city": "Stoltebüll"
  },
  "location_updated_at": "2025-12-30T00:54:00Z",
  "asn": {
    "number": "AS3320",
    "organization": "Deutsche Telekom AG",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "217.6.8.88/29",
    "organization": "Richard Neumayer",
    "descr": "Richard Neumayer",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:31:32Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-12-30T00:54:00Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-12-30T03:25:21Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-12-30T00:54:00Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.59",
      "product": "Apache httpd",
      "extra_info": "(Debian) OpenSSL/1.1.1n",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.59",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.59",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Error 503 Service Unavailable</title>\n</head>\n<body>\n<h1>503 Service Unavailable</h1>\nOur apologies for the temporary inconvenience. The requested URL generated 503 \"Service Unavailable\" error due to overloading or maintenance of the server.\n</body>\n",
          "body_murmur": -49872454,
          "body_sha256": "fa9e21757961235957eae817aed3769e9d26dbf300d42cf79c15e0404c03ead7",
          "component": [
            "OpenSSL:1.1.1n",
            "Apache HTTP Server:2.4.59",
            "Debian"
          ],
          "content_length": 287,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "287"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Wed, 31 Dec 2025 14:59:40 GMT"
            ],
            "etag": [
              "\"11f-62758cef482c0\""
            ],
            "last_modified": [
              "Wed, 20 Nov 2024 14:17:23 GMT"
            ],
            "retry_after": [
              "18000"
            ],
            "server": [
              "Apache/2.4.59 (Debian) OpenSSL/1.1.1n"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "217.6.8.90",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 503,
          "title": "Error 503 Service Unavailable"
        }
      },
      "cve": [
        {
          "id": "CVE-2024-38474",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2024-38476",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2024-38477",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "url": "http://217.6.8.90/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-31T14:59:41.254Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.59",
      "product": "Apache httpd",
      "extra_info": "(Debian) OpenSSL/1.1.1n",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.59",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.59",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Error 503 Service Unavailable</title>\n</head>\n<body>\n<h1>503 Service Unavailable</h1>\nOur apologies for the temporary inconvenience. The requested URL generated 503 \"Service Unavailable\" error due to overloading or maintenance of the server.\n</body>\n",
          "body_murmur": -49872454,
          "body_sha256": "fa9e21757961235957eae817aed3769e9d26dbf300d42cf79c15e0404c03ead7",
          "component": [
            "Apache HTTP Server:2.4.59",
            "Debian",
            "OpenSSL:1.1.1n"
          ],
          "content_length": 287,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "287"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Wed, 31 Dec 2025 05:10:20 GMT"
            ],
            "etag": [
              "\"11f-62758cef482c0\""
            ],
            "last_modified": [
              "Wed, 20 Nov 2024 14:17:23 GMT"
            ],
            "retry_after": [
              "18000"
            ],
            "server": [
              "Apache/2.4.59 (Debian) OpenSSL/1.1.1n"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "217.6.8.90",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 503,
          "title": "Error 503 Service Unavailable"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://certumdvtlsg2r39ca.repository.certum.pl/certumdvtlsg2r39ca.cer"
                ],
                "ocsp_urls": [
                  "http://certumdvtlsg2r39ca.ocsp"
                ]
              },
