38.54.116.130
{
"scan_id": 1744881856,
"ip": "38.54.116.130",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "38.54.116.0/24",
"postal_code": "",
"coordinates": {
"latitude": "23.578",
"longitude": "58.4021"
},
"geo_point": "23.578, 58.4021",
"locale_code": "en",
"continent": "Asia",
"country_code": "OM",
"country_name": "Oman",
"city": "Muscat"
},
"location_updated_at": "2025-04-17T12:31:33Z",
"asn": {
"number": "AS138915",
"organization": "Kaopu Cloud HK Limited",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "38.0.0.0/8",
"organization": "PSINet, Inc.",
"descr": "PSINet, Inc.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-10T00:25:38Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-04-17T12:31:33Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-04-17T14:16:37Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-04-17T12:31:33Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "2.0",
"product": "PCMan's FTP Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:pcman%27s_ftp_server_project:pcman%27s_ftp_server:2.0",
"part": "a",
"vendor": "pcman\\'s_ftp_server_project",
"product": "pcman\\'s_ftp_server",
"version": "2\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 Xlight FTP Server 3.6.5 ready\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B368DC119F45C0FA11EFD7A2D2E7963D",
"fingerprint_sha1": "E8E49E808A212FA2B40F9916B26103B39938717C",
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"issuer_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5011963104671082264",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "12e48fdbc2dd7894e1be548cde1ca3ff192d56e85251fdf2ab356b99a3c809f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "3d808d8251dbd123797ce40670fee973e577603e21cad5d694912d400b4aeac8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-09T02:19:22",
"not_before": "2025-04-09T02:19:22"
},
"version": 2
},
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-10T22:54:17.701Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "",
"product": "NetScreen sshd",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:juniper:netscreen_screenos",
"part": "o",
"vendor": "juniper",
"product": "netscreen_screenos",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-HUAWEI-1.5",
"client_to_server_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"host_key_algorithms": [
"ssh-rsa"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group14-sha256",
"diffie-hellman-group14-sha1",
"[email protected]"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "c0808ba7d95bdf2f53d031473ba11b202268cec30b7bbda8e4c44d99b6a2fb86",
"raw": "AAAAB3NzaC1yc2EAAAADAQABAAABAQC9/bBURxBAK0O/DwCkMczrPp5iK+eiCmE17mnCzoRSw41Q169YZUQnaoTOtztncw0ZBVPz41lqnUhya4muqdeCPwCog7gW/L3gXu9hOwZucDFu1INkjwfwiqA94XUT0bZHQE5f1iRLWUan453EBKvx/zxeTbi8ZEWG76UjJ+wInip/vsblN9C8HtkkxqgWl/vC0ooGX2JidgQynwvm6rDFnjcMQ6unBMghxCDzPn2r1x9U/hh8TmBX8m2DrmeI45kcmGLPj4UcYX9Dlev+L7cpSxBEAhJfrg6eVARFhVwPNoZbwZMp8iYArfqiqLko8X7GNDcvpjxX3mdbTc2c3fWj"
},
"server_to_client_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"software": "HUAWEI-1.5",
"version": "2.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-17T09:28:59.825Z"
},
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Cowrie Honeypot telnetd",
"extra_info": "",
"tunnel": "",
"modules": {
"telnet": {
"banner": "GM login: "
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T21:38:19.298Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49be7fedf240e2601==\" />\n<title>NVR301-04S3-P4</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzJiNDliZTdmZWRmMjQwZTI2MDE9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 303081451,
"body_sha256": "04cb6a64625d8f19d0d12c67c3f7f94b43c2d11bb8a4998f86873eaf48939c6d",
"component": [
"Jetty:9.3.5",
"WordPress",
"MySQL",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"Java",
"PHP"
],
"content_length": 36042,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://38.54.116.130:80/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"36042"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 11:00:30 GMT"
],
"server": [
"Jetty(9.3.5.v20151012)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "NVR301-04S3-P4"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:80/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T14:59:10.622Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"pop3": {
"banner": "+OK Postfix smtpd ready. <1744681077247@3c86107551eb47824bd16c0171dd309d-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49be7f6c2390b==>\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "885A5990D0219407B0985E54F86A3AD2",
"fingerprint_sha1": "FFC8D7B73E2703122E73157BC60C777BF6917485",
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"issuer_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4943393435217780126",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "ODk3NTc4NmNhMDgxMWVmZGIxY2I3NmMwNTJlOTRkMTM1NDAzZTI2ODNhYjIzZTQ5NGViOTdlNjU0MjdhMzZmZGU4NmU5ZGRiMDU5NGE2M2U2MDYzMzk1NGZjNzRjMjQwMmRmMGZlZGNmMjNkM2VmMmZlNWM2MGQzZWRkZTQyNDEzZWQzZTMwZTczYjZkY2NiY2E2YTQ3YzQ2ZmEzNDdjNDU4ZmJlNzgyOWQzY2FjMDhjN2I4MGY5ZWE2YzQ5OTQxZjYwN2M1MzUwNmVjMmM2NWI5MzFlMzVhOWI2YjM1OTMzNDgyYjgyYTllZjhlMmEzN2U3MGIyYzczYzM1NzNiMGM0ZjJkMjE2OWIyOGMzZmM1N2YwMGZiNjg2ZThkZTY3ZWZlNTI5YzJlNGJjMGJlMzBmODE4NGZhZWFmNjg2MGZjNjJkMDUxZTYzZDcyMWQ3YjJlMjI1MzMyY2JmMGQzYTUyMTJlOGM4NDJlZDBiZDVkMmY1NGI3YjVjZDljOWNlZDU1MzA2ZjVlNzMxNzYwN2QyMGU3NzgxY2JiZjBiNjcyY2NjNmNlYmY5NmIxYmVlOTE2ZWY2MzM4MDA4NzExNTI4NzNjN2NkZWUzZmRhMjg0MWQzNDQ3ZDQ5NWZjMGNiMzJjMDlkOGFjMWUyMDRiY2E0OWUwNjQ2YjYxNTAxMDA2NWUzYTJmYzZlYjZiYjg3OWY0MzQzOWU3ZGRmYTFiNDMyMmUxZDI2NWJhYTRkNDhlYmI4MWEzM2Q0M2E4Y2ZkZGVlMzgwMjc3MjJkOTg4MjJhMmE3MmQxOTE5NmEzMDVlNWNkOGYyZDEzYjQyZThkYzVkNmFjNDM2M2FlY2EyMzA3ZmYzMmQ2M2QzNDlhYTE0OTliN2E5NjQ2MjQ1ZjlkMDIyY2E2ZTE4ZWQzY2YwMzBhODViNWM5Y2I4YjM0ZDEyYzYxYjU5MTEzNjcwMWFkMWNkZDQyNDQ0ZjVjZmQyYjU1OTViOWZkZTNlYWFmNzlhZjFiZTc3YjFjMDVhYjkyNTVlOGE2ZmY1M2E0ZGEzNzk0MDA0YTRiYjA4MTYxYzNkMWUyNzFiMzM3NjU0N2Q3MTk2NjMwZWM2Nzk0M2NjNzQ2MjRhMjQ4YTdkYzgwNWUyZmM0NjUzZTczMDJhMmQ0M2E4NWMxMDhiMzUxMDY1NmQyYjRlMjUwZWUwNTk2Y2U1MTQxYzJhZWZhYjc0MzNjMjAzZGRmODQzOThlZDNmNjFjNmYyYWY3NzY2YmJlMzAzNmY5ZTI3YWI1MDVkYzAyY2I5ZDhiMzIxZDI1YTcxOTZkYmNhMzkyZmZhZTIzYWQ5ZDZiZWMzY2Q1MDlhNmFkNDMwZDg1OGNmOTIzN2Y5Mg=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "39598d4bee41caf5392e27ea56777c5dc0d4211fef219b1260905d6c40fdd928",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhkZGI1MGIzZDA1ODM1MWUxMzEwMWQwOTYwM2IzNmZiYjkzMWJjMmZmYWRiMmM1MzZiM2M2YzQzOWZiODBhMmMwZGQxOWVlYmRiNDU2ZDllMjI0Nzk5ZWUwZTE0YmE2M2ZhYjRkYjU0OWIzY2I5Y2M3ZWY0MTRhNjEwMWZiMzAwOWUyMjllNWUwZDVmYzJhYmUyMjBhMzk0YzUxNjI5MGU0OTY3N2M1NDQ4NzgyYTVjZjVkYWYzMGFmMWI3MjkyZjRlYmFjMTVjMjRmNzU2MDEzNWYxMDNiZGU4MTU1Y2Y3M2JiMzVlNjY0MDIyOWM3YWI4NDY3ODQwOTFiNThhMDVmMzI4ZDRmYzI0YTM2YjQyOTE2NTNlNjk3ZTA2MWI3NTFmNzc4MGQxMzc0MGEwMjY5MTExMjMwMDBiN2M0ZGI3MTIxNTE4OTAwOWQwZTdiMWM5YTI1ODMxYzdkZWVhY2EzZDkxZDRmYmNiZThiNmZmMzI2NjRjMTViMThmYWVhYWEwMDNiNWQ1YTQzOWQzN2RmYjNlMzE1ZTZiYzZmOGMyNDRlZDJjOTU3ZTNhMmNhMDQ2NDE2ZDIyN2E2MTg2YmQyNjViMDA0NmVjODQ5NzA4MGMyNjZhY2U1OGZhOGE4NzQ4MWJhM2JiYzIxMGRhNzllYmVkNDRkZWRjNjIzNGUyNDliMDg3OWZlYTExNzI1ZTE4NjMxNGZlN2RjODI3YmVhNjlhNGQyOWQ1Y2M5ZTE3NWMzZTUxNmVhMDFlYzYwY2E3OTNmM2FmNDcxZTdjYTYwNmVkM2M0ODdjZjE2ZDU4MGI3ZDM5ZjkxNThjN2U0NjVkYWI2MTY1ZDhlY2E2MzI5ZWU3MjRmNDFiNTEyMTlkYzUxNWIxZmQ4YTU1N2Q2OGFhMjk2YzU5YWU3ODQxYmIzYjBhZTgxY2Y3ZDhlMzljNTViZjM2YWY2M2RjZWM4NGIxOTA5Y2VlNGRiMmU2NmMxOTZjYTUxM2EwNGFhNmM2NjU4MThiODhkZDE5OTdkZjU0ZTZmMzZiZTRiMTllZTIyZjM3MWFjNTU0ZTExZDcxNzNkOWJmMWI3OGEwNjgxNjRmMTdjYjE1ZDNkNmE0MjA4YjNhZDE3OGM3OTgyY2E1ODVjOTE2NzU5NjQ2MGNiMjA0ZjAyY2U4YTc1MmRmZGIwZTQyZTgyY2MwZTI2OTU1NDA0NDg3NmU4OWRmZTE2ZDQyNzQ5ZDAwMDc1YWI4OWU2YmY4OTdmYjRjOTY2ZTZlOTE5ZDM2MWE1MTllZmM2ZTJiNGU0YTdlYzU1N2IzODJhNGU5OWEyODFlNTk2ZmJjYzA0ZWI3NzlkNTMyMDRlNGJlZmNkNTZkOGE2ODU4ZTI5"
}
},
"tbs_fingerprint": "3cdea19c11fc66d95eb4bc2403a5aa7e4083cfaf3fc4c32aff702cf739029444",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-19T09:16:12",
"not_before": "2025-03-19T09:16:12"
},
"version": 2
},
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "http://38.54.116.130:110/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T01:58:51.721Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e7ca77c63bb881f8fcdd39112200e6==\" />\n<title>Password required</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3bbfc64c5441894bbf3ac3832c35ac8d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU3Y2E3N2M2M2JiODgxZjhmY2RkMzkxMTIyMDBlNj09 </h1>\n</div>\n<!--\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n <script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -2009948868,
"body_sha256": "48756cac661a184bfa83ad69e106581102425561331732df85bfc528d10d9e5f",
"component": [
"Ruby",
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails"
],
"content_length": 32419,
"favicon": {
"md5_hash": "b6f91b5f9cedd010741cf953500cf710",
"murmur_hash": -452848264,
"path": "http://38.54.116.130:143/favicon.ico",
"size": 4286
},
"headers": {
"content_length": [
"32419"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 30 Mar 2025 22:20:27 GMT"
],
"server": [
"TOS/1.12.1"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:143",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Password required"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "8B521CB967ACFD75DBFFDC3D8D8E4C35",
"fingerprint_sha1": "EE4860EEACEF40D120B22F54366C8DB0434B1D3A",
"fingerprint_sha256": "BEF395784341CEFB9806D4B7FF92ED0D5E43EA8E6722F0C05116B87AA2840BF8",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"BA"
],
"domain_component": [
"TJFAZSWX",
"local"
],
"organization": [
"ZIDXKWAX"
],
"organizational_unit": [
"GDUVWIN"
]
},
"issuer_dn": "/C=BA/O=ZIDXKWAX/CN=localhost/OU=GDUVWIN/DC=TJFAZSWX/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3152657121115409497",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "MGU4NTYyMzE5YjA3NTdiZmIxNmUxZjNkODczZmQyMDhhYmQxMDAyZDk3N2ZhZGU4Y2U5YmYzYjY5N2U5YTMyYmI0MTE4NmQ5NGVjNWFlOThjMDhiODVmNzk3ZTFiNzE1NTQ3N2VlMzJlMDE1MGI3MzIxNWQzN2EyY2Q4NDI3MDUwYTk5YzVlNDliN2VjNDE4YjhkZGRlYTBiY2E4OGY4MTBkMTEyOWM1YWZjMTc3MjY0ZjJmMDdmNjQ1OTYyZDExM2Y4YWJkNDMwYmMwNjcyZDkxMmI1NWE2OGI4YTMzMjMwNDM2ZTAyYzg4MjkyMzYzOGUxZDZlZmFmZDUxMWIzNTBlY2I4MTJkNTI4ZGE1M2NiMDU0ODM5YzQyZmZhNjczOTAzZDE4NGI2MjNhOGIyMTAxYWRmODc1NTYxYTdmOTNmMzg3MGU4ZmQ3OTc2MjJkZDEwMWNlMWQyNDIyYjYxMDdkYzM3ZWU5ZmJlZDg2NzY2ZDc3ZGNkNWFjMjViNTA2OWFlMThkYTZmZTU3NjQxYmIxMzY4Nzk1Zjg0ODllNWNmNjY1NGVkZmVhODU2ZTY5MDAyMDNiYTkyYWNkY2E4ZDhmY2U2NzcyMjlhZDhlZGZiNGRkNDYzZmMzMzdlNzllNWQxZGNkNWMyYTMxMGQ1NjVkMjcyN2UyMzAzMTM1YjNiMzU0NDc1MDdlOTI1ZTEyMjA3NGQwOGE5NWE4YmNiZDdiOWVhOGEzNDIwMTc3ZGViNTFkN2NjZDMxMDA4NGE4N2U2N2NkZTJiZGU2MDk1NTZmNGU5YWIwNThkZWQyMmRkZGUxMDk2M2QyODllM2U2OTA3MWM4MGM4MjE3MjIxYmJhNTMwYjIyODVkNTM5N2RiZDdlZmQ3ODBhYmRjOWFmOTRhZDNhNTM2OWE3MGYwNzJkNTMwN2UyMTQyMThiYzkwZmFmZDc3MGM1ZTBlNGZjYTM2M2ZiMjgyMGM5Zjg5ZDI0YmExZGYwNjY3Y2FiNTIwNzZhM2MxZTlhMDcwZmUxNTIxYjM1MTAzM2I5OTcyZDY3NzJkYWMyZGI0YmMyNjNkNGNjYjAzM2NmY2JmZTU3YjJlMzVmNDEzZDk2MDczZmNhNGRjOWYzY2E0MzhmMDBkOGY5ZmM0NzNmNzljMjc4OTVmMjZlNzBmOTYyMjY2NmYyYmY5YWRjNWVjZjJhNjkwZmQ3NTU1YmY2ZGU2NmMwMmNkODU2NjJlZDY4MzA3ODY4NGQ1MDJjZTA5OTM1MzlkMWFlNDdiZjQyZDc2NDgxODVjYTE3NDQ1OGQzMzIyOTgwMzJlZjYwMjU0ZGYxYmQ3MmZjMWI3NTZiMTNjNmM2MTc5MTEzNGVjZTcxNzVmNA=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"BA"
],
"domain_component": [
"TJFAZSWX",
"local"
],
"organization": [
"ZIDXKWAX"
],
"organizational_unit": [
"GDUVWIN"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=BA/O=ZIDXKWAX/CN=localhost/OU=GDUVWIN/DC=TJFAZSWX/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a46f75ae5a1cdc9ab503da4d9bf01fa5d66f6e750924dc3d3c71ff29128a9450",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhiNzBhZTE2ZjdlYzI4NzFhYTE0OGM5MjVlNzg5NWMzNDczZTI3OWIxZmRkZjhjMDJmZWMzNDFiYjhlYjdiMTNiZWMxZjEzMzliN2NmZjhjN2I3NmExYTdhOGY2YTdkNzQ5ZDhkZGM4MWVhNzMxZjJlMjE0NTFlYjdlOTE0NmIwNzNkYmU4MWQ1ZDFmZjVhMjgyNjFkZmYzMmZmYzI0MzUzNDI1NTRiMDUxYjA0YjdiNTg5Y2VlZjNkOWIxNjMzZDE4OTczYTZmZmY3M2RhNDVjNDNjODg1MTI1YjAxOGNjYjI1NGZhOWZhYmI3MmY3YTcwOGI3NTM1YzAyYTYxNmY5ZmExZjczM2I2ZTA1ZTMzYjU5MDdmYjhmNTg5NmE3Mjg1ZGRhYzk4NTg3M2ViYThkZTBkNDZkZjM2ZTA1ZWY5N2MzNmY4ZmNmOWQyMjRmYjFmZDg4OTlhNjAzMGZkNTRlNjI0ZTkzNGIyOTliYjhlODI0NWU1NDc3YWU0YWVkMGI3ZDQ3NzM3ZDFmYzEyZjE2YWI4NDBiZTE4OTM5YjFjZWNmYzE4MDMzNzRjNTkyZDVjMDljOTg3YjA0NDdkMWU3MTZiZWNiMDQ3MGYyMTEzZmZkYjJjMmQwZDU5MjViNjBhNDhkOGYwNWU1ZjFkZTM5NTYxZDllMDU5OThmMzVhMjc4Y2NiNjE2Y2Q1MTY3ZDY1YWM1YjQ4MDllMzAwYWIyNjJlMTIxZjRjMWVlNzQ1MjAwNDVjYzUzZGRmMTAzZTExZTFiZjJiZjEzZDU5MzY2MmIzYTg1OGU3OTE4NjVlZjQwYmU4YTQ4ZjUzY2IxODFlMGFhZmI2Mzk4NjgwMmQ3N2YwZTdiYmQ5NjA1NzhhODllNDE1MGUxZDNlOWVkMjdiNGI5MmNiYzE0OWM1YTBmMDBlMGExM2ExOGFlOTE2NzNlMWJiZjlkMzZjYTk2Y2I1NDY4YjAyZjkwY2M5MWE0MmY0MDM3MWIyNDY4YTcwZTYyMmM1MWExMWIxZjg5MDM0OTgwYjBjZjMyNTVmZGE3NzA0NTNlNTdmOWYxM2E0NmMyYTdkNzIwNTRlMjAwZGIxYzNmMDVjYmRiYmZlZjQyZmY5ZGRlYjg0YmNhOGQyMjgzMjAzZTRjNGU2MzUyZDU3YjY3NTRiMDZkYjM2YzIwZjFiMjAwMjljNmJlNTI2NmI2MDhjZWE1NjZhNWFkNzQzZjVhZDBmNTQ1NTNkMTE1ZGMxMmIyOTBmNzc4NDM3MDBkYjRhM2I1ZjFhN2YxMDcyNDljZTFmOTVmYjA3YzE0MTNkMTA3MmY4OTMzYjZkMjAxNDZlMzVjNTVjMWNiZjIxNjUwOTkzZDYyODI0MGZm"
}
},
"tbs_fingerprint": "3357c1c2a897025aca6b1fe0d12279f1239b1c7838b81fcf851e3a8907f89ef1",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-29T12:21:33",
"not_before": "2025-03-29T12:21:33"
},
"version": 2
},
"fingerprint_sha256": "BEF395784341CEFB9806D4B7FF92ED0D5E43EA8E6722F0C05116B87AA2840BF8",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:143/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-13T22:59:04.97Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "16.2.0",
"product": "TwistedWeb httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:twistedmatrix:twistedweb:16.2.0",
"part": "a",
"vendor": "twistedmatrix",
"product": "twistedweb",
"version": "16\\.2\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:vmware:ESXi:6.5.0",
"part": "o",
"vendor": "vmware",
"product": "esxi",
"version": "6\\.5\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49be7f6c2390b==\" />\n<title>NVR-B200-E8</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzJiNDliZTdmNmMyMzkwYj09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1510643419,
"body_sha256": "9076b18e546e5245ef4e066be03e37aba35ca8aa9087902bb6213ab3f1ad5d60",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 35855,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://38.54.116.130:443/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"35855"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 02:03:36 GMT"
],
"server": [
"Saia PCD3.M5340/1.16.69"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:443",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "NVR-B200-E8"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "MGRiMDY5NTQ5YjJiNTkyODAzODA0MGVkOTE1ZGIwZDljZjZmMjU3MzA3ZmE1YjgyYjY3M2RlNTNjYjAyNzM2YTIzYjU5ODg0YWU5YjVlZmI5NWVkOWI4OGE0NThkNjRjYjdjYzhkNDE1MGMyZTM4ZTdmN2FmNjM0ZDkwYjJkZDViZjU3MjM0NzZlNzkwOGY2MDVmYzc0ZDAyODgwNDcxOTZlYjM1NmI1ZjQ1MDgxMTQ0MmIzNzk1OTVlYTRmMzgzM2QxZDk5OGNhMjVhODhiMDQyMmUwN2U3OTMwYjRmYzMwODZiMDIxM2NmNDFiNDgyMzNiOWMyYjk2OGYzMTBjYjMxMzM3NTRjNDBmOGMwYjRmNmIxNGYzMWRhZjljZTBkMTRjN2Y4NzkyMTBmNjc1NGY5NDg3MGQ3MWViZDE3YzkwZTAwZjQ5MDQ4OTZmODljNDVlZTRlNTM1ZjNlNjJhYjQ4MzIzZTYxZjEwODEzZTM1YjJhOGI1MjcyMzRmM2JiOTI4Y2ViYjljOTZhZTQ5YTdhNTI2MWUzYzgyMmY3ODc0NjIyNjI2ZWVjMGMyOGI0ZGVjOGFmNzg4YTNhMmQ2OGQ2MDFlODI2OTQxYjljNzlkY2Y3YmQ4YzM3YzM2MWU1NmM2MDU4ZGM1ZmZmYjkxY2I1ZWEwMTliZGRlYTk3NGEzMDE3ZTkzNDRjZmQ1OTUzZWFkMjgxNjc0MTUwMzRkNzFmNzExMGY2N2E1MjA4OWU4NDgzNmY3ODQwNjY5MjcyZTllOTYyOTcxMDExZjgwYjkyZmU5YzhjYTdkZTc2ZmY5MTU2NTQ5ZWQ3MmFiNDdlOGY5MWE3NDliYmY4Y2M5MjEwMTZhOTNjNTQ3NDgxYmIxYTg3MGI0NTc4NWYwYjc4OTJkYTI1NjhlYmNiMWRmNjFhM2I1YmFiNDYzODQzZjQ5ZWYxMWNmMTFiYjU0ODIyMDdkMjMwZThmZGRlNDBmYTFlYjcxNTcyYjNiZGMxZDFhMzg1N2FjZTRjZmU1MGEzZGUzY2ZhMjAxMDIxYzg5NGI5MjhhOTY0ZjE2OWVhNGIxZjBiOGRkMTg2OGM2MzBjOTc2YmMwZjcyZTAxZGUyZjM4MzM3MmZlYjAwMjQxZTkyNzg1ZDA3MmRiN2JhNTMyMWUxN2JhMzg5MDFiNWJiMzVlMWUzNWE0YzQ3Zjc4MTFhMTQ4ZGFkZTczZWM1NDA5OTQ2YTdhYzJkZDM2YzE3NTQxYmQxNzY1Y2RiZWRhNTg0OGEyODMwYTdmMGEzZDcxNGEyZGJmZmFlZGRmMzkzZjMxM2EzYzI5ZWQ0MmM4OTVlYmUwZWEzNjgxNjc1NDljMmQxOGFkNDE1NjhiYzk0OA=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2022-31681",
"score": 6.5,
"severity": "medium"
},
{
"id": "CVE-2023-29552",
"score": 7.5,
"severity": "high"
}
],
"url": "https://38.54.116.130/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T06:02:06.651Z"
},
{
"port": 445,
"protocol": "tcp",
"name": "http",