              "authority_key_id": "33a877b701386f5f1f2424a21e6c14e36e2203df",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "id": "1.2.616.1.113527.2.101.1"
                }
              ],
              "crl_distribution_points": [
                "http://certumdvtlsg2r39ca.crl.certum.pl/certumdvtlsg2r39ca.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : D7:6D:7D:10:D1:A7:F5:77:C2:C7:E9:5F:D7:00:BF:F9:\n                82:C9:33:5A:65:E1:D0:B3:01:73:17:C0:C8:C5:69:77\n    Timestamp : Oct 28 13:12:59.200 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:44:02:20:2D:B1:7F:41:B1:45:12:BF:C3:1B:EE:6F:\n                4E:EF:D8:08:1D:61:2B:71:9E:80:53:EA:01:D2:11:61:\n                51:90:B4:E8:02:20:47:4D:B3:BE:23:C3:B4:5C:2F:43:\n                FE:31:B6:6C:D1:F0:D4:5B:DB:BE:AB:4C:9A:D4:37:86:\n                2E:11:85:F6:0C:1F\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : C2:31:7E:57:45:19:A3:45:EE:7F:38:DE:B2:90:41:EB:\n                C7:C2:21:5A:22:BF:7F:D5:B5:AD:76:9A:D9:0E:52:CD\n    Timestamp : Oct 28 13:12:59.231 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:A5:85:B5:39:9C:D6:C3:44:50:51:4C:\n                8C:20:24:A5:85:63:04:C9:97:BC:61:BD:6F:75:B6:E9:\n                CF:6E:A9:6D:FE:02:21:00:88:55:85:ED:1A:AF:AE:FD:\n                B1:2F:4D:62:88:86:D5:6A:20:CF:22:3B:51:C4:AA:29:\n                0D:5E:60:37:7E:D2:38:A6\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : AC:AB:30:70:6C:EB:EC:84:31:F4:13:D2:F4:91:5F:11:\n                1E:42:24:43:B1:F2:A6:8C:4F:3C:2B:3B:A7:1E:02:C3\n    Timestamp : Oct 28 13:12:59.191 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:46:AD:06:E5:12:4B:9D:7F:BE:F0:AE:DD:\n                E1:4D:46:82:6F:2A:0D:92:A2:23:61:B4:B6:A3:FD:82:\n                70:A5:0A:08:02:21:00:DF:D3:DA:41:4C:72:82:1C:AB:\n                35:07:60:A9:AB:05:E1:FC:5E:4D:51:BB:CD:79:F4:6C:\n                74:32:B2:48:55:21:5D",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.r-neumayer.net",
                  "r-neumayer.net"
                ]
              }
            },
            "fingerprint_md5": "B90990D77E54F74932DC2D3C540A6934",
            "fingerprint_sha1": "7489E5E76B8354647F9174A1DACE933C8B5D2434",
            "fingerprint_sha256": "FDD04772E07035898A2D14EC6B5662F89BF7F5EB787ED70B820EF163DF7D1257",
            "issuer": {
              "common_name": [
                "Certum DV TLS G2 R39 CA"
              ],
              "country": [
                "PL"
              ],
              "organization": [
                "Asseco Data Systems S.A."
              ]
            },
            "issuer_dn": "/C=PL/O=Asseco Data Systems S.A./CN=Certum DV TLS G2 R39 CA",
            "jarm": "3fd3fd0003fd3fd00042d42d000000b5ce48eb9aaa95d750e8df42b900e12b",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2026-01-07T08:21:20",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2026-01-07T08:26:22",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "67261919979533348760183289152502311619",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "d76d7d10d1a7f577c2c7e95fd700bff982c9335a65e1d0b3017317c0c8c56977",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304402202db17f41b14512bfc31bee6f4eefd8081d612b719e8053ea01d211615190b4e80220474db3be23c3b45c2f43fe31b66cd1f0d45bdbbeab4c9ad437862e1185f60c1f"
                },
                "timestamp": "2025-10-28T13:12:59.200000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "c2317e574519a345ee7f38deb29041ebc7c2215a22bf7fd5b5ad769ad90e52cd",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100a585b5399cd6c34450514c8c2024a5856304c997bc61bd6f75b6e9cf6ea96dfe022100885585ed1aafaefdb12f4d628886d56a20cf223b51c4aa290d5e60377ed238a6"
                },
                "timestamp": "2025-10-28T13:12:59.231000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "acab30706cebec8431f413d2f4915f111e422443b1f2a68c4f3c2b3ba71e02c3",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022046ad06e5124b9d7fbef0aedde14d46826f2a0d92a22361b4b6a3fd8270a50a08022100dfd3da414c72821cab350760a9ab05e1fc5e4d51bbcd79f46c7432b24855215d"
                },
                "timestamp": "2025-10-28T13:12:59.191000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.r-neumayer.net"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.r-neumayer.net",
                "r-neumayer.net"
              ],
              "extended_dns_names": [
                {
                  "domain": "r-neumayer",
                  "fld": "r-neumayer.net",
                  "subdomain": "*",
                  "tld": "net"
                },
                {
                  "domain": "r-neumayer",
                  "fld": "r-neumayer.net",
                  "tld": "net"
                }
              ]
            },
            "subject_dn": "/CN=*.r-neumayer.net",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "792c144c51091507678011a7d08a9b3f0d18d98ac9917805bc0e346bea48e7ad",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "f9a8b9f90e39f4521e1d4bf25f80401b8a42c96b9d86d5118d29bc3510ecf861",
            "tbs_noct_fingerprint": "9b16aff0ef35c696e9d66d7036b9c615366ad50e5cfe7298c4db2fe33ea250ff",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-10-28T13:12:57",
              "not_before": "2025-10-28T13:12:58"
            },
            "version": 2
          },
          "fingerprint_sha256": "FDD04772E07035898A2D14EC6B5662F89BF7F5EB787ED70B820EF163DF7D1257",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2024-38474",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2024-38476",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2024-38477",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "url": "https://217.6.8.90/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-31T08:26:24.459Z"
    },
    {
      "port": 6443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache httpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n    \n    \n\n    <meta charset=\"utf-8\"/>\n    <meta http-equiv=\"X-UA-Compatible\" content=\"IE=Edge\"/>\n    <meta HTTP-EQUIV='Pragma' CONTENT='no-cache'>\n    <meta HTTP-EQUIV='Cache-Control' CONTENT='no-cache'>\n    <title>Logon - SINEMA Remote Connect</title>\n\n    <link rel=\"stylesheet\" href=\"/static/css/normalize.css? 1767214262\"/>\n    <link rel=\"stylesheet\" href=\"/static/css/layout.css? 1767214262\"/>\n    <link rel=\"stylesheet\" href=\"/static/css/login.css? 1767214262\"/>\n    <link rel=\"stylesheet\" href=\"/static/css/font-awesome.css? 1767214262\"/>\n    <link rel=\"stylesheet\" href=\"/static/css/siemens-sans.css\"/>\n\n    <script type=\"text/javascript\" src=\"/static/js/jquery.min.js\"></script>\n    <script type=\"text/javascript\" src=\"/static/js/sinemarc.js\"></script>\n\n    \n    \n\n</head>\n<body>\n\n\n\n<div class=\"header-wrapper\">\n    <div class=\"top-header\">\n        <img src=\"/static/img/logo.gif\" alt=\"SIEMENS\" class=\"logo\"/>\n        <div class=\"product-name\">SINEMA Remote Connect</div>\n    </div>\n    <div class=\"sub-header\">\n        <div class=\"clock\">1767214262#en#0#</div>\n        <div class=\"subheader-right\">\n            \n            <div class=\"language-selector\">\n                <div class=\"active-language\">\n                    English\n                    <span class=\"fa fa-chevron-down\"></span>\n                </div>\n                <div class=\"language-select-menu menu\">\n                    <form action=\"/i18n/setlang/\" method=\"post\">\n                        <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"fDAsoy4btWHvRuhoolArX3BHGHdW2Q3vBr109TbNj0lMT9Pdq8in45b8coJcEm8X\">\n                        \n                        <button type=\"submit\" name=\"language\" value=\"de\"\n                                class=\"\">\n                            German\n                            \n                        </button>\n                        \n                        <button type=\"submit\" name=\"language\" value=\"en\"\n                                class=\"selected\">\n                            English\n                            <span class=\"correct-icon\"></span>\n                        </button>\n                        \n                    </form>\n                </div>\n            </div>\n            \n            <div class=\"header-divider\"></div>\n            <div class=\"online-help\">\n                <a href=\"#\" onClick=\"openHelpWindow('/static/help/en/login_help.htm');\">\n                    <i class=\"online-help-icon\"></i>\n                </a>\n            </div>\n        </div>\n\n    </div>\n</div>\n\n\n<div class=\"content\">\n    <div class=\"login-wrapper\">\n\n        <div class=\"login-form-wrapper\">\n\n            <div id=\"banner_text\">\n                \n                    Test\n                \n\n            </div>\n\n            <div class=\"login-tabs\">\n                <ul>\n                    <li>\n                        <a id=\"localTab\" onclick=\"openLoginForm(event)\">Local</a>\n                    </li>\n                    \n                        <li>\n                            <a class=\"tablinks\" disabled>UMC</a>\n                        </li>\n                    \n                </ul>\n\n            </div>\n\n            \n\n            \n\n            \n\n            <div id=\"local\" class=\"tabcontent\" style=\"display: block;\">\n                <form action=\"/wbm/login/\" method=\"POST\" class=\"login-form\">\n                    <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"fDAsoy4btWHvRuhoolArX3BHGHdW2Q3vBr109TbNj0lMT9Pdq8in45b8coJcEm8X\">\n                    <input id=\"id_utcoffset\" name=\"utcoffset\" type=\"hidden\" value=\"0\"/>\n\n                    <div class=\"form-row\">\n                        <label for=\"id_username\">User name:</label>\n                        <input type=\"text\" name=\"username\" autofocus required id=\"id_username\">\n                    </div>\n                    <div class=\"form-row\">\n                        <label for=\"id_password\">Password:</label>\n                        <input id=\"id_password\" name=\"password\" type=\"password\" autocomplete=\"off\"/>\n                    </div>\n\n                    \n\n                    <div class=\"form-row\">\n                        <label>&nbsp;</label>\n                        <button id=\"id_submit\" type=\"submit\"><span class=\"button\">Log on</span></button>\n                    </div>\n\n                </form>\n            </div>\n            <div id=\"umc\" class=\"tabcontent\">\n                \n            </div>\n            <div>\n                <form method=\"POST\" action=\"/wbm/login/pki/\" class=\"pki\">\n                    <div class=\"pki-row\">\n                        \n                            <input type=\"image\" src=\"/static/img/chip-icon.png\" disabled=\"disabled\">\n                        \n                        <p> PKI Login </p>\n                    </div>\n                </form>\n            </div>\n        </div>\n    </div>\n</div>\n\n<script type=\"text/javascript\">\n    var value = new Date().getTimezoneOffset() * -1;\n    $(\"#id_utcoffset, #id_umc_utcoffset, #id_pki_utcoffset\").prop('value', value);\n\n    var usernameInput = $(\"#id_username\");\n    usernameInput.focus().val(usernameInput.val());\n</script>\n\n<script type=\"text/javascript\">\n    $(document).ready(function () {\n        \n            toggleLoginForm(\"localTab\");\n        \n    });\n\n    function toggleLoginForm(formName) {\n        if (formName === \"localTab\") {\n            $('#umcTab').removeClass(\"active\");\n            $('#localTab').addClass(\"active\");\n            $(\"#umc\").css(\"display\", \"none\");\n            $(\"#local\").css(\"display\", \"block\");\n        } else {\n            $('#localTab').removeClass(\"active\");\n            $('#umcTab').addClass(\"active\");\n            $(\"#local\").css(\"display\", \"none\");\n            $(\"#umc\").css(\"display\", \"block\");\n        }\n    }\n\n    function openLoginForm(e) {\n        toggleLoginForm(e.currentTarget.id);\n    }\n</script>\n</body>\n</html>\n",
          "body_murmur": -342182104,
          "body_sha256": "597597278b7d769d956e3a63cca9745de468087706a175679c2f18be47d7f12b",
          "component": [
            "Apache HTTP Server",
            "Django",
            "Python"
          ],
          "content_length": -1,
          "headers": {
            "cache_control": [
              "no-cache, no-store, must-revalidate, private"
            ],
            "content_language": [
              "en"
            ],
            "content_security_policy": [