"version": "1.12.2",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.12.2",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.12\\.2",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49beff7c23309==\" />\n<title>File Browser</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzJiNDliZWZmN2MyMzMwOT09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1701890633,
"body_sha256": "7d602c46a210b765a8fd69169a850c8748c94b2ef0ce8d26213510b318199f1b",
"component": [
"MySQL",
"PHP",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"WordPress"
],
"content_length": 36028,
"favicon": {
"md5_hash": "6220f00b190723200494ffaa4dc8c00a",
"murmur_hash": 1592926977,
"path": "http://38.54.116.130:445/favicon.ico",
"size": 7457
},
"headers": {
"content_length": [
"36028"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 15:00:27 GMT"
],
"server": [
"webfs/1.21"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:445",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "File Browser"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B368DC119F45C0FA11EFD7A2D2E7963D",
"fingerprint_sha1": "E8E49E808A212FA2B40F9916B26103B39938717C",
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"issuer_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5011963104671082264",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "NjBiODNhNTcyYWMzZDMzODg3Mjg4OGZlMTJmMDg0NzMwYmU0ZDc3NTkwNGRkMzBhN2MyYWUzNjU5ZjE1NDQzMGY1ODkxNDJiYzE0NWQ0OWIzNjAxNGYxZWY2NTNhYmY4ZTZhYjM0NTIyZmFmOWVjYTU2NjQwYWU5NWQxN2NiYzYwZWQ4NGJlYzA3NWQ4NjZjNDE3ZTU0NDI5YzE2MjY2MjhhYjZjNTg3ZjU2NGIzNWM2ZWZkMzI2ZmFiYjA5ZTczN2U2ZWEyOGEwY2EwNjk0OTVmMDM2YzE1MjZmZGMxMDAzNjU2NTY0ZmQzZGFiMDRiZGY5NzgzNzdjZTM1M2Q0YjBlZGYzNzg3NmIyYmJiM2IwNWZhMWZlMDU5N2E2ZDEwMjIxODk5NzM1YjIxMzA3M2RmMGRhMjM4MDU1OTk3ZTY1NmRjZGQ3MDVjN2JjYjFhZjdhODI4OTI2MGNiNzU4NjRiNzI1ZGYzYTlmODQxZWY5NjMzMjVmN2FjMTQ3ZGZhMTI4MWYwZWUwN2JmYjdjZWY3OGQzYjlhNGZlMGUyNTAyODdkNjMwNjVmY2ZmZmZmZDE3ZThmYTBkNjQ0ODFiM2JlOWFmZTFiODJmN2JmYjIxZDdkMDg2NGJhNDk3ZTk3MzUyYTM3M2FjNjQyMjhhZjAwMjQ0MDAyMGUwYzljOWM4Y2Q4MDZmNjkyNDRkYzhiYmU4YTY5ZjRkOTJkNTg5MzJkOTFlMDk4YzUyYTU5MDdjZjMyNTZiOTE3YWFlMzZiNzE4MTY5NjA3NGQyOTBhYzFkNzdjZjM3NzgyYWI3YjYzMTY2MWU0YjM1YmRiYzA2ODJmYmQwNmViYmQwNzM0NDY0NTI4MWQ5YjJlNTcxNTA3ZmE4NmM5OGJiNGRhYThjM2QyNjQyYWRmMjRhMDQ4MzQ3OTMyOGFiZThmYTFiNzhlODg0NjQwMGI4YTI0OWNhMWFiM2ZhZDdkZWY2YTQ2YzZlMzcyMjhiNGJmMmFmNTFjM2U5MWQ5NWY5MTRiZDhkNWQ1YjA4MGMwYzNjODljZWQ4MTRhM2I5NzU3Njg4ZmFlODVhNWUxMzY0NmIxZjc3MjIyNzFhYTlkN2MxNTE5YjBlOTlhNjM3ZDQwOGU0NTMyNDVmYTIyYjMyNDlhYzAwNjcxMWRjYzcxNWY5YjhlZDgwYWIwMmFkZDczMjQwNzgyZjFiOTIwZDg1ZjY4ZjUzMDM5MmM1Mjc3NDFkYmFhN2Q5Y2UwMjk2ZDVmY2YxMGRlNzkwZDRkMmNhMWU2ZjQzODMwODRkZjg0Y2UyY2U2OWNhOTZmZGFmNjFkNGQxOWYwMzhiNjE3NmJiMzQ1M2JkNWE4Yjk3YTEzYTUxN2FlMw=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "12e48fdbc2dd7894e1be548cde1ca3ff192d56e85251fdf2ab356b99a3c809f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "3d808d8251dbd123797ce40670fee973e577603e21cad5d694912d400b4aeac8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-09T02:19:22",
"not_before": "2025-04-09T02:19:22"
},
"version": 2
},
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:445/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T15:00:32.566Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "Postfix smtpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:postfix:postfix",
"part": "a",
"vendor": "postfix",
"product": "postfix",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T08:41:06.122Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "8.14.7/8.14.7",
"product": "Sendmail",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.14\\.7\\/8\\.14\\.7",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www.oowoo.cc ESMTP Barracuda; 1744783179815@3c86107551eb47824bd16c0171dd309d-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc74c633bf9be4fede240d2107== xsm\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "1113CB52230B62745F38CCE06B1ACB62",
"fingerprint_sha1": "493451AD2E8D03C7CCEFFBF8AB17E40500B4492F",
"fingerprint_sha256": "C1E603320D49DC2A086A31620FC6D6DE5C6824D70729CECCA38ECE88FA9CA0CF",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"UA"
],
"domain_component": [
"GHF",
"local"
],
"organization": [
"THXVEHXR"
],
"organizational_unit": [
"XZRHZFJ"
]
},
"issuer_dn": "/C=UA/O=THXVEHXR/CN=localhost/OU=XZRHZFJ/DC=GHF/DC=local",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3690314700898731874",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"UA"
],
"domain_component": [
"GHF",
"local"
],
"organization": [
"THXVEHXR"
],
"organizational_unit": [
"XZRHZFJ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=UA/O=THXVEHXR/CN=localhost/OU=XZRHZFJ/DC=GHF/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "ebf964cd7ef207537f5743383dbcb10f648d7bfe95337792b49996404b085fc3",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhkYTMzYjQzOTQ3MThmNzgyOGMyZGU5ZjY5YjZiMTZmZGNhNDdiNjc4Mzc5YmMxZjNkYzdmODY5M2UwNGIyYTk0M2JiNWEzNjJmNWI2Mzk0NGNlYmM5MmVhNDM3OTkzM2I5OWM1ZDhkMzEwNmRmYzg5ZGUzZTg0NmRhZTljYzYzODQxOTdlMGE5NzA1MDdlNmY3ZDQ0ZTRjZjdiY2EyMmQ3YWFiNjJmYTk3MTVjNjY1NzA1NjZhNGQyN2Q0NTkzNWEzMjg4MTFlNGQwNGNmMjFlNjZkOWFmZGNmYzJlNmQ5MDk2ZmE2ZmNiMWUwYjQwODhjZjM4ODg0OTY1YzEyYWM3NWIxYTMyMmUwZWQ4ZTkzYWVkMjVlYjY2YWZmZDhkYTQwYTY1NzQwZTAyMDUwZThmYTBlMTRiNmE5Mzg1ODQ0NzE4NTM4ZmI5ZGMwYzI5YTE0NzEzYWQ2YjliZjdiNmM1MmM1MDdkMmEyNjdjZGMwMDRhOTc3ZWNkYWJkYTQxZDNjMGYxNzQ4NDBlMjhmZjFhNzUxOWE2YjljNzY0YzA3YThiZGFjMDNhODRhZDA4MmQyNTEyN2U5YjYyMmVjZGYyNzk2ZmE0MjBkNjg5YmQyMTE3NTJkYTU5NDkyZjJlMmIzMjRkNDllNmE3OTk3NzE4YWI5MTM5ZWUxMzRjZjkzMmRjN2U2Yjk1ZDlmNmZjMzZhNTFkMWQ5YWQ3NGYyMGY5MDA2MDNlYjMwOGFkYTY4ZDBiY2FkNzA4OTU5Nzc2OGQ4ZDY4NmMzYWIzOTNhZWY2NjZiNWEwMmYwMTY4YjU4NWI5ZjM3OTNjNWI3MTAzOWQyMjg0ZDcwNzE4MWUzZTg0OWFiNDY2ZGI4NjAwOWU1NzE4MDhkYTYwNmI0YjFjNTViYjFjN2E0NDUyN2E3NTI3Y2FhODQzYmZjZDA0YjQ3Mzc4ZWExOGVjMWRmYmI1NDQzNTgwMmYwOGFlMzg5NTJjYzRlYzNhNDkzZjg5MDc3YWY3OGQ3ZTMwMTJiZDg5ZGI2YWNiOWY2NTVjZTcwNDRjZjMwYTU2YjI4MTdjZmI2OTBhYTU1MmQxZjUyODkwN2Q0YjAxZjI1MzUwNGIwMTkzNDAxNWE1MTBiZmRjOTkyMzY5ZWFkZDE2MjNhMmQ3NmM5MzYzYTZmNzFkNGNjZGNlZGE4ZjM1MjcxMTE2MTUzMzMwNjA2OGM5MzFmMDYzZDZiNGU1Y2EzNmYzYzI4YmIwMDNlNTQxNjM0NGM5ZjNiNzRjOTY2MTFjNWI4YmRmMzdkMWU1MDQ0NjlhMjM5ZmQyNjY5NTQ2OWYwOWE0MDFmYzM3MGM2NmMxYTU0MWU1MWJmYWJlZjlkNWIwYjBkODBk"
}
},
"tbs_fingerprint": "8aa8f920eb68518c51e90cf919c578c4077951699a9bfd84af0f0552a39a38f8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-16T05:09:22",
"not_before": "2025-04-16T05:09:22"
},
"version": 2
},
"fingerprint_sha256": "C1E603320D49DC2A086A31620FC6D6DE5C6824D70729CECCA38ECE88FA9CA0CF",
"precert": false,
"raw": "MIIFpTCCA42gAwIBAgIIMzahqxh4h2IwDQYJKoZIhvcNAQENBQAwcjELMAkGA1UEBhMCVUExETAPBgNVBAoTCFRIWFZFSFhSMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB1haUkhaRkoxEzARBgoJkiaJk/IsZAEZEwNHSEYxFTATBgoJkiaJk/IsZAEZEwVsb2NhbDAeFw0yNTA0MTYwNTA5MjJaFw0zNTA0MTYwNTA5MjJaMHIxCzAJBgNVBAYTAlVBMREwDwYDVQQKEwhUSFhWRUhYUjESMBAGA1UEAxMJbG9jYWxob3N0MRAwDgYDVQQLEwdYWlJIWkZKMRMwEQYKCZImiZPyLGQBGRMDR0hGMRUwEwYKCZImiZPyLGQBGRMFbG9jYWwwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDaM7Q5Rxj3gowt6fabaxb9yke2eDebwfPcf4aT4EsqlDu1o2L1tjlEzryS6kN5kzuZxdjTEG38id4+hG2unMY4QZfgqXBQfm99ROTPe8oi16q2L6lxXGZXBWak0n1Fk1oyiBHk0EzyHmbZr9z8Lm2Qlvpvyx4LQIjPOIhJZcEqx1saMi4O2Ok67SXrZq/9jaQKZXQOAgUOj6DhS2qThYRHGFOPudwMKaFHE61rm/e2xSxQfSomfNwASpd+zavaQdPA8XSEDij/GnUZprnHZMB6i9rAOoStCC0lEn6bYi7N8nlvpCDWib0hF1LaWUkvLisyTUnmp5l3GKuROe4TTPky3H5rldn2/DalHR2a108g+QBgPrMIraaNC8rXCJWXdo2NaGw6s5Ou9ma1oC8BaLWFufN5PFtxA50ihNcHGB4+hJq0ZtuGAJ5XGAjaYGtLHFW7HHpEUnp1J8qoQ7/NBLRzeOoY7B37tUQ1gC8IrjiVLMTsOkk/iQd6941+MBK9idtqy59lXOcETPMKVrKBfPtpCqVS0fUokH1LAfJTUEsBk0AVpRC/3JkjaerdFiOi12yTY6b3HUzNztqPNScRFhUzMGBoyTHwY9a05co288KLsAPlQWNEyfO3TJZhHFuL3zfR5QRGmiOf0maVRp8JpAH8NwxmwaVB5Rv6vvnVsLDYDQIDAQABoz8wPTAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQENBQADggIBAGN/aoqJNg6qD+N0LzW20uuI1jghmayfVPZIJjY9gc+oWDzyUtoZ4RgfjV5YEXdSItJd9CPUJ11icQvDuUPoe/qhCfCo6x4Mdrpopt74dpTJyAgF6S3n+vdh2XlhldV4Ve0U65q7Q5b+S4CTO3wezgOzs2a2YIxR/vzW6pmi30nQMWF9gMqha51Q0MSMMF1SvnIEXySXJGScGHMEoV5qrY/H86idolMTUd7L+LsUQXh/s3SDbts6PYp57hpC1KNcT6glH6wZDlXw9gLZlbyxreFuc12sDHRkSnWaiZGOd5CzShZZvDx/thIGXt8nSQdS32pKgrQygPJ637RxAgudvc4oH8H4M+hK8erNa2bKqxl0Die6hNT1B1vMINAypHnNgCeYI9vVu6U5gYe650Js7ua+l3MkdeoruHbl1UMQ99rCdHxKrDIWG8tVIIECLwT+dpQLeIW4QEuTUfHIzmDRm9wUJ/Vsz5B7LSue7ibaMgsSDPt3LpfZqmnaw905yuHVrljkzuU1lQzwZOTZ/jzFfYuVE6fjE26rqy5nOdwaVo8mmTubudE3bPEFcJoF3Ta5iAXY8EcIFUGLGtkGLICfPG0UlHZSXbabSDxwla2z/2TQAqmhUR2hb/LArMqtn/PpBqP+iyoliCf4pzHQPXrnY/6I1GFd7Wh1pHcGuzzg9lA8",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-16T08:17:24.425Z"
},
{
"port": 631,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4ca74c638b98df8fcd838112704==\" />\n<title>MiiNePort Web Console</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3bbfc64c5441894bbf3ac3832c35ac8d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2E3NGM2MzhiOThkZjhmY2Q4MzgxMTI3MDQ9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 2045939182,
"body_sha256": "5a40decb6ddb296d7d9e31bea19c257e95a780fe07c1ad4841063ba558b3103f",
"component": [
"PHP",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"IBM HTTP Server",
"WordPress",
"MySQL"
],
"content_length": 32368,
"headers": {
"content_length": [
"32368"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 26 Mar 2025 14:12:24 GMT"
],
"server": [
"IBM_HTTP_Server"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:631",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "MiiNePort Web Console"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"ipp": {
"printer_uris": null,
"versions": null
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "0C8D267B56C627965B24ED1C9CF2D4D2",
"fingerprint_sha1": "D510742342B8FB7186355B7D8F25BC8B664801AC",
"fingerprint_sha256": "CE37ABDA3904D334E07F67AD90AAB3B9E8F2BE10BF5F0476E9BE26DD48FFFEB8",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"IL"
],
"domain_component": [
"CDDC",
"local"
],
"organization": [
"CIYUIUEY"
],
"organizational_unit": [
"TBBGHBP"
]
},
"issuer_dn": "/C=IL/O=CIYUIUEY/CN=localhost/OU=TBBGHBP/DC=CDDC/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4403707777352062726",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"IL"
],
"domain_component": [
"CDDC",
"local"
],
"organization": [
"CIYUIUEY"
],
"organizational_unit": [
"TBBGHBP"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=IL/O=CIYUIUEY/CN=localhost/OU=TBBGHBP/DC=CDDC/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "0b33f80074d89eaf0623d4aa002e7cb10484d8d3698e21e70642673d1792b9d9",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "58dd44b25a92dc24537b8e12da1934c55543a13955d248deca35b92ab4d40e62",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-26T07:07:11",
"not_before": "2025-03-26T07:07:11"
},
"version": 2
},
"fingerprint_sha256": "CE37ABDA3904D334E07F67AD90AAB3B9E8F2BE10BF5F0476E9BE26DD48FFFEB8",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:631/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-08T21:56:14.562Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc75c638bf82f8ffd93a112102ec==\" />\n<title>OPS-DRD (199.72.57.76),AV Media Renderer Device</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3NWM2MzhiZjgyZjhmZmQ5M2ExMTIxMDJlYz09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"DVR\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n <script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 735504399,
"body_sha256": "ceb4e03d55ca15f87ea3ac4a1e5196f4d00e4fde3318cb1fc8e5fa14997472f2",
"component": [
"Erlang",
"Django",
"WordPress",
"MySQL",
"Ruby on Rails",
"Ruby",
"Cowboy",
"Python",
"PHP"
],
"content_length": 32449,
"favicon": {
"md5_hash": "6220f00b190723200494ffaa4dc8c00a",
"murmur_hash": 1592926977,
"path": "http://38.54.116.130:993/favicon.ico",
"size": 7457
},
"headers": {
"content_length": [
"32449"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 01 Apr 2025 00:22:52 GMT"
],
"server": [
"Cowboy"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:993",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "OPS-DRD (199.72.57.76),AV Media Renderer Device"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "715C19DA33A6431DE8C11DCD4E2A2E9B",
"fingerprint_sha1": "6E71A2E7CDCC9D263CA046CB94F364C60240A345",
"fingerprint_sha256": "5D20D3C17F6F6C43D5A6488E20E353CF6E41E278B8F0F1D97CA4FC63C1AE5D79",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"BY"
],
"domain_component": [
"BSQSHS",
"local"
],
"organization": [
"KIGWBQIW"
],
"organizational_unit": [
"YDLJSUP"
]
},
"issuer_dn": "/C=BY/O=KIGWBQIW/CN=localhost/OU=YDLJSUP/DC=BSQSHS/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3659724296823289758",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"BY"
],
"domain_component": [
"BSQSHS",
"local"
],
"organization": [
"KIGWBQIW"
],
"organizational_unit": [
"YDLJSUP"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=BY/O=KIGWBQIW/CN=localhost/OU=YDLJSUP/DC=BSQSHS/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e7249379680ceb0f9d148910ea9093f1529748abc2c3bbbebe1eb93d28607038",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "e864fe5f8154b1af7e6c8a8068e84ed0a69fb0acee33332a1380fd4ce1eccb3e",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-31T03:21:55",
"not_before": "2025-03-31T03:21:55"
},
"version": 2
},
"fingerprint_sha256": "5D20D3C17F6F6C43D5A6488E20E353CF6E41E278B8F0F1D97CA4FC63C1AE5D79",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:993/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T13:11:26.63Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "http",
"version": "10.2.2",
"product": "CherryPy httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:cherrypy:cherrypy:10.2.2",
"part": "a",
"vendor": "cherrypy",
"product": "cherrypy",
"version": "10\\.2\\.2",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc71c639b89be5fec2380c20==\" />\n<title>IPC</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3MWM2MzliODliZTVmZWMyMzgwYzIwPT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -380472030,
"body_sha256": "ea5d9c46b72bf1cc69869fc517e6931421fd1479b67263c646696566d02dc83c",
"component": [
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"lighttpd:1.4.55",
"Django",
"Python"
],
"content_length": 35853,
"favicon": {
"md5_hash": "77b2f4c09890ab658a72c4bad8c1077b",
"murmur_hash": 1924358485,
"path": "http://38.54.116.130:995/favicon.ico",
"size": 1630
},
"headers": {
"content_length": [
"35853"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 13 Apr 2025 21:15:59 GMT"
],
"server": [
"lighttpd/1.4.55"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:995",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "IPC"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhkMmMyZmNlMTZlODNlYzU3ZDkyN2VmNjk2MGY0OWRkYzI3ZjkxNjRmNmRlNmRiNDhlZGZhYTUxOTk3MjBhOWExYTQ1ZDZiMWQ0YTE3NjMzMDYwYzBmYzc3NDMwZWIwOGIyMDc4ZTVmYjI5NWNhODgyNWFkYzhlOGFhODYxOGQ2N2Y2MDRmYjgxMzg2YjBhMGY5Zjg3NGJlMGY0MmZjMjQxMDZiZjM5YTIxYjYzNmRjYTIxOTVlNzdlZTEzYmIxOTFjMTI2OWU5OGUyY2E3ZGY4NjlmZTI5NmExYzEyOTJhMGVjMmU2ZGY0YmUxMmIwZGMzZDA0ZTE5Yjk3YWRhZThiMDM1ODMzMjUxMWUzMjA4N2MzMjQyYjBhNjcxNWNkNjAyZTZkZjkwNjFlZmZhY2UzODI2ODNjYjAwNzE3MDgwNTI4YWRlZDNjYTU3ZTgxNmUzOGZkMjQ5ZmFjNjk3ZmFhNWFiNGE3ZmQ0ODBhMDA5MDVlZWYzYzQzOGNiZTc1NmExM2Y3YTBjYzAxY2Y1NjlhOGM0NTM0NDg1OTI4OTcwYjczNzkzOGQ3YjRkMGYxYTBlYmI2NmM2ODI0ZmE1NmM3YjExYWJkZWZkMTJiM2MxN2U0NGRjNTU3ZWI3MDJjYzk0NTBmN2U0NDY3MzdlZjViMjUwNGFjYWRlMDQ0NDQ1M2Q2ODZkYmQ4MDRmNGFlZDllZGFmOWViNTYxNzViY2Y5MDk2YmJmZjQxYmNiMTQ4MTVkYTFkNWRlZTRmMDhhNWFiMjIzZWY0YmYyZDhiNzE2MzJlNzE4ZTU3ZWExMjcyN2JlMDJhNGE5ZDBjODVkMmI3OTM4Nzc4OWQ5NDliMWQ0YTJhN2ZmNDc1MTUwMTg2NmMxMzE5OTk3ZDJkODBhYzJlY2JiYzI2ZGRjZTgxNTQ5NGVkN2ExMGFlZGI4NWM3YmFiMmRkNjZjNjhlZGJjYjNhNTM2NmQ2Yjk3NTBhZTdiZGI0ZTY1ZmU5N2ViM2Q3MzIxODA2NjA1YmRkMDZkZDExMWMyMWEyN2U3MzVmOWVlZGY4MmQwZjBjNzc2OGNiMGYwNjk1MDJlMzFkZTAyNGFhODI3ODYzZGViZGU1NWYzMzM5ODExOTBmMDYwZDgwZjg4MTY1NmM3YzkzZTk0OTZjYTFmYzY4NDk0Njc1ZGEzMTFkODk4YjFkMmY1MGVlNGMzMTQzOWY2MzBlYWZkZDc2ZDVhOTYyYzIwMzIyYWQxNGIwODJmZTQ3ZWU5NDU4NjZjN2Q2ZWU3ZjE4N2I3OTY5NTc4NWQ5NjYyOGU0YmNjNjg0ODFiNWQ2YjVhNjdiNGQ1YjgyMDBkYjI4MzIxMTY1MWFmYTRiNmY5MDBhOGNm"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:995/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T00:41:42.457Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_NOT_SUP",
"instance_name": "",
"version": "15.0.4153"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T19:59:50.348Z"
},
{
"port": 1434,
"protocol": "tcp",
"name": "http",
"version": "100.0",
"product": "Google httpd",
"extra_info": "GWS",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc77c63bba87f8ffd83e112406==\" />\n<title>AXIS M3004 Network Camera</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3N2M2M2JiYTg3ZjhmZmQ4M2UxMTI0MDY9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 373227142,