              "frame-ancestors 'self';"
            ],
            "content_type": [
              "text/html; charset=utf-8"
            ],
            "date": [
              "Wed, 31 Dec 2025 20:51:02 GMT"
            ],
            "expires": [
              "Wed, 31 Dec 2025 20:51:02 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "Apache"
            ],
            "set_cookie": [
              "csrftoken=FwNkmU79pF524b7zJIhQhxGS6UrMJPAl1keS7feLfJJj6QFoLvZMozgjCBX2llFN; expires=Wed, 30 Dec 2026 20:51:02 GMT; HttpOnly; Max-Age=31449600; Path=/; SameSite=Lax; Secure",
              "sessionid=rozl0897alkjapkrmi033xsyr9n3psjs; HttpOnly; Path=/; SameSite=Lax; Secure"
            ],
            "strict_transport_security": [
              "max-age=15768000"
            ],
            "vary": [
              "Cookie,Accept-Language,Accept-Encoding"
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "sameorigin"
            ],
            "x_xss_protection": [
              "1; mode=block"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "headers": {
                "cache_control": [
                  "no-cache, no-store, must-revalidate, private"
                ],
                "content_language": [
                  "en"
                ],
                "content_length": [
                  "0"
                ],
                "content_security_policy": [
                  "frame-ancestors 'self';"
                ],
                "content_type": [
                  "text/html; charset=utf-8"
                ],
                "date": [
                  "Wed, 31 Dec 2025 20:51:02 GMT"
                ],
                "location": [
                  "/wbm/login/"
                ],
                "pragma": [
                  "no-cache"
                ],
                "server": [
                  "Apache"
                ],
                "strict_transport_security": [
                  "max-age=15768000"
                ],
                "vary": [
                  "Accept-Language,Cookie"
                ],
                "x_content_type_options": [
                  "nosniff"
                ],
                "x_frame_options": [
                  "sameorigin"
                ],
                "x_xss_protection": [
                  "1; mode=block"
                ]
              },
              "location": "/wbm/login/",
              "protocol": "HTTP/1.1",
              "status_code": 302,
              "status_line": "302 Found"
            }
          ],
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "referer": [
                "https://217.6.8.90:6443"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "217.6.8.90:6443",
              "path": "/wbm/login/",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "Logon - SINEMA Remote Connect",
          "transfer_encoding": [
            "chunked"
          ]
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "rndehaussinemarc01.r-neumayer.net"
                ],
                "ip_address": [
                  "217.6.8.90",
                  "10.237.104.1"
                ]
              }
            },
            "fingerprint_md5": "9BD9BE8B22AECC8B7410855F2664A430",
            "fingerprint_sha1": "C7C757E7B81B05325C7CB8BBC8D44C46594452CD",
            "fingerprint_sha256": "0E91B53C2EAD950DD6862431B4FF7D779FB6807BDC4E9CCE3CF1D2358EC67BD8",
            "issuer": {
              "common_name": [
                "CA 383022 SINEMA RC"
              ]
            },
            "issuer_dn": "/CN=CA 383022 SINEMA RC",