"body_sha256": "a2ba47f2473c13171560990611c0dbc7b98dd3550197b732e9e5f13369d0fb7b",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 36053,
"headers": {
"content_length": [
"36053"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 10:45:17 GMT"
],
"server": [
"Web server"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:1434",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "AXIS M3004 Network Camera"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "https://38.54.116.130:1434/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T10:45:44.096Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "http",
"version": "1.30",
"product": "Debut embedded httpd",
"extra_info": "Brother/HP printer http admin",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4ce72c633be9be4fbde240b2a==\" />\n<title>RT-GM-3</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2U3MmM2MzNiZTliZTRmYmRlMjQwYjJhPT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ncalling init: /lib/\ntext ml10 mr20\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -2049099280,
"body_sha256": "7dfa7710a321d1b17dd55fc84440c815903c2da0897819e2c5c26f397ba257c7",
"component": [
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"Django",
"Python",
"WordPress"
],
"content_length": 36109,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://38.54.116.130:1883/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"36109"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 19 Apr 2025 02:51:40 GMT"
],
"server": [
"VIAWEB system/1.0.0 (http://www.viawebsystem.com.br)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:1883",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "RT-GM-3"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FFEC6DA06FF36D1109F7A810B95837C4",
"fingerprint_sha1": "1C7EFD4DBBEC07567EA5D989C6DE121D59551847",
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"issuer_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5145723181762935798",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "634ae9f2b5e49ab06bbd5772cadcf2ac5eca96196a3ffe4ca0190aba4b0fd531",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "96003e4b54c707f7cc2ff692ae2a10fdda2f3d97be150186790faa5b4ae0eba3",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-02T12:12:27",
"not_before": "2025-04-02T12:12:27"
},
"version": 2
},
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"precert": false,
"raw": "MIIFozCCA4ugAwIBAgIIR2lH+Hl4+/YwDQYJKoZIhvcNAQENBQAwcTELMAkGA1UEBhMCU0gxETAPBgNVBAoTCFRGTlRWTU5NMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB0RYWUpRQkExEjAQBgoJkiaJk/IsZAEZEwJBRDEVMBMGCgmSJomT8ixkARkTBWxvY2FsMB4XDTI1MDQwMjEyMTIyN1oXDTM1MDQwMjEyMTIyN1owcTELMAkGA1UEBhMCU0gxETAPBgNVBAoTCFRGTlRWTU5NMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB0RYWUpRQkExEjAQBgoJkiaJk/IsZAEZEwJBRDEVMBMGCgmSJomT8ixkARkTBWxvY2FsMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAupBIiU9D2fhnnlEJpZaS0CmpvWCxvOYaYw30z34TYPAei8UKEKrYqcrHwSJBehWd0cx0uLUQQ3ah2lHurjF02tQ1DF5zFZK22sPtB8Nkz7e6jyruAZXEGl4xy1absrSf5KG+dPC7zUcbJUC0714C/qdes7/w5kIcVDpS3WzuFbgZQtGrLrQnn2nJmr0H36UvGJzNG1gyJAK5o8s3nhncdsvjj43B0fJ2sSDyOIw9aSUVwE+Pk+voP19NRCW1RbfNGCX/hfE6saQWPjE948K2K8WCfT3eT9o/k9UP+rlk/xp6nd7labzRscixGjbM8aIjb0mh/K6LFcpztBjfyhqf58u2OKcmsgqHzDhuKCX6AGf8mHSG0q1HNvCX92xIdNtKPZ/oCEW84nQw1gHq6u1mz/lNsBej402d7CWGxcb9JJczDXdP/b8B4IYGCVjuuDDpZ+0GVEDGKblj1F+6yCEgK+0zWzzwjqB2Yk2RCt5Ya2Y4Q/wobWj/4SMo9YlBL1R2NQe6v1KID54EBtWWxoLJ7Y3i0Q9TpY7CXAjukHDVI2bz4CQTRef/W3A0DinSAsLUnrb7eBO2qmO9nIMWZeY7wnjRqgAF6HPhQ1X26v11c6HfrjbZGDU/e3xP35+Yeg2pI1IOU7TxfUhn5/R+m0WFH+ZxaCG9hjRZKFwJwfMzyQcCAwEAAaM/MD0wDgYDVR0PAQH/BAQDAgKEMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBDQUAA4ICAQB7lo4sCzUb/cRaPUx1/KRvQY3vGXNdBF2vqJmBrbkSi8TR2vERkWCLSqO4U8keyAowq1/zkarVGHK4IDnPpluvDwnE4OJlxQgq5vT8cN4JBHO2/XZvUFl2xarFlmiIzGBsXWk71TVQVw7nyK+z9pvAxj2hmbDl/LzNk7OLEsQ4LhFWNo3Xpn7SM3u8hJDiceHrWV74FL+VcGG1OAvBB01WPMKkZDSc2Q7+4Plr8Qtf3EIUmvurNkHfBOVS6MmGiXhgIGknrmD3FPkHEahoOMNQV4da3DKAeO7SbIObUxoHPD6aNQJuw+ZM4VpY1fhZHsStoPwOzE6u3F7PmEIr/9RpIjkoMdNaIHFmveQNb29pl/q0WVrh/VXTUo3EGUblQXjP2MAP9wwdfZjRGyb8pN6Zff+3nnGbDNvnbes5CYvfrWPQwvAM4r6wAB/MSfczPHhXr3qBARajcHK0VyyuXR0CH+7CDdCJ6FwHB8pj4px3fKljuwQWIIz5+1bIKYWc6hqupEVO3/149bwbttXPc8s6DVJra0H38RONMuYcbWGXU7VM47Ojj4E4PJb7tB4hzDGgC/6Iy1v+lcKSHolNNr6g45AdVl9+UIBjdz+2bla9oWz25+Ug6g9RipsodVVkJIqn39/7/rjhn4x282qq92wERUgqgsPTzkjK5pFcVZuMIA==",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:1883/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T02:51:45.859Z"
},
{
"port": 1911,
"protocol": "tcp",
"name": "http",
"version": "1.4.19",
"product": "lighttpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:lighttpd:lighttpd:1.4.19",
"part": "a",
"vendor": "lighttpd",
"product": "lighttpd",
"version": "1\\.4\\.19",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc71c639b89be4fede240e2704==\" />\n<title>致远A8+协同管理软件.A6</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3MWM2MzliODliZTRmZWRlMjQwZTI3MDQ9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"DVR\"\nSelenium is made possible through the efforts of our open source community, contributions from these\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 866444933,
"body_sha256": "089bea48786da9d01abcb576e2d35d765dc2d4bd27d9d9d92cd58491f53860ac",
"component": [
"Ruby",
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails"
],
"content_length": 36090,
"favicon": {
"md5_hash": "6220f00b190723200494ffaa4dc8c00a",
"murmur_hash": 1592926977,
"path": "http://38.54.116.130:1911/favicon.ico",
"size": 7457
},
"headers": {
"content_length": [
"36090"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 15 Apr 2025 15:31:42 GMT"
],
"server": [
"Yamaha-RT"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:1911",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "致远A8+协同管理软件.A6"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "8AC1D6853270F4EC5784740AD174C550",
"fingerprint_sha1": "05A2281F1E196AA8BBA08BFE4CDF5CEC82BFE1C9",
"fingerprint_sha256": "4DD437488C20237267FD4FBDE2484643C7E67F4C0CF2DB487BCAC0CC3664172F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"NI"
],
"domain_component": [
"QJLKLZZ",
"local"
],
"organization": [
"RBVKDFGD"
],
"organizational_unit": [
"JPKAVUZ"
]
},
"issuer_dn": "/C=NI/O=RBVKDFGD/CN=localhost/OU=JPKAVUZ/DC=QJLKLZZ/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "6939835913357906926",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"NI"
],
"domain_component": [
"QJLKLZZ",
"local"
],
"organization": [
"RBVKDFGD"
],
"organizational_unit": [
"JPKAVUZ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=NI/O=RBVKDFGD/CN=localhost/OU=JPKAVUZ/DC=QJLKLZZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "5f6a219ec985f7c5b05a4e26c2e0eda19f5626e0a2cdf9e73b8802567a779bb2",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhjYjFkMDAyOGMyMDBhYTY5YTkyMzFlODhjZTdiODZiNGI5MDQzYzdmMjI5OTgxOTcxZDUxOWM5OTEzNGQ4N2ZiMzczMDlkNDg5ZDk1ZmM4OGM5MGM4NjJiY2YxODg2NTE0YTA1NDJmZDU1MmQzNmZiYTg5YTY0YzM4ZmI3NzVkMWI5OTE1YzhjODcwZTFlOTIzYjE4YzAxYjJhODM5MWQzYTJjYjVlMDQ5MzYzNTA5N2U2OTNhODk2MTYwZTgyYWY1ZWY3Yzk1NzllYWY5OTljNjZjZGMzMTgyMzI0N2VmOTU1MGVmYTYzYjkxNjg5MWQ3MDIyNzliZGViYzA5OTYxYmIyNjk3N2ViYjg0ZDYxMDc0NTE5MjFjNDYzNGY2NjUwNzIzODdlZmRiZDEyNWJkMzBiODc3NzJlOGEyNDQyMjA5YWFmNDg1NzFmZDNhYWIxYTcwN2YzNjBlZDRjZjE4OWU1ODIwNTljNjRlZGYzODQ2MDA4ZTJlMWE5MzY4ODA4NjY3ZDM2ZTZjNDE4ZTYzZjMzY2E5YzAxMDJmYzZkYTg2OWZhM2UzMTRmNWZmOGYyNGM2MTBiYzI3ZTJhNjFmZDVlOTFlMGNlMTBlYWY5ZjRkNTc5OTg4MjkxNzU3NzEyNTE5YmI4MjczYzkyNWNiNGJlNmQ2MTlmY2QzNjE3NDQxMGViZmM1MjkyYTdkMzhjMjEzMDY5YWE5YWM2YjZiZTNhM2RjMWJlN2YzMTgzMzBmYzlhYWQ3OTJmNGUxMzdjMTkwNGUyZGRiNWQ1YzNkMTg0ODBlN2U1NDZkMGQ1NTVhM2NmZDVhYjU0NDczOTJhNzUxNTgwMDM5NWY2OGNjOWJjN2Y4NTJkNmY0OGRhOWUyZDljNzlkMmQ4YjBjOGVjYWVkMTg2YTdlZTQ0ZGRiZGI4NWYxMzJkNWI5ZmRiNjY5ZmE0MDE0ODkwYTAzZGM5MmRmNmEwN2MzM2Q0OWJiOWE0MGJmMzMxNTQyOTZjYzVjZjI3YmYxNGNiZDNlNzljOTZmMTRiYmI2ZmQ3NzU2M2ExNWRmOGY0YTBmNzFkYjc0Y2JkNTdkMzI2NDdmYTYyZmQ4ODJlODhhYjAyNDQ1OWRhOTg0N2FhNGNkYjgzOTc1ZDk2MTEwY2RlMmY1ZWFlZmViMmMxODJiMDc2YzgwZDFhZTJkNTI4ZWFlODQwY2VmNmU1MTZmOGQyYjAzOTI1OTU3Mjc3NjFjMDIxMTJkZGE2MTI1ODc3ODVjMjQ0ZWNmNGNmNzU3YWNkYjg5ODViNTZlNWQ1MTQ1NjBiMGVmMzE1NzUzY2Y3ZGU0ZmVjMDYzMGI3NmM5NjQyYzg3NTg5ZjE1MTFlMTA3ZTJlN2Zm"
}
},
"tbs_fingerprint": "bfc0d2d984c413b4606ffbf39270597e09f439f025c1cb31e857c3550513b732",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-15T18:44:47",
"not_before": "2025-04-15T18:44:47"
},
"version": 2
},
"fingerprint_sha256": "4DD437488C20237267FD4FBDE2484643C7E67F4C0CF2DB487BCAC0CC3664172F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2008-1531",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-4298",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-2008-4359",
"score": 7.5,
"severity": "high"
}
],
"url": "https://38.54.116.130:1911/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-16T00:39:56.715Z"
},
{
"port": 2181,
"protocol": "tcp",
"name": "http",
"version": "4.0.0",
"product": "CherryPy httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:cherrypy:cherrypy:4.0.0",
"part": "a",
"vendor": "cherrypy",
"product": "cherrypy",
"version": "4\\.0\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e3cd6eda3ab89be7f9dd240824==\" />\n<title>FortiGate</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGUzY2Q2ZWRhM2FiODliZTdmOWRkMjQwODI0PT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nSelenium is made possible through the efforts of our open source community, contributions from these\nDashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -609430694,
"body_sha256": "48735e7a400e4fa1f933cb4f94986b8caba1363ab1d5ce80e829d47fe1d2712e",
"component": [
"Ruby",
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails"
],
"content_length": 32654,
"favicon": {
"md5_hash": "44071663a97aa46640d124dd31fe7521",
"murmur_hash": 2091717113,
"path": "http://38.54.116.130:2181/favicon.ico",
"size": 7659
},
"headers": {
"content_length": [
"32654"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 07 Apr 2025 13:52:23 GMT"
],
"server": [
"hidden"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:2181",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "FortiGate"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:2181/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T19:29:47.626Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "Postfix smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postfix:postfix",
"part": "a",
"vendor": "postfix",
"product": "postfix",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www.oowoo.cc ESMTP Postfix smtpd; 1744748400344@3c86107551eb47824bd16c0171dd309d-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc74c633bf9be4fede240d2107== xsm\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "8AC1D6853270F4EC5784740AD174C550",
"fingerprint_sha1": "05A2281F1E196AA8BBA08BFE4CDF5CEC82BFE1C9",
"fingerprint_sha256": "4DD437488C20237267FD4FBDE2484643C7E67F4C0CF2DB487BCAC0CC3664172F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"NI"
],
"domain_component": [
"QJLKLZZ",
"local"
],
"organization": [
"RBVKDFGD"
],
"organizational_unit": [
"JPKAVUZ"
]
},
"issuer_dn": "/C=NI/O=RBVKDFGD/CN=localhost/OU=JPKAVUZ/DC=QJLKLZZ/DC=local",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "6939835913357906926",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"NI"
],
"domain_component": [
"QJLKLZZ",
"local"
],
"organization": [
"RBVKDFGD"
],
"organizational_unit": [
"JPKAVUZ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=NI/O=RBVKDFGD/CN=localhost/OU=JPKAVUZ/DC=QJLKLZZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "5f6a219ec985f7c5b05a4e26c2e0eda19f5626e0a2cdf9e73b8802567a779bb2",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "bfc0d2d984c413b4606ffbf39270597e09f439f025c1cb31e857c3550513b732",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-15T18:44:47",
"not_before": "2025-04-15T18:44:47"
},
"version": 2
},
"fingerprint_sha256": "4DD437488C20237267FD4FBDE2484643C7E67F4C0CF2DB487BCAC0CC3664172F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T20:20:00.559Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.7.31",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:5.7.31",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "5\\.7\\.31",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.7.31"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T06:53:31.72Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e7ca77c63bb881f8fcde33112102==\" />\n<title>webpackSPA</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3bbfc64c5441894bbf3ac3832c35ac8d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU3Y2E3N2M2M2JiODgxZjhmY2RlMzMxMTIxMDI9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1738249035,
"body_sha256": "fd9446ee1e7061e4e871f1d14e636c788b099730158892ed00ea348180a5a1f2",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 32357,
"favicon": {
"md5_hash": "9b71349660a2170717ff6a84f9de12a1",
"murmur_hash": 939607277,
"path": "http://38.54.116.130:5000/favicon.ico",
"size": 2340
},
"headers": {
"content_length": [
"32357"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 23 Mar 2025 23:16:35 GMT"
],
"server": [
"LTE Router"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:5000",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "webpackSPA"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "885A5990D0219407B0985E54F86A3AD2",
"fingerprint_sha1": "FFC8D7B73E2703122E73157BC60C777BF6917485",
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"issuer_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4943393435217780126",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "ODk3NTc4NmNhMDgxMWVmZGIxY2I3NmMwNTJlOTRkMTM1NDAzZTI2ODNhYjIzZTQ5NGViOTdlNjU0MjdhMzZmZGU4NmU5ZGRiMDU5NGE2M2U2MDYzMzk1NGZjNzRjMjQwMmRmMGZlZGNmMjNkM2VmMmZlNWM2MGQzZWRkZTQyNDEzZWQzZTMwZTczYjZkY2NiY2E2YTQ3YzQ2ZmEzNDdjNDU4ZmJlNzgyOWQzY2FjMDhjN2I4MGY5ZWE2YzQ5OTQxZjYwN2M1MzUwNmVjMmM2NWI5MzFlMzVhOWI2YjM1OTMzNDgyYjgyYTllZjhlMmEzN2U3MGIyYzczYzM1NzNiMGM0ZjJkMjE2OWIyOGMzZmM1N2YwMGZiNjg2ZThkZTY3ZWZlNTI5YzJlNGJjMGJlMzBmODE4NGZhZWFmNjg2MGZjNjJkMDUxZTYzZDcyMWQ3YjJlMjI1MzMyY2JmMGQzYTUyMTJlOGM4NDJlZDBiZDVkMmY1NGI3YjVjZDljOWNlZDU1MzA2ZjVlNzMxNzYwN2QyMGU3NzgxY2JiZjBiNjcyY2NjNmNlYmY5NmIxYmVlOTE2ZWY2MzM4MDA4NzExNTI4NzNjN2NkZWUzZmRhMjg0MWQzNDQ3ZDQ5NWZjMGNiMzJjMDlkOGFjMWUyMDRiY2E0OWUwNjQ2YjYxNTAxMDA2NWUzYTJmYzZlYjZiYjg3OWY0MzQzOWU3ZGRmYTFiNDMyMmUxZDI2NWJhYTRkNDhlYmI4MWEzM2Q0M2E4Y2ZkZGVlMzgwMjc3MjJkOTg4MjJhMmE3MmQxOTE5NmEzMDVlNWNkOGYyZDEzYjQyZThkYzVkNmFjNDM2M2FlY2EyMzA3ZmYzMmQ2M2QzNDlhYTE0OTliN2E5NjQ2MjQ1ZjlkMDIyY2E2ZTE4ZWQzY2YwMzBhODViNWM5Y2I4YjM0ZDEyYzYxYjU5MTEzNjcwMWFkMWNkZDQyNDQ0ZjVjZmQyYjU1OTViOWZkZTNlYWFmNzlhZjFiZTc3YjFjMDVhYjkyNTVlOGE2ZmY1M2E0ZGEzNzk0MDA0YTRiYjA4MTYxYzNkMWUyNzFiMzM3NjU0N2Q3MTk2NjMwZWM2Nzk0M2NjNzQ2MjRhMjQ4YTdkYzgwNWUyZmM0NjUzZTczMDJhMmQ0M2E4NWMxMDhiMzUxMDY1NmQyYjRlMjUwZWUwNTk2Y2U1MTQxYzJhZWZhYjc0MzNjMjAzZGRmODQzOThlZDNmNjFjNmYyYWY3NzY2YmJlMzAzNmY5ZTI3YWI1MDVkYzAyY2I5ZDhiMzIxZDI1YTcxOTZkYmNhMzkyZmZhZTIzYWQ5ZDZiZWMzY2Q1MDlhNmFkNDMwZDg1OGNmOTIzN2Y5Mg=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "39598d4bee41caf5392e27ea56777c5dc0d4211fef219b1260905d6c40fdd928",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "3cdea19c11fc66d95eb4bc2403a5aa7e4083cfaf3fc4c32aff702cf739029444",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-19T09:16:12",
"not_before": "2025-03-19T09:16:12"
},
"version": 2
},
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:5000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-16T03:53:22.081Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T02:16:44.785Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "4B8CCB22EEA3EA6D3D5A8C2DA2223D39",
"fingerprint_sha1": "F48EA05C40E10FF77D52A41D4FFCF30A4C28CB14",
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"issuer_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1982914786350820658",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9d714df9dda5edb511dbdbae2d3ee590c96ab5239a7a417089f8592b1e2ac57",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "89638f44ed9d8f425672dfad0a1b1e0a03c318faa0efc0d564e0cb5a385750d4",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-18T14:20:14",
"not_before": "2025-04-18T14:20:14"
},
"version": 2
},
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T17:51:22.739Z"
},
{
"port": 5671,
"protocol": "tcp",
"name": "http",
"version": "0.7.64",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:0.7.64",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "0\\.7\\.64",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4ce72c633be9be4fbde240b2a==\" />\n<title>安网-智能路由系统</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2U3MmM2MzNiZTliZTRmYmRlMjQwYjJhPT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ncalling init: /lib/\ntext ml10 mr20\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 527227931,
"body_sha256": "96d1170ee97659598052d3a99478634a8ee468c583dcecae0ea4948d1b5d0a5a",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"CherryPy:4.0.0"
],
"content_length": 36127,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://38.54.116.130:5671/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"36127"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 19 Apr 2025 02:38:53 GMT"
],
"server": [
"CherryPy/4.0.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:5671",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "安网-智能路由系统"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "4B8CCB22EEA3EA6D3D5A8C2DA2223D39",
"fingerprint_sha1": "F48EA05C40E10FF77D52A41D4FFCF30A4C28CB14",
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"issuer_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1982914786350820658",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9d714df9dda5edb511dbdbae2d3ee590c96ab5239a7a417089f8592b1e2ac57",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "89638f44ed9d8f425672dfad0a1b1e0a03c318faa0efc0d564e0cb5a385750d4",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-18T14:20:14",
"not_before": "2025-04-18T14:20:14"
},
"version": 2
},
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:5671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T02:39:19.892Z"
},
{
"port": 5984,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"couchdb": {
"databases": [
"_replicator",
"_users",
"admin",
"passwords",
"core-configuration",
"core-locales",
"core-photos",
"core-tasks",
"fml",
"mcx",
"mlkvljnah",
"mllbqddlikk",
"mzpp",
"nsjl",
"oqulw",
"pmbt",
"qys",
"todv",
"user00230",
"user00400",
"user02030",
"user02212",
"user03200",
"user21212",
"user22100",
"user22402",
"user23122",
"user23213",
"user23421",
"user24022",
"user31210",
"user33212",
"user33233",
"user40114",
"user40430",
"user42341",
"vfl",
"wryknmigdtx",
"wtpl"
],
"version": "1.6.1"
},
"http": {
"body": "{\"ok\":\"true\", \"version\":\"1.6.1\"}",
"body_murmur": 1033467107,
"body_sha256": "84c1b0de24fe7c380a9eaf1a23043033d282cce52b3143f99ba221bf5ccc95c8",
"component": [
"Erlang: otp/17",
"CouchDB:1.6.1"
],
"content_length": 32,
"headers": {
"content_length": [
"32"
],
"content_type": [
"application/json"
],
"date": [
"Sat, 12 Apr 2025 08:52:28 GMT"
],
"server": [
"CouchDB/1.6.1 (Erlang OTP/17)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:5984",
"path": "",
"scheme": "http"
}
},
"status_code": 200
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B368DC119F45C0FA11EFD7A2D2E7963D",
"fingerprint_sha1": "E8E49E808A212FA2B40F9916B26103B39938717C",
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"issuer_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5011963104671082264",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "NjBiODNhNTcyYWMzZDMzODg3Mjg4OGZlMTJmMDg0NzMwYmU0ZDc3NTkwNGRkMzBhN2MyYWUzNjU5ZjE1NDQzMGY1ODkxNDJiYzE0NWQ0OWIzNjAxNGYxZWY2NTNhYmY4ZTZhYjM0NTIyZmFmOWVjYTU2NjQwYWU5NWQxN2NiYzYwZWQ4NGJlYzA3NWQ4NjZjNDE3ZTU0NDI5YzE2MjY2MjhhYjZjNTg3ZjU2NGIzNWM2ZWZkMzI2ZmFiYjA5ZTczN2U2ZWEyOGEwY2EwNjk0OTVmMDM2YzE1MjZmZGMxMDAzNjU2NTY0ZmQzZGFiMDRiZGY5NzgzNzdjZTM1M2Q0YjBlZGYzNzg3NmIyYmJiM2IwNWZhMWZlMDU5N2E2ZDEwMjIxODk5NzM1YjIxMzA3M2RmMGRhMjM4MDU1OTk3ZTY1NmRjZGQ3MDVjN2JjYjFhZjdhODI4OTI2MGNiNzU4NjRiNzI1ZGYzYTlmODQxZWY5NjMzMjVmN2FjMTQ3ZGZhMTI4MWYwZWUwN2JmYjdjZWY3OGQzYjlhNGZlMGUyNTAyODdkNjMwNjVmY2ZmZmZmZDE3ZThmYTBkNjQ0ODFiM2JlOWFmZTFiODJmN2JmYjIxZDdkMDg2NGJhNDk3ZTk3MzUyYTM3M2FjNjQyMjhhZjAwMjQ0MDAyMGUwYzljOWM4Y2Q4MDZmNjkyNDRkYzhiYmU4YTY5ZjRkOTJkNTg5MzJkOTFlMDk4YzUyYTU5MDdjZjMyNTZiOTE3YWFlMzZiNzE4MTY5NjA3NGQyOTBhYzFkNzdjZjM3NzgyYWI3YjYzMTY2MWU0YjM1YmRiYzA2ODJmYmQwNmViYmQwNzM0NDY0NTI4MWQ5YjJlNTcxNTA3ZmE4NmM5OGJiNGRhYThjM2QyNjQyYWRmMjRhMDQ4MzQ3OTMyOGFiZThmYTFiNzhlODg0NjQwMGI4YTI0OWNhMWFiM2ZhZDdkZWY2YTQ2YzZlMzcyMjhiNGJmMmFmNTFjM2U5MWQ5NWY5MTRiZDhkNWQ1YjA4MGMwYzNjODljZWQ4MTRhM2I5NzU3Njg4ZmFlODVhNWUxMzY0NmIxZjc3MjIyNzFhYTlkN2MxNTE5YjBlOTlhNjM3ZDQwOGU0NTMyNDVmYTIyYjMyNDlhYzAwNjcxMWRjYzcxNWY5YjhlZDgwYWIwMmFkZDczMjQwNzgyZjFiOTIwZDg1ZjY4ZjUzMDM5MmM1Mjc3NDFkYmFhN2Q5Y2UwMjk2ZDVmY2YxMGRlNzkwZDRkMmNhMWU2ZjQzODMwODRkZjg0Y2UyY2U2OWNhOTZmZGFmNjFkNGQxOWYwMzhiNjE3NmJiMzQ1M2JkNWE4Yjk3YTEzYTUxN2FlMw=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "12e48fdbc2dd7894e1be548cde1ca3ff192d56e85251fdf2ab356b99a3c809f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "3d808d8251dbd123797ce40670fee973e577603e21cad5d694912d400b4aeac8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-09T02:19:22",
"not_before": "2025-04-09T02:19:22"
},
"version": 2
},
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:5984/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T10:40:19.27Z"
},
{
"port": 6000,
"protocol": "tcp",
"name": "http",
"version": "1.4.32",
"product": "lighttpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:lighttpd:lighttpd:1.4.32",
"part": "a",
"vendor": "lighttpd",
"product": "lighttpd",
"version": "1\\.4\\.32",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49be7fed4240e21==\" />\n<title>Roteador Multilaser</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzJiNDliZTdmZWQ0MjQwZTIxPT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 1720101590,
"body_sha256": "11efcf1a9459baf5b67d3d5dc6c785b0eb5204848b0fed64bcf7181b1d5bd110",
"component": [
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"Django",
"Python",
"WordPress"
],
"content_length": 35869,
"headers": {
"content_length": [
"35869"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 02:31:01 GMT"
],
"server": [
"GEM ver1"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:6000",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Roteador Multilaser"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2012-5533",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-2013-4508",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2013-4559",
"score": 7.6,
"severity": "high"
}
],
"url": "https://38.54.116.130:6000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T02:39:05.377Z"
},
{
"port": 6379,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:squid-cache:squid:4.13",
"part": "a",
"vendor": "squid\\-cache",
"product": "squid",
"version": "4\\.13",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4c977c63bb581f8ffdf3f112a0a==\" />\n<title>Honeywell Network Camera</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Yzk3N2M2M2JiNTgxZjhmZmRmM2YxMTJhMGE9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"netcam\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ncalling init: /lib/\ntext ml10 mr20\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -891944532,
"body_sha256": "3b3680ffb089729ec50c25eaf54352ad6add707fd6007f1918a93d19aa1c403a",
"component": [
"Ruby on Rails",
"Ruby",
"WordPress",
"MySQL",
"PHP",
"Django",
"Python"
],
"content_length": 36132,
"favicon": {
"md5_hash": "9b71349660a2170717ff6a84f9de12a1",
"murmur_hash": 939607277,
"path": "http://38.54.116.130:6379/favicon.ico",
"size": 2340
},
"headers": {
"content_length": [
"36132"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 19 Apr 2025 10:56:19 GMT"
],
"server": [
"RemObjects SDK for .NET HTTP Server/5.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:6379",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Honeywell Network Camera"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"redis": {
"arch_bits": "64",
"build_id": "fac228d1928e92e0",
"gcc_version": "4.4.7",
"git_sha1": "00000000",
"info_response": "# Server\r\nredis_version:6.0.15\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:fac228d1928e92e0\r\nredis_mode:standalone\r\nos:Linux 2.6.32-220.7.1.el6.x86_64 x86_64\r\narch_bits:64\r\nmultiplexing_api:epoll\r\ngcc_version:4.4.7\r\nprocess_id:11081\r\nrun_id:d6033ceb5b8637f37df59ae4dfd66d74ce62403d\r\ntcp_port:6379\r\nuptime_in_seconds:13212977\r\nuptime_in_days:152\r\nhz:10\r\nlru_clock:9920119\r\nconfig_file:/etc/redis/redis.conf\r\n\r\n# Clients\r\nconnected_clients:5956\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:0\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:125657656\r\nused_memory_human:119.84M\r\nused_memory_rss:63979520\r\nused_memory_peak:268773944\r\nused_memory_peak_human:256.32M\r\nused_memory_lua:33792\r\nmem_fragmentation_ratio:0.51\r\nmem_allocator:jemalloc-3.6.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:56\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1519869268\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:0\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\naof_last_write_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:41002\r\ntotal_commands_processed:9248144\r\ninstantaneous_ops_per_sec:6\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:2260\r\nevicted_keys:0\r\nkeyspace_hits:232754\r\nkeyspace_misses:207735\r\npubsub_channels:227\r\npubsub_patterns:10\r\nlatest_fork_usec:4200\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:7828.85\r\nused_cpu_user:7642.96\r\nused_cpu_sys_children:31.45\r\nused_cpu_user_children:6.71\r\n\r\n# Keyspace\r\ndb2:keys=27,expires=0,avg_ttl=0\r\n",
"major": 6,
"mem_allocator": "jemalloc-3.6.0",
"minor": 0,
"mode": "standalone",
"nonexistent_response": "OK",
"os": "Linux 2.6.32-220.7.1.el6.x86_64 x86_64",
"patchlevel": 15,
"ping_response": "PONG",
"quit_response": "OK",
"total_commands_processed": 9248144,
"total_connections_received": 41002,
"uptime_in_seconds": 13212977,
"used_memory": 125657656,
"version": "6.0.15"
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "4B8CCB22EEA3EA6D3D5A8C2DA2223D39",
"fingerprint_sha1": "F48EA05C40E10FF77D52A41D4FFCF30A4C28CB14",
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"issuer_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1982914786350820658",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9d714df9dda5edb511dbdbae2d3ee590c96ab5239a7a417089f8592b1e2ac57",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "89638f44ed9d8f425672dfad0a1b1e0a03c318faa0efc0d564e0cb5a385750d4",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-18T14:20:14",
"not_before": "2025-04-18T14:20:14"
},
"version": 2
},
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2020-25097",
"score": 8.6,
"severity": "high"
},
{
"id": "CVE-2021-28116",
"score": 5.3,
"severity": "medium"
},
{
"id": "CVE-2021-28651",
"score": 7.5,
"severity": "high"
}
],
"url": "https://38.54.116.130:6379/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T10:56:45.439Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T17:21:00.071Z"
},
{
"port": 7574,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e3cd6eda3ab89be7f8d9240b25==\" />\n<title>Neptune-v2 Login</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGUzY2Q2ZWRhM2FiODliZTdmOGQ5MjQwYjI1PT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"\"\nSelenium is made possible through the efforts of our open source community, contributions from these\nDashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 1946683414,
"body_sha256": "f73b8e7cacf1e78ad54bc8fdda6d573f4a912cca09aad6cc3f73fdaa4bd23ceb",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 32661,
"favicon": {
"md5_hash": "44071663a97aa46640d124dd31fe7521",
"murmur_hash": 2091717113,
"path": "http://38.54.116.130:7574/favicon.ico",
"size": 7659
},
"headers": {
"content_length": [
"32661"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 08 Apr 2025 23:32:31 GMT"
],
"server": [
"ReeCamIPCamera"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:7574",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Neptune-v2 Login"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "052734B0F311AEB34A2DE946DE604756",
"fingerprint_sha1": "B462939872F9B784139A6D406B72E26ABBD0C33D",
"fingerprint_sha256": "DB05C6C7EAC6464C24F1DDAB1A5B8DA1B0C51B5CF5C9980FD1563D3338F8AA91",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"FM"
],
"domain_component": [
"JT",
"local"
],
"organization": [
"OFWCHVQG"
],
"organizational_unit": [
"DJKPSQR"
]
},
"issuer_dn": "/C=FM/O=OFWCHVQG/CN=localhost/OU=DJKPSQR/DC=JT/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5776656669544237318",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"FM"
],
"domain_component": [
"JT",
"local"
],
"organization": [
"OFWCHVQG"
],
"organizational_unit": [
"DJKPSQR"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=FM/O=OFWCHVQG/CN=localhost/OU=DJKPSQR/DC=JT/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "be0d2ad080dc26789ce9df514d9d6e5fa4868800e57fde0949cc83474dc6bf94",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "97487faaf102045651a1beac7a0c2f2032194c3feda386310b00b7c006f3faa7",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-07T11:02:17",
"not_before": "2025-04-07T11:02:17"
},
"version": 2
},
"fingerprint_sha256": "DB05C6C7EAC6464C24F1DDAB1A5B8DA1B0C51B5CF5C9980FD1563D3338F8AA91",
"precert": false,
"raw": "MIIFozCCA4ugAwIBAgIIUCrOoomTSQYwDQYJKoZIhvcNAQENBQAwcTELMAkGA1UEBhMCRk0xETAPBgNVBAoTCE9GV0NIVlFHMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB0RKS1BTUVIxEjAQBgoJkiaJk/IsZAEZEwJKVDEVMBMGCgmSJomT8ixkARkTBWxvY2FsMB4XDTI1MDQwNzExMDIxN1oXDTM1MDQwNzExMDIxN1owcTELMAkGA1UEBhMCRk0xETAPBgNVBAoTCE9GV0NIVlFHMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB0RKS1BTUVIxEjAQBgoJkiaJk/IsZAEZEwJKVDEVMBMGCgmSJomT8ixkARkTBWxvY2FsMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAx4w4fGdrATrnyZkkOBcSeMppJUeHYiRwNN5BWtD+3oRa5p2J6BkjOJ77eL1j2/0AU5aleUT1x10rMl7Fm+PSh6EQT7Fwgeq3gWFu5Z8REjVuZSiypNm6dFsmsLNX1Z4QYuphxLRBp8w95ZeZ1i7UrX40W+ewUAp54xxZ9+8mDurSj3aTabczpfSSVvLX/n4gLqhSZ69O28gIBTKVGCrN59+XbP/H4xjdBWOIoaDbXu133SWHa3EXtFn48sDy9Xwg5ugsDQ2IUOCIGc9O9TmaMISFLclRx/xzh8UXnWxcCKAawCFdTUJND0rYoK+ocBopnwk/PONm0TdAdVsvfBT3MDlAggXOOVxXnUG4hqVmxoVtcOY35gn+FGHAJuWpIBkgixeJQM237XU8s6TUlCCJjPVkBI+YPKUBMnAHiChUFGgdaGRVBDKMHCxiyHCe/ItUbTCLxcASGCmxSd8p1jLB5A8N7HNYSDgEOWphCbNbPM+jjSIYfVdBp1ZoSIzI5RQw/CSsaQRNqhhDRWNzfuxP3LOMQccujQrtw4uktiY7FB41/9dkDmRiMUpdSwBIyMDLN4x2wrUbk0CODvAlwJFMP54sPPzIDOFgAVjhOFhcD+jvQ4oLWjC0SDMF/ii2hQRLk6AZcx9bl+wLQkhnTPBsHCumVq58Pu44Di3aFYMQ8hsCAwEAAaM/MD0wDgYDVR0PAQH/BAQDAgKEMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBDQUAA4ICAQCqMRkA96OeEgDuBYp6J1UsOijizYwRJ9yN00wZoLn5hYyhrKVMWNiJBE0IryCMtL5tVJd2YXrL0qvPttLvbM7RMACQYJ5U7JFLFW4Icfxets/LIRR0Gz1k1KYk8gGy5KTwyZHUcvu6UX8C0Jh+cL/6HFyzuEbD5aVnAwxMubLnZNO6DbmY7uSxDIy2CclO6AtNGvfWcWrvVY+7SWroIH8+M5crEMsla/frR8r5KcDagOYcp9Y+IwU3eBRDRbJgzjNnh51ub743UMvww5ZlxVMZS0YCHVFZ2P4e1Ro8vsAVHFkfbgFYlMoSrLBZJAoImxEVn/32BksyGli51DDWANZN6eUkQjSVmtFTUMkcRuUDHM6IJU0+kyEk2a6IjpHX3bIDpTRQFSqYnST8vajm6MwyFAr11VKW8IgDcU3T04JUqM+diFBhX/VB6EPysQXjM3cpep0R7RZWuGxTbxJJsxqlUl/dafsx9S1GIUV3oEr2O0fNkeTaf/Xygg1BHds9cL4HRgLzRRQily+WImRMD9HxWkucuc4xxzqdj6XF1KM6iKSPaEP3UC2fIkJfQRh+kbeq1e9X6D8G1hKgm8SA8tWJjjy1XLEV+MvuYmX2N93Or55zBrm5hN18Q5gPABi+bGjd85rZzhBEIY/4+4jA7lDKSagY9JU/exzyfIbKhJZ06w==",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:7574/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-16T05:27:47.926Z"
},
{
"port": 8086,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4ca74c638b98df8ffdf38112003==\" />\n<title>FortiWLM Login</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3bbfc64c5441894bbf3ac3832c35ac8d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2E3NGM2MzhiOThkZjhmZmRmMzgxMTIwMDM9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n <script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 1699601715,
"body_sha256": "9d1a15da1225fcc30a6753d642a6c5e8c267ee1e18d42244bc582391033017ee",
"component": [
"Python",
"Ruby on Rails",
"Ruby",
"WordPress",
"MySQL",
"PHP",
"Django"
],
"content_length": 32414,
"headers": {
"content_length": [
"32414"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 29 Mar 2025 06:05:32 GMT"
],
"server": [
"Linux,STUNNEL/1.0,DIR-850LVer1.06"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:8086",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "FortiWLM Login"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B918356EE48FE323462E0A63CADC7890",
"fingerprint_sha1": "56033FE521EF39B67770C040949232EA75590350",
"fingerprint_sha256": "DF2484CA37F953F4194917F51CC1965D943BD38B32A9B070913ED018ADA8BFFE",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"GA"
],
"domain_component": [
"XUFIFX",
"local"