            "jarm": "25d25d16d25d25d00025d25d25d25d6ec53d77bd8a94aca32ce8d30b67ca95",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "131",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "MzE0MzI4NTk5NzIyZTZhNzg3ZTc5MjBkNDEzNjJlNjVjYmQ0NDVhOTMyMWVjMTdkMTE1ZjIzNjI5MGY3ZGVmZGE5MzE3ZDRjOWM0Y2YzMzQ4YmY0MzI0ZThiZTc5ZjllYjdlNjBmMWNkN2Y4NGY4NTlkODU0YjkwMDhiNWQzYjEyMGEwNWE5NzYxOGFhYWVlNzkwNmE0OWE2ODdmNjIyNDcxMGU3ZmRjZjkzNDkxMGUwYzJkNmQyNjMxMGRiYzJiN2E0ODdlMTg2ZDc2OGZiNjQ4ZDY2MjM3YTIwZDhhYzUyZDM3NGQ2OTUzOWFkZDM0NzFkMmQ3MmNmMmUyZmYyZWM3MGM0YjMxNzU3ZDc0NTMyZWY2YTA2Y2VhZDNlM2ViOGNhYjQ3NmUzYmM5MWRiMmI3NDk0ZWJkOGMwYjE4OTZiMDZkMGZiMDU3YTgzOGFlMjVkMWVjNzJmNDVjZTY5MWIwZjYwYzliZDViNWY0NDI1NzUzOWZmYTdiMDQxMDViMjc4YTBlMDU0ZWRiM2EyZDU2Zjg2ZWE2YTMyMWQ2NjE2MTZiMTQxNDVhN2JiNDQxY2EwMjc5Mzg4YjE5YmI1ODQwZmRmZTViMTk2ZmMwNjU3MzIwMzBkMDdjNTgyNDFmNWYyOTEyMmQ5NmJmNzk2ODY4ZmYzMWNmNDc5YTc5NjlmZTc0MTIyNmMxMzk2YTdhM2NjMWFkM2JlZTlkNGRmNGIyNDc0M2U4NmUwNGNiYzY2YmY0MWM3YTFmYjJhMzMzNzY4ZmRhOTJmMTAzNTVhNjU4ODJmMzMyNjJjZjM4NDBlMmVmNzY0OTUwYjRmNTM2NTY4NjhmMTMwZGIyYmQ1Y2Y1YWMxNWNmOWJiYzNhYzNmOGVkMzg3YzgwZWU1YTRjNTZjZmM2YjM1Mzc0YjlkODg2MWY5MTY4Mzc3ODYxNzcyNzVkOGE2ZDgzZTk0MWEwMDJjY2MwN2JkMjAyMmI1NjhmMjBiNDdiMzhlYjg4NWFiOTYxMGIzMTdkMjVjZDk2ZTk4MzdkNmQyM2E4MjA0ZTQ4MmY5YTdhZjM2NTZjZGQ2ZTI0OWM0YTFiODYxZjIyNmM3ZWMwOWZiY2ZjZDVjYTAzNzRiNTNlMjc2ZDljNjdiNmQ1ZDJmY2IwNjFmNTNiZGVmYzIxYTRiOWNiNzYxYzA5M2ViMzg2ZjNkMTM2ZDdmYzA5ZjU4NDc1OTQ1YTFjMzY1ZWIyNzY2ODFjZjhhMDJiZTBhZTVkNzVmYWRjMmQ2NWRhMTUwZGY2ZTkxY2JmZWZjM2ZmZjI1ZmFiMzA2NGFmZDkzZTBkZjQzYTZkMWY4MDc4NzBmOGJlYjM4ZTYwZjE5ZDVlOTE0NGE4MzUxYQ=="
            },
            "subject": {
              "common_name": [
                "rndehaussinemarc01.r-neumayer.net"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "rndehaussinemarc01.r-neumayer.net"
              ],
              "extended_dns_names": [
                {
                  "domain": "r-neumayer",
                  "fld": "r-neumayer.net",
                  "subdomain": "rndehaussinemarc01",
                  "tld": "net"
                }
              ]
            },
            "subject_dn": "/CN=rndehaussinemarc01.r-neumayer.net",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "38a903fe177785d91e5a0d15c4440207e82cef75c4b10cec091030efd40be8f4",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "dae14d890681ffe26b4015001a3954bdcc7df9327f8f49b33610ac4b3266b430",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31708800,
              "not_after": "2026-04-21T13:55:47",
              "not_before": "2025-04-19T13:55:47"
            },
            "version": 2
          },
          "fingerprint_sha256": "0E91B53C2EAD950DD6862431B4FF7D779FB6807BDC4E9CCE3CF1D2358EC67BD8",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0070",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1199",
          "score": 10,
          "severity": "high"
        },
        {
          "id": "CVE-2023-25690",
          "score": 9.8,
          "severity": "critical"
        }
      ],
      "url": "https://217.6.8.90:6443/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-01T02:21:35.528Z"
    }
  ],
  "services_hash": "7fba91190114f302a50803ac6ed7c535a9cbadca86ee4c63b459dbee3999a906",
  "last_updated_at": "2026-01-01T02:21:35.528Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0070": {
      "id": "CVE-1999-0070",
      "references": [
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
      ],
      "score": 5,
      "services": [
        "6443/http"
      ],
      "severity": "medium",
      "summary": "test-cgi program allows an attacker to list files on the server.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-1999-1199": {
      "id": "CVE-1999-1199",
      "references": [
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 10,
      "services": [
        "6443/http"
      ],
      "severity": "high",
      "summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "6443/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-27522": {
      "id": "CVE-2023-27522",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 7.5,
      "services": [
        "6443/http"
      ],
      "severity": "high",
      "summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2024-38474": {
      "id": "CVE-2024-38474",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-116"
    },
    "CVE-2024-38476": {
      "id": "CVE-2024-38476",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-829"
    },
    "CVE-2024-38477": {
      "id": "CVE-2024-38477",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/10",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2024-40898": {
      "id": "CVE-2024-40898",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2024/07/17/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240808-0006/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-918"
    }
  }
}