],
"organization": [
"ZDQUVVMR"
],
"organizational_unit": [
"ZPVZBBX"
]
},
"issuer_dn": "/C=GA/O=ZDQUVVMR/CN=localhost/OU=ZPVZBBX/DC=XUFIFX/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2185375022263622150",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"GA"
],
"domain_component": [
"XUFIFX",
"local"
],
"organization": [
"ZDQUVVMR"
],
"organizational_unit": [
"ZPVZBBX"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=GA/O=ZDQUVVMR/CN=localhost/OU=ZPVZBBX/DC=XUFIFX/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "f2b27e099366a30a0f075a049be68ef9f1dab9feb00c89c85351d29b4b0ec8b6",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "25b6f8ba53249d55f8327ba9dcac1b17da84a6dff3b7695c3cacd9554982c062",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-29T02:29:30",
"not_before": "2025-03-29T02:29:30"
},
"version": 2
},
"fingerprint_sha256": "DF2484CA37F953F4194917F51CC1965D943BD38B32A9B070913ED018ADA8BFFE",
"precert": false,
"raw": "MIIFqzCCA5OgAwIBAgIIHlQDAQ8I2gYwDQYJKoZIhvcNAQENBQAwdTELMAkGA1UEBhMCR0ExETAPBgNVBAoTCFpEUVVWVk1SMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB1pQVlpCQlgxFjAUBgoJkiaJk/IsZAEZEwZYVUZJRlgxFTATBgoJkiaJk/IsZAEZEwVsb2NhbDAeFw0yNTAzMjkwMjI5MzBaFw0zNTAzMjkwMjI5MzBaMHUxCzAJBgNVBAYTAkdBMREwDwYDVQQKEwhaRFFVVlZNUjESMBAGA1UEAxMJbG9jYWxob3N0MRAwDgYDVQQLEwdaUFZaQkJYMRYwFAYKCZImiZPyLGQBGRMGWFVGSUZYMRUwEwYKCZImiZPyLGQBGRMFbG9jYWwwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKFN/GXMMTstekvFiZycF4N39xtivuPC6KvokrCPhO8R1jAqE4hnTslW6MJaWqgCn01/2XV+99/0HdlfRG7K5oGd0sNAKMwvqDXjcUI7PtZdDMHoSbL3ZbwmrHILVGZsy1cj3D4sj2+YUhV/+pDgTzMMxbm+07f5PEq6VDQ6Rfg1WJfwFUSNMQJ9dOwK2pT8YT6n08eNrLlw+1rhTEqiJ3boF4AQb4gfgngY9kIAH4/Not997k7ZYGlKjq9ALjI/FgmDYvMpcN0OepalulnoH9e6GwP5qDZHDoW5/jaroPKKNRkC1BPdiFaqjO9JdFXAozXu2HtIqzcjlcpIv0DMtw4BOjHnMPytnPDAHWaM246P/70yMaqLUFLOtoOZin4n5u7bJ3GOfKNrvhuTrEGOpdP5iIz8b2cdINUseyvLZ2eG40LdfUXtyswMetVzFYbvwUJuLqzXE5TA6Mn3wI7oZ0Yz2FY266iFDnDVV4QLaKKpQ/VSKMyIq5t+ZJgYn8MSLz9ourjhxZuzeDUiJ5+JpVMNnyLFKMgQC+HxOrb4yTUZgj7PBECJYV/DbJIEwtQjNiL7GgBIy6xY2VdgluzE7ulYhMUwm9rNQxmVu8jx2kIFtg0RFH6pvL5GNr+AWkZUOCTFuiEccWewC/DTGN1nOnP+JYEMf4vyHgezMjCGIS7wIDAQABoz8wPTAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQENBQADggIBAH6+2e7GBgbuwPFhK7bGqIjXhgev+FvSNiEg+daTAFWKpCXOuKkJ1r9FHMYf3ElBLptMdaNh5s7Clx0QmgkPYSz9mremT9cz5zt4snJ3BpVmcaxEOmvLp9vOwvC5Q7GL2nr2ytvuf/6sQNjq5Wj4FWKYMOM+kyi100dCgpwp8U9o1MrxG7l6Sfi8iL3m8loG/npQzn7zkTnLaiEsEb4IcgzKb2q04HCDXvoJu03V7RAtMI0sUudCrF7CPAe6qkz2mosJB4yg8N6sDHzSs0a7k2N6eoOiSxBsAiZIoEuDPcT2DRnMrM8eau0u3sbruYgd4WgLoqvseGfFv/SaCanSty7FIdrnOcw/zvI2M8Kw/26PMbQCUyDDu2k0pROZIwHK4W6RfMJPUoiDqxTLRCHF0U/hEj7JKtAwJJa406oZwpsvJoNHYrXcaIK2P/oQmJL2xrbn9mdZ1PbNm1q1FZd09hco2wSQeHpwxnwC6mz5d9yb2VuAUiHQj0Z8iIB/yLOHv0qG8oBKn8+fBgk9jh/sMxacgb9StYKSFhhcZphcFpwfmozVDsSfRjZQjsCr1+2GM3JTYr4CmzaRL9Ysw8wsHljqKEnIsHRhnS1/lVp1HaqMh6TRxbznmpdL0GaduyadshiraE6BG4cU9JiIh7AXU4QhO0BJ5mI+s4UTt3JUW6ex",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:8086/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-17T10:34:28.312Z"
},
{
"port": 8087,
"protocol": "tcp",
"name": "http",
"version": "2.4.25",
"product": "Apache httpd",
"extra_info": "(Raspbian)",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.25",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.25",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4c977c63bb581f8fcdb240c21==\" />\n<title>Device(Vendes salon)</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Yzk3N2M2M2JiNTgxZjhmY2RiMjQwYzIxPT0= </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 1743711732,
"body_sha256": "789f10dfb13b004b2288bb1100a042995238c8afa0b47140dd887b14a8d2f831",
"component": [
"PHP",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"WordPress",
"MySQL"
],
"content_length": 36087,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://38.54.116.130:8087/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"36087"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 17 Apr 2025 02:47:22 GMT"
],
"server": [
"Innbox_webserv"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:8087",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Device(Vendes salon)"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FFEC6DA06FF36D1109F7A810B95837C4",
"fingerprint_sha1": "1C7EFD4DBBEC07567EA5D989C6DE121D59551847",
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"issuer_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5145723181762935798",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "634ae9f2b5e49ab06bbd5772cadcf2ac5eca96196a3ffe4ca0190aba4b0fd531",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhiYTkwNDg4OTRmNDNkOWY4Njc5ZTUxMDlhNTk2OTJkMDI5YTliZDYwYjFiY2U2MWE2MzBkZjRjZjdlMTM2MGYwMWU4YmM1MGExMGFhZDhhOWNhYzdjMTIyNDE3YTE1OWRkMWNjNzRiOGI1MTA0Mzc2YTFkYTUxZWVhZTMxNzRkYWQ0MzUwYzVlNzMxNTkyYjZkYWMzZWQwN2MzNjRjZmI3YmE4ZjJhZWUwMTk1YzQxYTVlMzFjYjU2OWJiMmI0OWZlNGExYmU3NGYwYmJjZDQ3MWIyNTQwYjRlZjVlMDJmZWE3NWViM2JmZjBlNjQyMWM1NDNhNTJkZDZjZWUxNWI4MTk0MmQxYWIyZWI0Mjc5ZjY5Yzk5YWJkMDdkZmE1MmYxODljY2QxYjU4MzIyNDAyYjlhM2NiMzc5ZTE5ZGM3NmNiZTM4ZjhkYzFkMWYyNzZiMTIwZjIzODhjM2Q2OTI1MTVjMDRmOGY5M2ViZTgzZjVmNGQ0NDI1YjU0NWI3Y2QxODI1ZmY4NWYxM2FiMWE0MTYzZTMxM2RlM2MyYjYyYmM1ODI3ZDNkZGU0ZmRhM2Y5M2Q1MGZmYWI5NjRmZjFhN2E5ZGRlZTU2OWJjZDFiMWM4YjExYTM2Y2NmMWEyMjM2ZjQ5YTFmY2FlOGIxNWNhNzNiNDE4ZGZjYTFhOWZlN2NiYjYzOGE3MjZiMjBhODdjYzM4NmUyODI1ZmEwMDY3ZmM5ODc0ODZkMmFkNDczNmYwOTdmNzZjNDg3NGRiNGEzZDlmZTgwODQ1YmNlMjc0MzBkNjAxZWFlYWVkNjZjZmY5NGRiMDE3YTNlMzRkOWRlYzI1ODZjNWM2ZmQyNDk3MzMwZDc3NGZmZGJmMDFlMDg2MDYwOTU4ZWViODMwZTk2N2VkMDY1NDQwYzYyOWI5NjNkNDVmYmFjODIxMjAyYmVkMzM1YjNjZjA4ZWEwNzY2MjRkOTEwYWRlNTg2YjY2Mzg0M2ZjMjg2ZDY4ZmZlMTIzMjhmNTg5NDEyZjU0NzYzNTA3YmFiZjUyODgwZjllMDQwNmQ1OTZjNjgyYzllZDhkZTJkMTBmNTNhNThlYzI1YzA4ZWU5MDcwZDUyMzY2ZjNlMDI0MTM0NWU3ZmY1YjcwMzQwZTI5ZDIwMmMyZDQ5ZWI2ZmI3ODEzYjZhYTYzYmQ5YzgzMTY2NWU2M2JjMjc4ZDFhYTAwMDVlODczZTE0MzU1ZjZlYWZkNzU3M2ExZGZhZTM2ZDkxODM1M2Y3YjdjNGZkZjlmOTg3YTBkYTkyMzUyMGU1M2I0ZjE3ZDQ4NjdlN2Y0N2U5YjQ1ODUxZmU2NzE2ODIxYmQ4NjM0NTkyODVjMDljMWYzMzNjOTA3"
}
},
"tbs_fingerprint": "96003e4b54c707f7cc2ff692ae2a10fdda2f3d97be150186790faa5b4ae0eba3",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-02T12:12:27",
"not_before": "2025-04-02T12:12:27"
},
"version": 2
},
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2006-20001",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2017-15710",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2017-15715",
"score": 8.1,
"severity": "high"
}
],
"url": "https://38.54.116.130:8087/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-17T02:47:25.278Z"
},
{
"port": 8500,
"protocol": "tcp",
"name": "http",
"version": "1.12",
"product": "Medusa httpd",
"extra_info": "Supervisor process manager",
"tunnel": "",
"modules": {
"consul": {
"build_date": "2024-10-14T20:52:01Z",
"datacenter": "dc1",
"node_id": "e5ad94e9-c381-5717-4b0c-2166fc0bb30b",
"node_name": "lvmkl",
"primary_datacenter": "dc1",
"revision": "cddc6181",
"server": true,
"version": "1.20.0"
},
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc71c639b89be4fed8240e2006==\" />\n<title>SoftEther VPN Server</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3bbfc64c5441894bbf3ac3832c35ac8d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3MWM2MzliODliZTRmZWQ4MjQwZTIwMDY9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -554801196,
"body_sha256": "46b4b3569ef57df7f0eefeadf647d50399fcfbef74dfeb42730db66fecdc96f4",
"component": [
"Ruby",
"WordPress",
"MySQL",
"PHP",
"Django",
"Python",
"Ruby on Rails"
],
"content_length": 32367,
"headers": {
"content_length": [
"32367"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 23 Mar 2025 11:31:50 GMT"
],
"server": [
"Linux, HTTP/1.1, DIR-850L Ver 1.13"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:8500",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "SoftEther VPN Server"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "885A5990D0219407B0985E54F86A3AD2",
"fingerprint_sha1": "FFC8D7B73E2703122E73157BC60C777BF6917485",
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"issuer_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4943393435217780126",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"LC"
],
"domain_component": [
"DCFVGRH",
"local"
],
"organization": [
"AVULRYQG"
],
"organizational_unit": [
"FVTBFIO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=LC/O=AVULRYQG/CN=localhost/OU=FVTBFIO/DC=DCFVGRH/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "39598d4bee41caf5392e27ea56777c5dc0d4211fef219b1260905d6c40fdd928",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "3cdea19c11fc66d95eb4bc2403a5aa7e4083cfaf3fc4c32aff702cf739029444",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-19T09:16:12",
"not_before": "2025-03-19T09:16:12"
},
"version": 2
},
"fingerprint_sha256": "1F5368EADC9C95BE8EF8C84F210938BEABA197408F6EA651A391321CECBDC773",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:8500/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T17:24:48.15Z"
},
{
"port": 8883,
"protocol": "tcp",
"name": "mqtt",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T08:26:15.137Z"
},
{
"port": 8983,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc77c63bba87f8ffd833112100e3==\" />\n<title>维盟(WayOS)智能路由管理系统 www.wayos.com</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3N2M2M2JiYTg3ZjhmZmQ4MzMxMTIxMDBlMz09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1250964321,
"body_sha256": "7e917d8f306bb7052042c04946f8786bd9f8413339ae2221d12e409b9559e39c",
"component": [
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"Django",
"Python"
],
"content_length": 35913,
"favicon": {
"md5_hash": "2981503b195488ac17d05dcf18615cd1",
"murmur_hash": -1439222863,
"path": "http://38.54.116.130:8983/favicon.ico",
"size": 1150
},
"headers": {
"content_length": [
"35913"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 13 Apr 2025 18:52:07 GMT"
],
"server": [
"Http Server"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:8983",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "维盟(WayOS)智能路由管理系统 www.wayos.com"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhkMmMyZmNlMTZlODNlYzU3ZDkyN2VmNjk2MGY0OWRkYzI3ZjkxNjRmNmRlNmRiNDhlZGZhYTUxOTk3MjBhOWExYTQ1ZDZiMWQ0YTE3NjMzMDYwYzBmYzc3NDMwZWIwOGIyMDc4ZTVmYjI5NWNhODgyNWFkYzhlOGFhODYxOGQ2N2Y2MDRmYjgxMzg2YjBhMGY5Zjg3NGJlMGY0MmZjMjQxMDZiZjM5YTIxYjYzNmRjYTIxOTVlNzdlZTEzYmIxOTFjMTI2OWU5OGUyY2E3ZGY4NjlmZTI5NmExYzEyOTJhMGVjMmU2ZGY0YmUxMmIwZGMzZDA0ZTE5Yjk3YWRhZThiMDM1ODMzMjUxMWUzMjA4N2MzMjQyYjBhNjcxNWNkNjAyZTZkZjkwNjFlZmZhY2UzODI2ODNjYjAwNzE3MDgwNTI4YWRlZDNjYTU3ZTgxNmUzOGZkMjQ5ZmFjNjk3ZmFhNWFiNGE3ZmQ0ODBhMDA5MDVlZWYzYzQzOGNiZTc1NmExM2Y3YTBjYzAxY2Y1NjlhOGM0NTM0NDg1OTI4OTcwYjczNzkzOGQ3YjRkMGYxYTBlYmI2NmM2ODI0ZmE1NmM3YjExYWJkZWZkMTJiM2MxN2U0NGRjNTU3ZWI3MDJjYzk0NTBmN2U0NDY3MzdlZjViMjUwNGFjYWRlMDQ0NDQ1M2Q2ODZkYmQ4MDRmNGFlZDllZGFmOWViNTYxNzViY2Y5MDk2YmJmZjQxYmNiMTQ4MTVkYTFkNWRlZTRmMDhhNWFiMjIzZWY0YmYyZDhiNzE2MzJlNzE4ZTU3ZWExMjcyN2JlMDJhNGE5ZDBjODVkMmI3OTM4Nzc4OWQ5NDliMWQ0YTJhN2ZmNDc1MTUwMTg2NmMxMzE5OTk3ZDJkODBhYzJlY2JiYzI2ZGRjZTgxNTQ5NGVkN2ExMGFlZGI4NWM3YmFiMmRkNjZjNjhlZGJjYjNhNTM2NmQ2Yjk3NTBhZTdiZGI0ZTY1ZmU5N2ViM2Q3MzIxODA2NjA1YmRkMDZkZDExMWMyMWEyN2U3MzVmOWVlZGY4MmQwZjBjNzc2OGNiMGYwNjk1MDJlMzFkZTAyNGFhODI3ODYzZGViZGU1NWYzMzM5ODExOTBmMDYwZDgwZjg4MTY1NmM3YzkzZTk0OTZjYTFmYzY4NDk0Njc1ZGEzMTFkODk4YjFkMmY1MGVlNGMzMTQzOWY2MzBlYWZkZDc2ZDVhOTYyYzIwMzIyYWQxNGIwODJmZTQ3ZWU5NDU4NjZjN2Q2ZWU3ZjE4N2I3OTY5NTc4NWQ5NjYyOGU0YmNjNjg0ODFiNWQ2YjVhNjdiNGQ1YjgyMDBkYjI4MzIxMTY1MWFmYTRiNmY5MDBhOGNm"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:8983/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T19:30:11.117Z"
},
{
"port": 9042,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "(Unix) mod_ssl/2.2.0 OpenSSL/0.9.7g PHP/5.1.1",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.2.0",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.2\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4ca74c638b98df8fdd5240e2505==\" />\n<title>WIFISKY 7层流控路由器</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2E3NGM2MzhiOThkZjhmZGQ1MjQwZTI1MDU9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntext ml10 mr20\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1031900441,
"body_sha256": "89ffe53b6066925c967b3bd291c95486cbcb6ca7b2530c930b8bd920706e17de",
"component": [
"MySQL",
"PHP",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"WordPress"
],
"content_length": 36115,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://38.54.116.130:9042/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"36115"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 17 Apr 2025 12:33:46 GMT"
],
"server": [
"Aterm(HT)/1.0.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:9042",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "WIFISKY 7层流控路由器"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "1113CB52230B62745F38CCE06B1ACB62",
"fingerprint_sha1": "493451AD2E8D03C7CCEFFBF8AB17E40500B4492F",
"fingerprint_sha256": "C1E603320D49DC2A086A31620FC6D6DE5C6824D70729CECCA38ECE88FA9CA0CF",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"UA"
],
"domain_component": [
"GHF",
"local"
],
"organization": [
"THXVEHXR"
],
"organizational_unit": [
"XZRHZFJ"
]
},
"issuer_dn": "/C=UA/O=THXVEHXR/CN=localhost/OU=XZRHZFJ/DC=GHF/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3690314700898731874",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"UA"
],
"domain_component": [
"GHF",
"local"
],
"organization": [
"THXVEHXR"
],
"organizational_unit": [
"XZRHZFJ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=UA/O=THXVEHXR/CN=localhost/OU=XZRHZFJ/DC=GHF/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "ebf964cd7ef207537f5743383dbcb10f648d7bfe95337792b49996404b085fc3",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "8aa8f920eb68518c51e90cf919c578c4077951699a9bfd84af0f0552a39a38f8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-16T05:09:22",
"not_before": "2025-04-16T05:09:22"
},
"version": 2
},
"fingerprint_sha256": "C1E603320D49DC2A086A31620FC6D6DE5C6824D70729CECCA38ECE88FA9CA0CF",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2006-20001",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2006-3747",
"score": 7.6,
"severity": "high"
},
{
"id": "CVE-2006-5752",
"score": 4.3,
"severity": "medium"
}
],
"url": "https://38.54.116.130:9042/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-17T12:34:10.706Z"
},
{
"port": 9092,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e7ca79c639b59be7f7db240e2505==\" />\n<title>SSID</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU3Y2E3OWM2MzliNTliZTdmN2RiMjQwZTI1MDU9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n <script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 314155693,
"body_sha256": "281208ffe16a9a146706a5a2beef5872adcda0293e8d1555f7185cf6ee5e52f2",
"component": [
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"gunicorn:19.9.0",
"Python",
"Django"
],
"content_length": 32404,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://38.54.116.130:9092/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"32404"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 01 Apr 2025 10:29:59 GMT"
],
"server": [
"gunicorn/19.9.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:9092",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "SSID"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "715C19DA33A6431DE8C11DCD4E2A2E9B",
"fingerprint_sha1": "6E71A2E7CDCC9D263CA046CB94F364C60240A345",
"fingerprint_sha256": "5D20D3C17F6F6C43D5A6488E20E353CF6E41E278B8F0F1D97CA4FC63C1AE5D79",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"BY"
],
"domain_component": [
"BSQSHS",
"local"
],
"organization": [
"KIGWBQIW"
],
"organizational_unit": [
"YDLJSUP"
]
},
"issuer_dn": "/C=BY/O=KIGWBQIW/CN=localhost/OU=YDLJSUP/DC=BSQSHS/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "3659724296823289758",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"BY"
],
"domain_component": [
"BSQSHS",
"local"
],
"organization": [
"KIGWBQIW"
],
"organizational_unit": [
"YDLJSUP"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=BY/O=KIGWBQIW/CN=localhost/OU=YDLJSUP/DC=BSQSHS/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e7249379680ceb0f9d148910ea9093f1529748abc2c3bbbebe1eb93d28607038",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "e864fe5f8154b1af7e6c8a8068e84ed0a69fb0acee33332a1380fd4ce1eccb3e",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-03-31T03:21:55",
"not_before": "2025-03-31T03:21:55"
},
"version": 2
},
"fingerprint_sha256": "5D20D3C17F6F6C43D5A6488E20E353CF6E41E278B8F0F1D97CA4FC63C1AE5D79",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:9092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T08:22:21.087Z"
},
{
"port": 9093,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf77c638be85f8f6dd240d2105==\" />\n<title>Welcome to Keycloak</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3N2M2MzhiZTg1ZjhmNmRkMjQwZDIxMDU9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -2073656054,
"body_sha256": "d62611bdf9bad5af583abbcf12a7ff3b979fd884d5298fa41a0ace1a6ce9c19c",
"component": [
"Resin",
"Java",
"WordPress",
"PHP",
"Python",
"Ruby",
"MySQL",
"Django",
"Ruby on Rails"
],
"content_length": 36047,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://38.54.116.130:9093/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"36047"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 14 Apr 2025 16:45:22 GMT"
],
"server": [
"Resin/4.0.58"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:9093",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to Keycloak"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "MGRiMDY5NTQ5YjJiNTkyODAzODA0MGVkOTE1ZGIwZDljZjZmMjU3MzA3ZmE1YjgyYjY3M2RlNTNjYjAyNzM2YTIzYjU5ODg0YWU5YjVlZmI5NWVkOWI4OGE0NThkNjRjYjdjYzhkNDE1MGMyZTM4ZTdmN2FmNjM0ZDkwYjJkZDViZjU3MjM0NzZlNzkwOGY2MDVmYzc0ZDAyODgwNDcxOTZlYjM1NmI1ZjQ1MDgxMTQ0MmIzNzk1OTVlYTRmMzgzM2QxZDk5OGNhMjVhODhiMDQyMmUwN2U3OTMwYjRmYzMwODZiMDIxM2NmNDFiNDgyMzNiOWMyYjk2OGYzMTBjYjMxMzM3NTRjNDBmOGMwYjRmNmIxNGYzMWRhZjljZTBkMTRjN2Y4NzkyMTBmNjc1NGY5NDg3MGQ3MWViZDE3YzkwZTAwZjQ5MDQ4OTZmODljNDVlZTRlNTM1ZjNlNjJhYjQ4MzIzZTYxZjEwODEzZTM1YjJhOGI1MjcyMzRmM2JiOTI4Y2ViYjljOTZhZTQ5YTdhNTI2MWUzYzgyMmY3ODc0NjIyNjI2ZWVjMGMyOGI0ZGVjOGFmNzg4YTNhMmQ2OGQ2MDFlODI2OTQxYjljNzlkY2Y3YmQ4YzM3YzM2MWU1NmM2MDU4ZGM1ZmZmYjkxY2I1ZWEwMTliZGRlYTk3NGEzMDE3ZTkzNDRjZmQ1OTUzZWFkMjgxNjc0MTUwMzRkNzFmNzExMGY2N2E1MjA4OWU4NDgzNmY3ODQwNjY5MjcyZTllOTYyOTcxMDExZjgwYjkyZmU5YzhjYTdkZTc2ZmY5MTU2NTQ5ZWQ3MmFiNDdlOGY5MWE3NDliYmY4Y2M5MjEwMTZhOTNjNTQ3NDgxYmIxYTg3MGI0NTc4NWYwYjc4OTJkYTI1NjhlYmNiMWRmNjFhM2I1YmFiNDYzODQzZjQ5ZWYxMWNmMTFiYjU0ODIyMDdkMjMwZThmZGRlNDBmYTFlYjcxNTcyYjNiZGMxZDFhMzg1N2FjZTRjZmU1MGEzZGUzY2ZhMjAxMDIxYzg5NGI5MjhhOTY0ZjE2OWVhNGIxZjBiOGRkMTg2OGM2MzBjOTc2YmMwZjcyZTAxZGUyZjM4MzM3MmZlYjAwMjQxZTkyNzg1ZDA3MmRiN2JhNTMyMWUxN2JhMzg5MDFiNWJiMzVlMWUzNWE0YzQ3Zjc4MTFhMTQ4ZGFkZTczZWM1NDA5OTQ2YTdhYzJkZDM2YzE3NTQxYmQxNzY1Y2RiZWRhNTg0OGEyODMwYTdmMGEzZDcxNGEyZGJmZmFlZGRmMzkzZjMxM2EzYzI5ZWQ0MmM4OTVlYmUwZWEzNjgxNjc1NDljMmQxOGFkNDE1NjhiYzk0OA=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:9093/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T01:08:33.266Z"
},
{
"port": 9200,
"protocol": "tcp",
"name": "http-proxy",
"version": "",
"product": "Apache Traffic Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:traffic_server",
"part": "a",
"vendor": "apache",
"product": "traffic_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:vmware:ESXi:6.5.0",
"part": "o",
"vendor": "vmware",
"product": "esxi",
"version": "6\\.5\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"elasticsearch": {
"index": [
{
"count": "16051803",
"name": "logs-2024",
"size": "4.9gb"
},
{
"count": "10248228",
"name": "logs-2023",
"size": "3.2gb"
},
{
"count": "4629250332",
"name": "data-2024",
"size": "6.4tb"
}
],
"info": {
"cluster_name": "elasticsearch",
"cluster_uuid": "",
"name": "Blob",
"tagline": "You Know, for Search",
"version": {
"build_hash": "05d4530971ef0ea46d0f4fa6ee64dbc8df659682",
"lucene_version": "4.10.4",
"number": "1.7.3"
}
}
},
"http": {
"body": "{\n\"status\" : 200,\n\"name\" : \"Blob\",\n\"cluster_name\" : \"elasticsearch\",\n\"version\" : {\n \"number\" : \"1.7.3\",\n \"build_hash\" : \"05d4530971ef0ea46d0f4fa6ee64dbc8df659682\",\n \"build_timestamp\" : \"2015-10-15T09:14:17Z\",\n \"build_snapshot\" : \"false\",\n \"lucene_version\" : \"4.10.4\"\n},\n\"tagline\" : \"You Know, for Search\"\n}",
"body_murmur": 1589257397,
"body_sha256": "3db479be0c09198605e2f8c1cc34676a4954f80aacfd0c0a21aea11ef115e847",
"content_length": 316,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://38.54.116.130:9200/favicon.ico",
"size": 3774
},
"headers": {
"accept_ranges": [
"bytes"
],
"content_disposition": [
"Content-Disposition"
],
"content_length": [
"316"
],
"content_type": [
"application/json"
],
"date": [
"Sat, 19 Apr 2025 08:16:46 GMT"
],
"pragma": [
"private"
],
"server": [
"udpxy 1.0-23.10 (prod) standard [Linux 3.18.67 x86_64]"
],
"set_cookie": [
"SESSID=da122263a2bd; webvpnLang=webvpnLang"
],
"unknown": [
{
"key": "x_cache",
"value": [
"MISS from Hello"
]
},
{
"key": "x_generator",
"value": [
"Drupal 8 (https://www.drupal.org)"
]
},
{
"key": "x_cache_lookup",
"value": [
"MISS from Hello:8080"
]
},
{
"key": "x_drupal_cache",
"value": [
"xHIT"
]
},
{
"key": "x_jenkins_session",
"value": [
"f72d6619"
]
},
{
"key": "x_content_powered_by",
"value": [
"K2 v2.8.0 (by JoomlaWor"
]
},
{
"key": "x_drupal_dynamic_cache",
"value": [
"MISS"
]
},
{
"key": "x_jenkins",
"value": [
"2.121.3"
]
}
],
"x_powered_by": [
"PHP/4.6.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:9200",
"path": "",
"scheme": "http"
}
},
"status_code": 200
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "4B8CCB22EEA3EA6D3D5A8C2DA2223D39",
"fingerprint_sha1": "F48EA05C40E10FF77D52A41D4FFCF30A4C28CB14",
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"issuer_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1982914786350820658",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9d714df9dda5edb511dbdbae2d3ee590c96ab5239a7a417089f8592b1e2ac57",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "89638f44ed9d8f425672dfad0a1b1e0a03c318faa0efc0d564e0cb5a385750d4",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-18T14:20:14",
"not_before": "2025-04-18T14:20:14"
},
"version": 2
},
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2022-31681",
"score": 6.5,
"severity": "medium"
},
{
"id": "CVE-2023-29552",
"score": 7.5,
"severity": "high"
}
],
"url": "https://38.54.116.130:9200/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T08:17:13.073Z"
},
{
"port": 10250,
"protocol": "tcp",
"name": "http",
"version": "8.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:8.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "8\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c632b49be7f6c2390b==\" />\n<title>BAS2Web</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzJiNDliZTdmNmMyMzkwYj09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"DVR\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1440564059,
"body_sha256": "5ae3d5226d974b3acce8ab8ac59a497bde8a4f4762e2965273a4659dd80bc6a2",
"component": [
"Ruby",
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails"
],
"content_length": 36023,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://38.54.116.130:10250/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"36023"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 15 Apr 2025 07:56:42 GMT"
],
"server": [
"LOVE"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:10250",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "BAS2Web"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "MIIFpTCCA42gAwIBAgIIctAzXkhaXkAwDQYJKoZIhvcNAQENBQAwcjELMAkGA1UEBhMCU0gxETAPBgNVBAoTCE5EQVJaRkhDMRIwEAYDVQQDEwlsb2NhbGhvc3QxEDAOBgNVBAsTB0laSU1XR08xEzARBgoJkiaJk/IsZAEZEwNIUEQxFTATBgoJkiaJk/IsZAEZEwVsb2NhbDAeFw0yNTA0MTMxMjMwMDBaFw0zNTA0MTMxMjMwMDBaMHIxCzAJBgNVBAYTAlNIMREwDwYDVQQKEwhOREFSWkZIQzESMBAGA1UEAxMJbG9jYWxob3N0MRAwDgYDVQQLEwdJWklNV0dPMRMwEQYKCZImiZPyLGQBGRMDSFBEMRUwEwYKCZImiZPyLGQBGRMFbG9jYWwwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDSwvzhboPsV9kn72lg9J3cJ/kWT23m20jt+qUZlyCpoaRdax1KF2MwYMD8d0MOsIsgeOX7KVyoglrcjoqoYY1n9gT7gThrCg+fh0vg9C/CQQa/OaIbY23KIZXnfuE7sZHBJp6Y4sp9+Gn+KWocEpKg7C5t9L4SsNw9BOGbl62uiwNYMyUR4yCHwyQrCmcVzWAubfkGHv+s44JoPLAHFwgFKK3tPKV+gW44/SSfrGl/qlq0p/1ICgCQXu88Q4y+dWoT96DMAc9WmoxFNEhZKJcLc3k417TQ8aDrtmxoJPpWx7Eave/RKzwX5E3FV+twLMlFD35EZzfvWyUErK3gRERT1obb2AT0rtntr561YXW8+Qlrv/QbyxSBXaHV3uTwilqyI+9L8ti3FjLnGOV+oScnvgKkqdDIXSt5OHeJ2Umx1KKn/0dRUBhmwTGZl9LYCsLsu8Jt3OgVSU7XoQrtuFx7qy3WbGjtvLOlNm1rl1Cue9tOZf6X6z1zIYBmBb3QbdERwhon5zX57t+C0PDHdoyw8GlQLjHeAkqoJ4Y9695V8zOYEZDwYNgPiBZWx8k+lJbKH8aElGddoxHYmLHS9Q7kwxQ59jDq/ddtWpYsIDIq0UsIL+R+6UWGbH1u5/GHt5aVeF2WYo5LzGhIG11rWme01bggDbKDIRZRr6S2+QCozwIDAQABoz8wPTAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQENBQADggIBAA2waVSbK1koA4BA7ZFdsNnPbyVzB/pbgrZz3lPLAnNqI7WYhK6bXvuV7ZuIpFjWTLfMjUFQwuOOf3r2NNkLLdW/VyNHbnkI9gX8dNAogEcZbrNWtfRQgRRCs3lZXqTzgz0dmYyiWoiwQi4H55MLT8MIawITz0G0gjO5wrlo8xDLMTN1TED4wLT2sU8x2vnODRTH+HkhD2dU+Uhw1x69F8kOAPSQSJb4nEXuTlNfPmKrSDI+YfEIE+NbKotScjTzu5KM67nJauSaelJh48gi94dGImJu7AwotN7Ir3iKOi1o1gHoJpQbnHnc972MN8Nh5WxgWNxf/7kcteoBm93ql0owF+k0TP1ZU+rSgWdBUDTXH3EQ9npSCJ6Eg294QGaScunpYpcQEfgLkv6cjKfedv+RVlSe1yq0fo+Rp0m7+MySEBapPFR0gbsahwtFeF8LeJLaJWjryx32Gjtbq0Y4Q/Se8RzxG7VIIgfSMOj93kD6HrcVcrO9wdGjhXrOTP5Qo948+iAQIciUuSipZPFp6ksfC43RhoxjDJdrwPcuAd4vODNy/rACQeknhdBy23ulMh4XujiQG1uzXh41pMR/eBGhSNrec+xUCZRqesLdNsF1Qb0XZc2+2lhIooMKfwo9cUotv/rt3zk/MTo8Ke1CyJXr4Oo2gWdUnC0YrUFWi8lI",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2014-4078",
"score": 5.1,
"severity": "medium"
}
],
"url": "https://38.54.116.130:10250/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T07:56:45.873Z"
},
{
"port": 11211,
"protocol": "tcp",
"name": "http",
"version": "9.3.5.v20151012",
"product": "Jetty",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mortbay:jetty:9.3.5.v20151012",
"part": "a",
"vendor": "mortbay",
"product": "jetty",
"version": "9\\.3\\.5\\.v20151012",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4c977c63bb581f8ffdf3f112a0a==\" />\n<title>Kodbox - - Powered by kodbox</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Yzk3N2M2M2JiNTgxZjhmZmRmM2YxMTJhMGE9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ncalling init: /lib/\ntext ml10 mr20\n353034323836\nwww-data\nCacti CHANGELOG 1.2.26\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1124379945,
"body_sha256": "afc18f37a3c234a2cf64eeadcc395d021f1cb5fd03fa43aafb363c1715ffe731",
"component": [
"Ruby",
"WordPress",
"MySQL",
"PHP",
"Django",
"Python",
"Ruby on Rails"
],
"content_length": 36136,
"favicon": {
"md5_hash": "49a709193b56e4b0e4e8d0fabfc6311e",
"murmur_hash": -299287097,
"path": "http://38.54.116.130:11211/favicon.ico",
"size": 238
},
"headers": {
"content_length": [
"36136"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 18 Apr 2025 20:43:06 GMT"
],
"server": [
"CJServer/1.1"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:11211",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Kodbox - - Powered by kodbox"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"memcached": {
"settings": {
"accepting_conns": "1",
"auth_cmds": "0",
"auth_errors": "0",
"bytes": "29828",
"bytes_read": "286857265",
"bytes_written": "129670828957",
"cas_badval": "0",
"cas_hits": "0",
"cas_misses": "0",
"cmd_flush": "3",
"cmd_get": "22076096",
"cmd_set": "21",
"cmd_touch": "0",
"conn_yields": "0",
"connection_structures": "55",
"curr_connections": "8",
"curr_items": "5",
"decr_hits": "0",
"decr_misses": "0",
"delete_hits": "0",
"delete_misses": "0",
"evicted_unfetched": "0",
"evictions": "0",
"expired_unfetched": "0",
"get_hits": "22076066",
"get_misses": "30",
"hash_bytes": "524288",
"hash_power_level": "16",
"incr_hits": "0",
"incr_misses": "0",
"libevent": "2.0.16-stable",
"limit_maxbytes": "67108864",
"listen_disabled_num": "0",
"pid": "2080",
"pointer_size": "64",
"reclaimed": "3",
"reserved_fds": "20",
"rusage_system": "1839.982991",
"rusage_user": "371.247201",
"threads": "4",
"time": "1520550684",
"total_connections": "5547233",
"total_items": "21",
"touch_hits": "0",
"touch_misses": "0",
"uptime": "3151236",
"version": "1.4.13"
},
"stats": {
"accepting_conns": "1",
"auth_cmds": "0",
"auth_errors": "0",
"bytes": "29828",
"bytes_read": "286857265",
"bytes_written": "129670828957",
"cas_badval": "0",
"cas_hits": "0",
"cas_misses": "0",
"cmd_flush": "3",
"cmd_get": "22076096",
"cmd_set": "21",
"cmd_touch": "0",
"conn_yields": "0",
"connection_structures": "55",
"curr_connections": "8",
"curr_items": "5",
"decr_hits": "0",
"decr_misses": "0",
"delete_hits": "0",
"delete_misses": "0",
"evicted_unfetched": "0",
"evictions": "0",
"expired_unfetched": "0",
"get_hits": "22076066",
"get_misses": "30",
"hash_bytes": "524288",
"hash_power_level": "16",
"incr_hits": "0",
"incr_misses": "0",
"libevent": "2.0.16-stable",
"limit_maxbytes": "67108864",
"listen_disabled_num": "0",
"pid": "2080",
"pointer_size": "64",
"reclaimed": "3",
"reserved_fds": "20",
"rusage_system": "1839.982991",
"rusage_user": "371.247201",
"threads": "4",
"time": "1520550684",
"total_connections": "5547233",
"total_items": "21",
"touch_hits": "0",
"touch_misses": "0",
"uptime": "3151236",
"version": "1.4.13"
}
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "4B8CCB22EEA3EA6D3D5A8C2DA2223D39",
"fingerprint_sha1": "F48EA05C40E10FF77D52A41D4FFCF30A4C28CB14",
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"issuer_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1982914786350820658",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AI"
],
"domain_component": [
"BAQCNV",
"local"
],
"organization": [
"ADCDVMIC"
],
"organizational_unit": [
"QZMBNLC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AI/O=ADCDVMIC/CN=localhost/OU=QZMBNLC/DC=BAQCNV/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9d714df9dda5edb511dbdbae2d3ee590c96ab5239a7a417089f8592b1e2ac57",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhjYTVlOWE1ZmI4M2MyMTY1ZDljOTIzMWZkYzk0NWNhOWE3YTUwNmVmMmRkOTQ0NmQzMTU3Yjk2NzAzMTNjMzMxY2VhNTQ0N2ZhMDI1MTI5MDIwMGRhYjQ0YzRjMTNlNDA1NTE4ZWQzZDZiYmQ0YTM0ZmFiZGE2MDk1MjY1ZTI4YTgwYTU0Yjg3NDlhZDAyMmJjY2I2Njc4MjhkZTNlNDQ5MmRiZWE2OTcyZDMxNmZjODdiMGE0MjI4NTEyZDkzOGU2N2U3Njg4YjcyYWFhMzE2ZGE1Mzg2YjdhOWI3NDdkNzY3NzgyODc3NDY1YTE4MzBjZDdjZjgzOTQ4OTI1ODZkYzQ2MzljMzAzZjEyOWUzYjRjMDRlNWUyZWYzOTZjNWE0Y2ZjMzY0ZTU1OGRkMWY1MjhlOTYzNWU1YmI2YjE5NGJlMmVlYmZlZWQ4YWJjOGUxZGY2M2I2N2ZiZmMyNzZjOGMwM2ViODc3YTRhY2JjZDZiZDEwNDM5MzE5OGNjNGVkYjA5YTcwYTgwNTRjZDhlYWYwNzNiODA0YTkzMzM0ZDNkOWE5NTk4ZjRhNDkxNTkzMTBjOGY1ZGY0N2UwNjgzMzI4MGQ1NTJkNGE0NjkyNDI2ODczODA2OTU4NDMyZGE1OTA4ZTIzMjQ0Nzk5YWU4ZGZlYzBjYzg5MGUyZjkzY2I2YmI5M2FmYzg1ZWY1ZDFmYjg4M2I1MGFjNTkwNmI3MWJiYzRmYzhkZmQwNTQxMzg3YmUzOTc0YjQwYWFmOGYzMGU1NzQ2Njk5ZDljNmMyNmU4MDJlMzY4ODhjNDRiNDlhMzVlOTcyOTU3OTlkNjNmOGI0MzI3YTdlMTI5ZjE2OGMyNmFkNDk5Yjc4MjgzZmQ4MGM5ODkxZTRlODhiZTU0ZTBhZDMxZWFmOWYyNDlmNjYyNjc2ZDhmNjRkY2QwZjUwODYxMTAzYjFjYzMyNzVjMTZlOGMwNGUyMjJiZDI2MDY3ODJmMDA1OWYyNzMyM2FlZDk0ODAwZTZmYzk2OGIxNzc0Y2JhYTc0ODg3ZWE0NzE5MTEyNDQxZGEyOGI4ZmY4MTJhMGE4ZmE3MjM1MTA0MTczNDBhZGU5MzU3NzUwZTgxNGEwZTE4NTdhYzYyYWQ3ZTFlMTdlZmY3YTM4NWUzNGI0YTZiNjQwODgwYjU1ODM4ZTViMGI4ZDNjYWRkMDk1ZDQ2ZWU2MDU4NWZlMGRmNDI4YTNlZDA2Zjk1ODlhY2UyODlkODVhMTQxZWEyYmI4MTQ4NTAyM2I1OWVmMDlmNGE1YTY1ZmU1YTZhODE5YzI0MmE0MjczYzA3ZWNjMjk0ZmI1NjAwYTk4MzZkNDliOTdlODJmYWNkYzBjYjJm"
}
},
"tbs_fingerprint": "89638f44ed9d8f425672dfad0a1b1e0a03c318faa0efc0d564e0cb5a385750d4",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-18T14:20:14",
"not_before": "2025-04-18T14:20:14"
},
"version": 2
},
"fingerprint_sha256": "801E021F0343116A1801086FC51AE1FD8DEE43E6E5D26F6E257393049D4AEE70",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://38.54.116.130:11211/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T20:43:32.667Z"
},
{
"port": 15671,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf79c638bf86f8ffd43811250a==\" />\n<title>LG SuperSign™</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3OWM2MzhiZjg2ZjhmZmQ0MzgxMTI1MGE9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nSelenium is made possible through the efforts of our open source community, contributions from these\nDashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -578844387,
"body_sha256": "98984113310dafbb19c58a77780b5aa648f84fdc7aa11fc0f01bafe50f9e9270",
"component": [
"Ruby",
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails"
],
"content_length": 32666,
"favicon": {
"md5_hash": "1dcc55aa6f973801b0252f6304e6dc1c",
"murmur_hash": -1750461220,
"path": "http://38.54.116.130:15671/favicon.ico",
"size": 6772
},
"headers": {
"content_length": [
"32666"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 07 Apr 2025 14:46:48 GMT"
],
"server": [
"webfs/1.21"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:15671",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "LG SuperSign™"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "052734B0F311AEB34A2DE946DE604756",
"fingerprint_sha1": "B462939872F9B784139A6D406B72E26ABBD0C33D",
"fingerprint_sha256": "DB05C6C7EAC6464C24F1DDAB1A5B8DA1B0C51B5CF5C9980FD1563D3338F8AA91",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"FM"
],
"domain_component": [
"JT",
"local"
],
"organization": [
"OFWCHVQG"
],
"organizational_unit": [
"DJKPSQR"
]
},
"issuer_dn": "/C=FM/O=OFWCHVQG/CN=localhost/OU=DJKPSQR/DC=JT/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5776656669544237318",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"FM"
],
"domain_component": [
"JT",
"local"
],
"organization": [
"OFWCHVQG"
],
"organizational_unit": [
"DJKPSQR"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=FM/O=OFWCHVQG/CN=localhost/OU=DJKPSQR/DC=JT/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "be0d2ad080dc26789ce9df514d9d6e5fa4868800e57fde0949cc83474dc6bf94",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhjNzhjMzg3YzY3NmIwMTNhZTdjOTk5MjQzODE3MTI3OGNhNjkyNTQ3ODc2MjI0NzAzNGRlNDE1YWQwZmVkZTg0NWFlNjlkODllODE5MjMzODllZmI3OGJkNjNkYmZkMDA1Mzk2YTU3OTQ0ZjVjNzVkMmIzMjVlYzU5YmUzZDI4N2ExMTA0ZmIxNzA4MWVhYjc4MTYxNmVlNTlmMTExMjM1NmU2NTI4YjJhNGQ5YmE3NDViMjZiMGIzNTdkNTllMTA2MmVhNjFjNGI0NDFhN2NjM2RlNTk3OTlkNjJlZDRhZDdlMzQ1YmU3YjA1MDBhNzllMzFjNTlmN2VmMjYwZWVhZDI4Zjc2OTM2OWI3MzNhNWY0OTI1NmYyZDdmZTdlMjAyZWE4NTI2N2FmNGVkYmM4MDgwNTMyOTUxODJhY2RlN2RmOTc2Y2ZmYzdlMzE4ZGQwNTYzODhhMWEwZGI1ZWVkNzdkZDI1ODc2YjcxMTdiNDU5ZjhmMmMwZjJmNTdjMjBlNmU4MmMwZDBkODg1MGUwODgxOWNmNGVmNTM5OWEzMDg0ODUyZGM5NTFjN2ZjNzM4N2M1MTc5ZDZjNWMwOGEwMWFjMDIxNWQ0ZDQyNGQwZjRhZDhhMGFmYTg3MDFhMjk5ZjA5M2YzY2UzNjZkMTM3NDA3NTViMmY3YzE0ZjczMDM5NDA4MjA1Y2UzOTVjNTc5ZDQxYjg4NmE1NjZjNjg1NmQ3MGU2MzdlNjA5ZmUxNDYxYzAyNmU1YTkyMDE5MjA4YjE3ODk0MGNkYjdlZDc1M2NiM2E0ZDQ5NDIwODk4Y2Y1NjQwNDhmOTgzY2E1MDEzMjcwMDc4ODI4NTQxNDY4MWQ2ODY0NTUwNDMyOGMxYzJjNjJjODcwOWVmYzhiNTQ2ZDMwOGJjNWMwMTIxODI5YjE0OWRmMjlkNjMyYzFlNDBmMGRlYzczNTg0ODM4MDQzOTZhNjEwOWIzNWIzY2NmYTM4ZDIyMTg3ZDU3NDFhNzU2Njg0ODhjYzhlNTE0MzBmYzI0YWM2OTA0NGRhYTE4NDM0NTYzNzM3ZWVjNGZkY2IzOGM0MWM3MmU4ZDBhZWRjMzhiYTRiNjI2M2IxNDFlMzVmZmQ3NjQwZTY0NjIzMTRhNWQ0YjAwNDhjOGMwY2IzNzhjNzZjMmI1MWI5MzQwOGUwZWYwMjVjMDkxNGMzZjllMmMzY2ZjYzgwY2UxNjAwMTU4ZTEzODU4NWMwZmU4ZWY0MzhhMGI1YTMwYjQ0ODMzMDVmZTI4YjY4NTA0NGI5M2EwMTk3MzFmNWI5N2VjMGI0MjQ4Njc0Y2YwNmMxYzJiYTY1NmFlN2MzZWVlMzgwZTJkZGExNTgzMTBmMjFi"
}
},
"tbs_fingerprint": "97487faaf102045651a1beac7a0c2f2032194c3feda386310b00b7c006f3faa7",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-07T11:02:17",
"not_before": "2025-04-07T11:02:17"
},
"version": 2
},
"fingerprint_sha256": "DB05C6C7EAC6464C24F1DDAB1A5B8DA1B0C51B5CF5C9980FD1563D3338F8AA91",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:15671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-14T20:45:50.3Z"
},
{
"port": 15672,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc71c639b89be0ffc2380d==\" />\n<title>DSL Router</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3MWM2MzliODliZTBmZmMyMzgwZD09 </h1>\n</div>\n<!--\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -566096131,
"body_sha256": "81bc717688900d3a8d9adf1bb879c754d5db192232566d3bd5f74699e13c487b",
"component": [
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"WordPress",
"MySQL",
"PHP"
],
"content_length": 35854,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://38.54.116.130:15672/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"35854"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 13 Apr 2025 22:50:04 GMT"
],
"server": [
"secure"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:15672",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "DSL Router"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FFEC6DA06FF36D1109F7A810B95837C4",
"fingerprint_sha1": "1C7EFD4DBBEC07567EA5D989C6DE121D59551847",
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"issuer_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5145723181762935798",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "634ae9f2b5e49ab06bbd5772cadcf2ac5eca96196a3ffe4ca0190aba4b0fd531",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhiYTkwNDg4OTRmNDNkOWY4Njc5ZTUxMDlhNTk2OTJkMDI5YTliZDYwYjFiY2U2MWE2MzBkZjRjZjdlMTM2MGYwMWU4YmM1MGExMGFhZDhhOWNhYzdjMTIyNDE3YTE1OWRkMWNjNzRiOGI1MTA0Mzc2YTFkYTUxZWVhZTMxNzRkYWQ0MzUwYzVlNzMxNTkyYjZkYWMzZWQwN2MzNjRjZmI3YmE4ZjJhZWUwMTk1YzQxYTVlMzFjYjU2OWJiMmI0OWZlNGExYmU3NGYwYmJjZDQ3MWIyNTQwYjRlZjVlMDJmZWE3NWViM2JmZjBlNjQyMWM1NDNhNTJkZDZjZWUxNWI4MTk0MmQxYWIyZWI0Mjc5ZjY5Yzk5YWJkMDdkZmE1MmYxODljY2QxYjU4MzIyNDAyYjlhM2NiMzc5ZTE5ZGM3NmNiZTM4ZjhkYzFkMWYyNzZiMTIwZjIzODhjM2Q2OTI1MTVjMDRmOGY5M2ViZTgzZjVmNGQ0NDI1YjU0NWI3Y2QxODI1ZmY4NWYxM2FiMWE0MTYzZTMxM2RlM2MyYjYyYmM1ODI3ZDNkZGU0ZmRhM2Y5M2Q1MGZmYWI5NjRmZjFhN2E5ZGRlZTU2OWJjZDFiMWM4YjExYTM2Y2NmMWEyMjM2ZjQ5YTFmY2FlOGIxNWNhNzNiNDE4ZGZjYTFhOWZlN2NiYjYzOGE3MjZiMjBhODdjYzM4NmUyODI1ZmEwMDY3ZmM5ODc0ODZkMmFkNDczNmYwOTdmNzZjNDg3NGRiNGEzZDlmZTgwODQ1YmNlMjc0MzBkNjAxZWFlYWVkNjZjZmY5NGRiMDE3YTNlMzRkOWRlYzI1ODZjNWM2ZmQyNDk3MzMwZDc3NGZmZGJmMDFlMDg2MDYwOTU4ZWViODMwZTk2N2VkMDY1NDQwYzYyOWI5NjNkNDVmYmFjODIxMjAyYmVkMzM1YjNjZjA4ZWEwNzY2MjRkOTEwYWRlNTg2YjY2Mzg0M2ZjMjg2ZDY4ZmZlMTIzMjhmNTg5NDEyZjU0NzYzNTA3YmFiZjUyODgwZjllMDQwNmQ1OTZjNjgyYzllZDhkZTJkMTBmNTNhNThlYzI1YzA4ZWU5MDcwZDUyMzY2ZjNlMDI0MTM0NWU3ZmY1YjcwMzQwZTI5ZDIwMmMyZDQ5ZWI2ZmI3ODEzYjZhYTYzYmQ5YzgzMTY2NWU2M2JjMjc4ZDFhYTAwMDVlODczZTE0MzU1ZjZlYWZkNzU3M2ExZGZhZTM2ZDkxODM1M2Y3YjdjNGZkZjlmOTg3YTBkYTkyMzUyMGU1M2I0ZjE3ZDQ4NjdlN2Y0N2U5YjQ1ODUxZmU2NzE2ODIxYmQ4NjM0NTkyODVjMDljMWYzMzNjOTA3"
}
},
"tbs_fingerprint": "96003e4b54c707f7cc2ff692ae2a10fdda2f3d97be150186790faa5b4ae0eba3",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-02T12:12:27",
"not_before": "2025-04-02T12:12:27"
},
"version": 2
},
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:15672/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T17:45:41.112Z"
},
{
"port": 20000,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"dnp3": {
"raw": "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"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T07:50:58.576Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc77c63bba87f8ffd833112100e3==\" />\n<title>CGISESSID</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3N2M2M2JiYTg3ZjhmZmQ4MzMxMTIxMDBlMz09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nSelenium is made possible through the efforts of our open source community, contributions from these\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 554346809,
"body_sha256": "0fe5fffe5bd6d6538dbc5069c589ce250450f4b498842f6d873c92903ffa5731",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 35867,
"favicon": {
"md5_hash": "44071663a97aa46640d124dd31fe7521",
"murmur_hash": 2091717113,
"path": "http://38.54.116.130:27017/favicon.ico",
"size": 7659
},
"headers": {
"content_length": [
"35867"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 13 Apr 2025 12:10:21 GMT"
],
"server": [
"WebServer/1.0.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:27017",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "CGISESSID"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"mongodb": {
"allocator": "tcmalloc",
"bits": 64,
"cc": "/opt/mongodbtoolchain/v2/bin/gcc: gcc (GCC) 5.4.0",
"cc_flags": "-fno-omit-frame-pointer -fno-strict-aliasing -ggdb -pthread -Wall -Wsign-compare -Wno-unknown-pragmas -Winvalid-pch -Werror -O2 -Wno-unused-local-typedefs -Wno-unused-function -Wno-deprecated-declarations -Wno-unused-but-set-variable -Wno-missing-braces -fstack-protector-strong -fno-builtin-memcmp",
"cxx": "/opt/mongodbtoolchain/v2/bin/g++: g++ (GCC) 5.4.0",
"cxx_flags": "-Woverloaded-virtual -Wno-maybe-uninitialized -std=c++11",
"databases": [
{
"empty": false,
"name": "admin",
"size_on_disk": 1201002
},
{
"empty": false,
"name": "local",
"size_on_disk": 2201002
},
{
"empty": false,
"name": "xdatnlab",
"size_on_disk": 22900002
}
],
"dist_arch": "x86_64",
"dist_mod": "",
"git_version": "a2d97db8fe449d15eb8e275bbf318491781472bf",
"is_master": true,
"javascript_engine": "mozjs",
"link_flags": "-pthread -Wl,-z,now -rdynamic -Wl,--fatal-warnings -fstack-protector-strong -Wl,--build-id -Wl,-z,noexecstack -Wl,-z,relro",
"logical_session_timeout_minutes": 0,
"max_bson_object_size": 16777216,
"max_message_size_bytes": 48000000,
"max_wire_version": 5,
"max_write_batch_size": 1000,
"read_only": false,
"storage_engines": [
"devnull",
"ephemeralForTest",
"mmapv1",
"wiredTiger"
],
"sys_info": "deprecated",
"target_arch": "x86_64",
"target_os": "linux",
"total_size": 26302006,
"version": "2.2.3"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B368DC119F45C0FA11EFD7A2D2E7963D",
"fingerprint_sha1": "E8E49E808A212FA2B40F9916B26103B39938717C",
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"issuer_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5011963104671082264",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AO"
],
"domain_component": [
"QFRCWZ",
"local"
],
"organization": [
"KTMLINRI"
],
"organizational_unit": [
"KVUTQNQ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=AO/O=KTMLINRI/CN=localhost/OU=KVUTQNQ/DC=QFRCWZ/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "12e48fdbc2dd7894e1be548cde1ca3ff192d56e85251fdf2ab356b99a3c809f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhhZTYzODIzOGVkZmU5NjZmMDEwNDI3MmIzNGQyNWNjODgwOGI3MTM0YjFjYzUxZjg5ZDZiNGM4MmU5NTIxYTk2OWFkN2ZlYjI1NDY3OWE0YTY0MGQyYWQzYzBkYWMxZDQ4Yjk5MjBiYWIzYzEzMjViMGVlODAxYTJjMzU0NDY0YzYzZDNmOGNmZDNiODE2Y2ZjMTdmMWZjZjQ0OWRkZmEyZjVmMjFkZWZlZGUxOGViYjk3NjU4ZDBlMTI3Y2Q5NGU0N2I3ZDQyYzY5NTU1ZTBkYjg5MDFlMDE1MzkwMzgzNjg4YjU1Mjg3MWEyYTljMDdjZTRiMjdmZjM4MWVmMWI5OTE2MmQ5ZGMwMjg4YWRlNGZjZjU1OTFlMmExOTAwMWI5MDI5NzdjZGVlNDFmMmI5NWI1MGYwMmNhNjU4Y2U3MjUxN2E3ZjIxNmMyOTJlNWE4NTJiMmY0YWQ1MGI0YTYwMjlkYzQ1OWNhYzliODUwMDQ3N2FjNjY4NTRlMDA5NTY3OTRlNmE4MmI1ZTU3Njg4OWMzZDA4YzJmZmYzMGVjMDM1YmZlYzBlMGM4MDRiYTkzNWNhNDg4MjNmYmQxNDBjNTJkOGQwYjUxMjY2YWU1ZGNlMmZkMDA1YTc4OTMyNDAzZDViNjEwMTUxN2I4OTBhZGI3ODI5YTU3NDhjMWMxNTU3NGRhMGMzODliZTIwNDRkOTgxNzQ2NTBmZTNmNWM0YzBmOTI4OTM5ZTM2OTY5MjM4ZmYzM2IxODFkMjk4ZGZjNmZmMGIwZjFlNDE5NGVmMjFiZTFkYzczN2MyYWM0OWYzYzdmM2JjOGYyZTVjMzMwMDc4ODVlZTk4YjM4ZTM2YWVhOTZhMjVjOTM3NzcxMzk4MWIwZTQxZmY0NzkyNmI4NGM1N2Q3NDFhZmUyOTVkODZkNTNiOGE5OWUxMzQwY2I1NjRkYThiMTIzOTkzY2VhN2M0YmVhNmRhZDMyMjIzNmU0Y2U5ZjY0ZGEyYTM2ODJlOWI2NjNhZDNjZjQ4MzhlZmI4ZWQ2NzJkNjVlMjA2ZDVlY2QwMDVjZmNkNzQ2OTAyZGNmNzlhMzJiMzU3OTBhYTY4NGNlYTI0MmIyMTY4ZWY5OGY5MGQ2OWZjMzE4OTVjOGY0Yjk5M2U0NWYxNjZkNzFjYjNiMWVhZTdiMWZkMDIxYzBjYjRiMGQzYjNlMzBjODM0ZGUwMzI1MjA3OTcyMDRiNWNlMjkzY2FiYjViZGZiNzVkODk4OTJkZDFmYWRlZDM0NmM4Y2UwNWRkMjU1YzMyMDgxOGNkNzcxNTI0MDA3Njc3ZmFkYzllMzBiMDY0OTg5OWVjOTEzNmJkODRhZDJkZjY0Yzg2ZjM2NTYz"
}
},
"tbs_fingerprint": "3d808d8251dbd123797ce40670fee973e577603e21cad5d694912d400b4aeac8",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-09T02:19:22",
"not_before": "2025-04-09T02:19:22"
},
"version": 2
},
"fingerprint_sha256": "4DD26B2D483EC8F3054E68EC42405EF856F96A97B3C7C6B10601431851C973D4",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:27017/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T07:46:52.449Z"
},
{
"port": 27018,
"protocol": "tcp",
"name": "http-proxy",
"version": "3.1.20",
"product": "Squid http proxy",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:squid-cache:squid:3.1.20",
"part": "a",
"vendor": "squid\\-cache",
"product": "squid",
"version": "3\\.1\\.20",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc75c638bf9be7f9d4240e2107==\" />\n<title>WR21 (SN: 991792) Configuration and Management</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2M3NWM2MzhiZjliZTdmOWQ0MjQwZTIxMDc9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": 1345112738,
"body_sha256": "ced669cbb87a34dd781a9c3e062d2ccd2acb8449c034cdc969eac5624cadd4ef",
"component": [
"MySQL",
"PHP",
"Django",
"Python",
"Ruby on Rails",
"Ruby",
"WordPress"
],
"content_length": 36074,
"favicon": {
"md5_hash": "b89823b3f483bdbebfa9c6ceaaefeecf",
"murmur_hash": 1089670315,
"path": "http://38.54.116.130:27018/favicon.ico",
"size": 6463
},
"headers": {
"content_length": [
"36074"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 15 Apr 2025 04:19:41 GMT"
],
"server": [
"none"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:27018",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "WR21 (SN: 991792) Configuration and Management"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2012-5643",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-2014-7141",
"score": 6.4,
"severity": "medium"
},
{
"id": "CVE-2014-7142",
"score": 6.4,
"severity": "medium"
}
],
"url": "https://38.54.116.130:27018/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T04:20:07.573Z"
},
{
"port": 27019,
"protocol": "tcp",
"name": "http",
"version": "5.0.2",
"product": "Tornado httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:tornadoweb:tornado:5.0.2",
"part": "a",
"vendor": "tornadoweb",
"product": "tornado",
"version": "5\\.0\\.2",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cf77c638be85f8f6dd240d2105==\" />\n<title>RT-N66U (build 45849) - Info</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<a href=\"/loginregister\">/login/Register</a>\n<div id=\"ewd-feup-register-form-div\" class=\"ewd-feup-form-div\">\n <form action=\"#\" method=\"post\" id=\"ewd-feup-register-form\" class=\"feup-pure-form feup-pure-form-aligned\" enctype=\"multipart/form-data\">\n <input type=\"hidden\" name=\"ewd-feup-check\" value=\"e7ff3e6bc43e502ac2f3edfbf80ab7921b40ab16\" />\n <input type=\"hidden\" name=\"ewd-feup-time\" value=\"1744250098\" />\n <input type=\"hidden\" name=\"ewd-feup-action\" value=\"register\" />\n <input type=\"hidden\" name=\"ewd-feup-post-id\" value=\"991\" />\n <input type=\"hidden\" name=\"ewd-feup-omit-level\" value=\"No\" />\n <div id=\"ewd-feup-username-div\" class=\"feup-pure-control-group\">\n <label for=\"Username\" id=\"ewd-feup-register-username-div\" class=\"ewd-feup-field-label\">Email: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"email\" class=\"ewd-feup-text-input\" name=\"Username\" placeholder=\"Email...\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Password\" id=\"ewd-feup-register-password-div\" class=\"ewd-feup-field-label\">Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-password-input\" name=\"User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-confirm-password-div\" class=\"feup-pure-control-group\">\n <label for=\"Repeat Password\" id=\"ewd-feup-register-password-confirm-div\" class=\"ewd-feup-field-label\">Repeat Password: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <input type=\"password\" class=\"ewd-feup-text-input ewd-feup-check-password-input\" name=\"Confirm_User_Password\" required=\"\" />\n </div>\n <div id=\"ewd-feup-password-strength-div\" class=\"feup-pure-control-group\">\n <label for=\"Password Strength\" id=\"ewd-feup-password-strength\" class=\"ewd-feup-field-label\">Password Strength: </label>\n <span id=\"ewd-feup-password-result\">Too Short</span>\n </div>\n <div id=\"ewd-feup-field-1\" class=\"feup-pure-control-group\">\n <label for=\"First Name\" id=\"ewd-feup-register-1\" class=\"ewd-feup-field-label\">First Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"First Name\" id=\"ewd-feup-register-input-1\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"First Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div id=\"ewd-feup-field-2\" class=\"feup-pure-control-group\">\n <label for=\"Last Name\" id=\"ewd-feup-register-2\" class=\"ewd-feup-field-label\">Last Name: <span class=\"ewd-feup-req-symbol\">*</span></label>\n <div class=\"ewd-feup-register-field-instructions\">\n <input name=\"Last Name\" id=\"ewd-feup-register-input-2\" class=\"ewd-feup-text-input\" type=\"text\" value=\"\" placeholder=\"Last Name\" required=\"\" />\n <span class=\"ewd-feup-label-description\"></span>\n </div>\n </div>\n <div class=\"feup-pure-control-group\">\n <label for=\"submit\"></label>\n <input type=\"submit\" class=\"ewd-feup-submit feup-pure-button feup-pure-button-primary\" name=\"Register_Submit\" value=\"Register\" />\n </div>\n </form>\n</div>\n\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n <input type=\"hidden\" name=\"save_options_field\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU0Y2Y3N2M2MzhiZTg1ZjhmNmRkMjQwZDIxMDU9PQ== </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"netcam\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n{\"msg\": \"FlareSolverr is ready!\", \"version\": \"3.0.2\", \"userAgent\": \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\"}\ntemp.php\nHome Dashboard\nwas successfully installed\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -1518304783,
"body_sha256": "1e82c74c5c5cb2ce26287fcc8d15186f59641d3ad96e36180e0d1527e935f5d7",
"component": [
"Django",
"Python",
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby"
],
"content_length": 36056,
"headers": {
"content_length": [
"36056"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 15 Apr 2025 00:45:54 GMT"
],
"server": [
"PDR-M800/1.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:27019",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "RT-N66U (build 45849) - Info"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FA08A382F0FA1838A336ED660CE51917",
"fingerprint_sha1": "62787BC50840401FFBC42CAD2CC57653AB4F7CD0",
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"issuer_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8273168995513425472",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "MGRiMDY5NTQ5YjJiNTkyODAzODA0MGVkOTE1ZGIwZDljZjZmMjU3MzA3ZmE1YjgyYjY3M2RlNTNjYjAyNzM2YTIzYjU5ODg0YWU5YjVlZmI5NWVkOWI4OGE0NThkNjRjYjdjYzhkNDE1MGMyZTM4ZTdmN2FmNjM0ZDkwYjJkZDViZjU3MjM0NzZlNzkwOGY2MDVmYzc0ZDAyODgwNDcxOTZlYjM1NmI1ZjQ1MDgxMTQ0MmIzNzk1OTVlYTRmMzgzM2QxZDk5OGNhMjVhODhiMDQyMmUwN2U3OTMwYjRmYzMwODZiMDIxM2NmNDFiNDgyMzNiOWMyYjk2OGYzMTBjYjMxMzM3NTRjNDBmOGMwYjRmNmIxNGYzMWRhZjljZTBkMTRjN2Y4NzkyMTBmNjc1NGY5NDg3MGQ3MWViZDE3YzkwZTAwZjQ5MDQ4OTZmODljNDVlZTRlNTM1ZjNlNjJhYjQ4MzIzZTYxZjEwODEzZTM1YjJhOGI1MjcyMzRmM2JiOTI4Y2ViYjljOTZhZTQ5YTdhNTI2MWUzYzgyMmY3ODc0NjIyNjI2ZWVjMGMyOGI0ZGVjOGFmNzg4YTNhMmQ2OGQ2MDFlODI2OTQxYjljNzlkY2Y3YmQ4YzM3YzM2MWU1NmM2MDU4ZGM1ZmZmYjkxY2I1ZWEwMTliZGRlYTk3NGEzMDE3ZTkzNDRjZmQ1OTUzZWFkMjgxNjc0MTUwMzRkNzFmNzExMGY2N2E1MjA4OWU4NDgzNmY3ODQwNjY5MjcyZTllOTYyOTcxMDExZjgwYjkyZmU5YzhjYTdkZTc2ZmY5MTU2NTQ5ZWQ3MmFiNDdlOGY5MWE3NDliYmY4Y2M5MjEwMTZhOTNjNTQ3NDgxYmIxYTg3MGI0NTc4NWYwYjc4OTJkYTI1NjhlYmNiMWRmNjFhM2I1YmFiNDYzODQzZjQ5ZWYxMWNmMTFiYjU0ODIyMDdkMjMwZThmZGRlNDBmYTFlYjcxNTcyYjNiZGMxZDFhMzg1N2FjZTRjZmU1MGEzZGUzY2ZhMjAxMDIxYzg5NGI5MjhhOTY0ZjE2OWVhNGIxZjBiOGRkMTg2OGM2MzBjOTc2YmMwZjcyZTAxZGUyZjM4MzM3MmZlYjAwMjQxZTkyNzg1ZDA3MmRiN2JhNTMyMWUxN2JhMzg5MDFiNWJiMzVlMWUzNWE0YzQ3Zjc4MTFhMTQ4ZGFkZTczZWM1NDA5OTQ2YTdhYzJkZDM2YzE3NTQxYmQxNzY1Y2RiZWRhNTg0OGEyODMwYTdmMGEzZDcxNGEyZGJmZmFlZGRmMzkzZjMxM2EzYzI5ZWQ0MmM4OTVlYmUwZWEzNjgxNjc1NDljMmQxOGFkNDE1NjhiYzk0OA=="
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"HPD",
"local"
],
"organization": [
"NDARZFHC"
],
"organizational_unit": [
"IZIMWGO"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=NDARZFHC/CN=localhost/OU=IZIMWGO/DC=HPD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b4a60a425544bf70009bb2dcfe8e7dea551af417ecd5d60e4a7585d57fa747ec",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "7c4c4fce7b131e3db41dc3de2911edb644d15c15fc74775913b365cff076e231",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-13T12:30:00",
"not_before": "2025-04-13T12:30:00"
},
"version": 2
},
"fingerprint_sha256": "CABE5A50FC5A347A77FFCBA6EE263CBEDB2EC00321DEFDC3EACFB16BB1CC1D6F",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2023-28370",
"score": 6.1,
"severity": "medium"
}
],
"url": "https://38.54.116.130:27019/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-15T00:46:21.034Z"
},
{
"port": 29092,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n<meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\">\n<meta http-equiv=\"Pragma\" content=\"no-cache\" />\n<meta charset=\"utf-8\">\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"GitLab\" property=\"og:site_name\">\n<meta content=\"Help\" property=\"og:title\">\n<meta content=\"GitLab Community Edition\" property=\"og:description\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Help\" property=\"twitter:title\">\n<meta content=\"GitLab Community Edition\" property=\"twitter:description\">\n<meta content=\"GitLab Community Edition\" name=\"description\">\n<meta content=\"#484D57\" name=\"theme-color\">\n<meta content=\"#38353E\" name=\"msapplication-TileColor\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e7ca76c63bb58cf8ffd43a112202e3==\" />\n<title>SPECO WEB SETUP</title>\n</head>\n<body>\n<div style=\"display: none;\">\n<script>SC.util.mergeIntoContext({\"focusedControlID\":null,\"userName\":\"\",\"userDisplayName\":\"\",\"isUserAuthenticated\":false,\"antiForgeryToken\":\"THtoAUxH4sS9\",\"isUserAdministrator\":false,\"canManageSharedToolbox\":false,\"pageBaseFileName\":\"Guest\",\"notifyActivityFrequencyMilliseconds\":600000,\"loginAfterInactivityMilliseconds\":36000000,\"canChangePassword\":false,\"controlPanelUrl\":null,\"pageType\":\"GuestPage\",\"processType\":2,\"userAgentOverride\":null,\"sessionTypeInfos\":[]});</script>\n<SessionInfo><SID>a29d421feecf680a</SID><Challenge>680a</Challenge><BlockTime>0</BlockTime><Rights></Rights><Users><User last=\"1\">fritzr</User></Users></SessionInfo>\n<Account>\n<Entry0 Active=\"Yes\" username=\"CMCCAdmin\" web_passwd=\"CmcC4dm1n5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry1 Active=\"Yes\" username=\"useradmin\" web_passwd=\"Gu4ngx1pd5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<Entry2 Active=\"Yes\" username=\"CUAdmin\" web_passwd=\"CUAdmin5591\" display_mask=\"FF FF D7 DD FF 1D FF FF FF\" Logged=\"1\" LoginIp=\"192.168.1.10\"/>\n<TelnetEntry Active=\"Yes\" telnet_username=\"Admin\" telnet_passwd=\"cxx4dm1n5591\" telnet_port=\"23\"/>\n<FtpEntry Active=\"Yes\" ftp_right=\"1\" ftp_auth=\"1\" ftp_username=\"Admin\" ftp_passwd=\"cxx4dm1n5591\" ftp_port=\"21\" />\n<SambaEntry Active=\"Yes\" smb_right=\"1\" smb_auth=\"1\" smb_username=\"Admin\" smb_passwd=\"cxx4dm1n5591\" />\n<ConsoleEntry Active=\"Yes\" console_username=\"Admin\" console_passwd=\"cxx4dm1n5591\"/>\n<CTDefParaEntry setDefValueFlag=\"1\" />\n</Account>\n<div>8.5.5 (Build:20200530.307-TEMP)</div>\n<span class=\"greyNote version\"><span class=\"vWord\">Version</span> 2023.11.3 (build 147512)</span>\n<h1>Logged in as <strong>admin</strong></h1><input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"e9tIOET3iTncMVL4E0ESylCCQupBWlfL9NobFzaQDir2ktC0Wgy5pafsCrkonl5y\"><textarea id=\"3revi\" name=\"revi\" rows=\"4\" cols=\"50\">server1 Ubuntu 22.04 LTS</textarea>\n<ca status=\"disabled\" href=\"/+CSCOCA+/login.html\" />\n<form action=\"/login/vpnSdef\" enctype=\"multipart/form-data\" method=\"post\" name=\"login\" id=\"auth_form\">\n <div data-user=\"root\" data-module=\"package-updates\"></div>\n <code>The zip file did not contain an entry exportDescriptor.properties</code>\n <span class=\"form-hidden\"><input name=\"page\" value=\"login\" type=\"hidden\"/><input name=\"formulaire_action\" type=\"hidden\" value=\"login\" /><input name=\"formulaire_action_args\" type=\"hidden\" value=\"dzdNV0MzUGFDV0NHemR6bWorekNEWHY=\" /><input name=\"formulaire_action_sign\" type=\"hidden\" value=\"\" /></span>\n <message>Please enter your username and password.</message>\n <input name=\"formid\" type=\"hidden\" value=\"012afed\" />\n <input name=\"javax.faces.ViewState\" type=\"hidden\" value=\"012afed\" />\n <input name=\"queryString\" type=\"hidden\" value=\"1406192\" />\n <div class=\"versionInfo\">The Cacti Group Version 1.2.25</div>\n <strong>IPFire 2.19 (2017v) - Core Update 110 introduces significant changes</strong>\n <input type=\"hidden\" name=\"token\" value=\"0feacf5a1cafc9fcea1ce1255e65fd9a7c11ae3f9235eb6038a2c9fe702ec7ec\">\n <input type='hidden' name='__csrf_magic' value=\"key:12eef1d88692f7673fb80ab6ba8d051fdce64ccb,1710777654\" />\n <input type=\"hidden\" name=\"tokenid\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"name\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"csrfKey\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"hidden\" name=\"csrf_token\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" name=\"ref\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"username_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" name=\"password_fieldname\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"csrf\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"csrf\" name=\"xd_check\" value=\"aHR0cHM6Ly9pcHMuY2x1Yi8=\">\n\t<input type=\"hidden\" id=\"give-form-id\" name=\"give-form-id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"give-form-hash\" name=\"give-form-hash\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"user_id\" name=\"user_id\" value=\"621aec6b886ff81169bed7de5d47b5ed\">\n\t<input type=\"hidden\" id=\"last_commit\" name=\"last_commit\" value=\"721aec6b886ff81169bed7de5d47b5ed\">\n <input type=\"text\" name=\"username\" label=\"Username:\" value=\"admin\" />\n <input type=\"password\" name=\"password\" label=\"Password:\" value=\"123456\" />\n <input type=\"hidden\" name=\"tgroup\" value=\"DefaultADMINGroup\" />\n <input type=\"submit\" name=\"Login\" value=\"Login\" />\n <input type=\"reset\" name=\"Clear\" value=\"Clear\" />\n <input type=hidden name=\"vhost\" value=\"standard\">\n <div id=\"ver_num\">v7.0NG.772.3</div><input id=\"hidden-csrf_code\" name=\"csrf_code\" type=\"hidden\" value=\"b1c22edd91b7c2a00b21e0531ad46e8d\" />\n</form>\n\n<form id=\"frmLogin_4\" name=\"frmLogin\" method=\"post\" action=\"/dana-na/auth/url_default/login.cgi\">\n <input id=\"tz_offset_5\" type=\"hidden\" name=\"tz_offset\">\n <input id=\"client_mac\" type=\"hidden\" name=\"clientMAC\" value=\"\">\n <input id=\"username\" type=\"text\" name=\"username\"/>\n <input id=\"password\" type=\"password\" name=\"password\"/>\n <input id=\"realm_16\" type=\"hidden\" name=\"realm\" value=\"Users\"/>\n <input id=\"btnSubmit_6\" type=\"submit\" value=\"Sign In\" name=\"btnSubmit\"/>\n <input id=\"xsauth\" type=\"hidden\" name=\"xsauth\" value=\"4419bb0cd2d21ef7b4bf25c9e5206f89\" />\n <input id=\"DSIDFormDataStr\" type=\"hidden\" name=\"FormDataStr\" value=\"4419bb0cd2d21ef774bf25c9e5206f89\" />\n <input id=\"xsauth_token\" type=\"hidden\" name=\"xsauth_token\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_71\" type=\"hidden\" name=\"xsauth_71\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"xsauth_60\" type=\"hidden\" name=\"xsauth_60\" value=\"64fc4e172d32d03e74388dae24f6d961\">\n <input id=\"key\" type=\"hidden\" name=\"key\" value=\"64fc4e1\"/>\n</form>\n<span id=\"DSIDSystemSoftwarePkgVersion\" >22.7R2.0</span></a>\n<table id=\"table_uploadedlogs_4\"><tr><td><a href=\"log_154.txt\">downloadLog_154</a></td><td>Log_154</td></tr></table>\n\n<form name=\"PLogin\" method=\"post\" action=\"/\">\n <input type=\"hidden\" value=\"Maintain/cloud_index.php\" id=\"cloud_addr\">\n <input type=\"hidden\" name=\"extension\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"pass\" value=\"1804289383\" >\n <input type=\"hidden\" name=\"recording_exten\" value=\"1804289383\" >\n <input type='hidden' name='LDCSA_CSRF' value=\"sid:7830302ba478216ecf2cf24b53afe6f385998104,1726156985\" />\n <input type=\"hidden\" name=\"admin-nonce\" value=\"4419bb0cd2d21ef7b4cf25c9e5206f89\" />\n <input type=\"hidden\" id=\"hidProductID\" value=\"M8\" />\n <input type=\"hidden\" id=\"hidLicResult\" value=\"您没有购买过BS模块\" />\n <input type='hidden' id='post_ID' name='post_ID' value='1804289383' />\n <input type=\"text\" name=\"ssid\" value=\"7830302b-302b-2b30-2b33-7830302b302b\">\n <input type=\"hidden\" name=\"_csrf\" value=\"12eef1d88692f7673fb80ab6ba8d051fdce64ccb\" />\n</form>\n\n<li class=\"lisel\" onclick=\"location.href='index.php'\">日志系统</li>\n<li class=\"linormal\" onclick=\"location.href='Maintain/cloud_index.php'\" style=\"margin-left:1px;\">云平台</li>\n<button type=\"button\" data-price-id=True>sb</button>\n<div class=\"prod_madelName\">RT-AC5300</div>\n<div class=\"p1 title_gap\">Sign in with your ASUS router account</div>\n<tr class=\"h\"><th>PHP Group</th></tr>\n<tr><td class=\"e\">upload_tmp_dir</td><td class=\"v\">/etc/httpd/_tmp</td><td class=\"v\">/etc/httpd/_tmp</td></tr>\n<tr><td class=\"e\">$_SERVER['DOCUMENT_ROOT']</td><td class=\"v\">/mnt/HDD2/web/</td></tr>\n<var name='uuid'><string>7db3eea5-9996-4032-a9cc-3afd06bd11fe</string></var>\n<span >Powered by <a href='#'>Gibbon</a> v23.0.01</span>\n<div class=\"text\" id=\"jive-loginVersion\"> Openfire, Version: 3.6.0a</div>\n<a href='#' title='Community Forum Software by Invision Power Services'>IP.Board</a>\n<div id=\"mcname\">LoadMaster</div>\n<p><br/><span>出厂IP:192.168.1.1</span><br/><span>用户名、密码:admin admin</span></p>\n<td colspan=\"2\">Please enter your Cacti user name and password below:</td>\n<meta id=\"confluence-context-path\" name=\"confluence-context-path\" content=\"\">\n<meta id=\"confluence-base-url\" name=\"confluence-base-url\" content=\"https://192.168.1.4\">\n<meta id=\"atlassian-token\" name=\"atlassian-token\" content=\"d78e2b977d28428e411e31b958c9c502c2425083\">\n<script id=\"frontend-js-extra\">var hashform_vars = {\"ajaxurl\":\"\\/wp-admin\\/admin-ajax.php\",\"ajax_nounce\":\"d78e2b97\",\"preview_img\":\"\"};</script>\n<div class='content-messages errorMessage'><p>java.lang.Exception: y9pcHMuY</p></div>\n<B>SonicWall Universal Management Suite v9.3</B>\n<br>OK<br>\n<script type=\"text/javascript\">var csrfMagicToken = \"sid:ed04c4a1c86fe99a92cbe3441e2b1e2989d5deec,1725277646\";var csrfMagicName = \"__vtrftk\";</script>\n<select id=\"cars\" name=\"name\">\n<option value=\"olvo\">olvo</option>\n</select>\n<a href=\"/VICIdial/phone\">MODIFY</a>\n<script var session_name = '621aec6b886ff81'; var session_id = '1804289383';</script>\n<h3 class=\"text-center\"> <span class=\"soplanning_index_title2\">Simple Online Planning</span> <small>v1.51.01</small> </h3>\n<span>F3x26Q v1.1 (Sep 15 2023 12:36:09) std</span>\n<script type='text/javascript'>\n\tvar cactiVersion='1.2.27';\n\tvar cactiServerOS='unix';\n\tvar cactiAction='';\n\tvar theme='modern';\n\tvar refreshIsLogout=true;\n\tvar refreshPage='/logout.php?action=timeout';\n\tvar refreshMSeconds=1440000;\n\tvar urlPath='/';\n\tvar previousPage='';\n\tvar sessionMessage=[];\n\tvar csrfMagicToken='sid:4024e82870233374a2255351fb45057c8f7f9aa6,1728459021;ip:bee133099404bd4ddc2dd5f43c6b86dc3618b300,1728459021';\n wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware( \"aeb6d16741\" );\n</script>\n<img class=\"k-logo k-user-logo\" id=\"welcomeLogo\" alt=\"K1000 Logo\" src=\"/packages/partnerlogos/userportal_logo\" data-interface=\"user\" />\n<div><table background=\"./images/raisecom/back.gif\" width=\"980px;\" height=\"350px;\" align=\"center\" cellpadding=\"0px\" cellspacing=\"0px;\"></table></div>\n<p class=\"success\">Activate successfully</p>\n<p class=\"success\">登入成功!载入中...</p>\n<li aurl=\"/index.php/Addin/pan/doc/root_id/7830302b-302b-2b30-2b33-7830302b302b/clientid/b2.html\" onclick=\"openUrl\">\n\n<div>\n<h1> 3c86107551eb47824bd16c0171dd309d </h1>\n<h1> tid = OGRjYjc0YTY0ZGM5ODRmYjlhYmUzZTdjMjAxZjgxMGQ5ZWM5MGVkOGU3Y2E3NmM2M2JiNThjZjhmZmQ0M2ExMTIyMDJlMz09 </h1>\n</div>\n<!--\nWWW-Authenticate: Basic realm=\"Video Server\"\nWWW-Authenticate: Basic realm=\"Four-Faith\"\nWWW-Authenticate: Basic realm=\"Broadband Router\"\nWWW-Authenticate: Basic realm=\"iPEX Internet Cafe\"\nWWW-Authenticate: Basic aHR0cHdhdGNoOmY=\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=MD5\nWWW-Authenticate: Basic realm=\"netcam\"\nWWW-Authenticate: Basic realm=\"DVR\"\nWWW-Authenticate: Digest realm=\"GoAhead\", domain=\":81\",qop=\"auth\", nonce=\"405448722b302b85aa6ef2b444ea6b5c\", opaque=\"5ccc069c403ebaf9f0171e9517f40e41\",algorithm=\"MD5\", stale=\"FALSE\"\nWWW-Authenticate: Digest realm=\"realm@easycwmp\",qop=\"auth\",nonce=\"e22f76001fa38ce36f9b69bdbd73fbfb0001c399\",opaque=\"328458fab28345ae87ab3210a8513b14eff452a2\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router IPC223(P)-6\"\nWWW-Authenticate: Basic realm=\"karaf\"\nWWW-Authenticate: Basic realm=\"Server Status\"\nWWW-Authenticate: Digest realm=\"Control\", domain=\"PDVR M800\", nonce=\"34712299626f372c5ea0729ded8e8f37\", algorithm=MD5, qop=\"auth\"\nWWW-Authenticate: Basic realm=\"MSNswitch\"\nWWW-Authenticate: Basic realm=\"Panasonic network device\"\nWWW-Authenticate: Basic realm=\"HomeHub\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR840N\"\nWWW-Authenticate: Basic realm=\"MOBOTIX Camera User\"\nWWW-Authenticate: Basic realm=\"WT-ABCyNjgx\"\nWWW-Authenticate: Basic realm=\"System\"\nWWW-Authenticate: Basic realm=\"[RTX1210]\"\nWWW-Authenticate: Basic realm=\"TP-LINK Wireless N Router WR841N\"\nWWW-Authenticate: Basic realm=\"Tomcat Manager Application\"\nWWW-Authenticate: Basic realm=\"\"\nWWW-Authenticate: Basic realm=\"RT-N2UyNjgx\"\nWWW-Authenticate: Basic realm=\"TP-LINK AC1200 Wireless Dual Band Gigabit Router Archer C5\"\nWWW-Authenticate: Basic realm=\"Nagios Core\"\nWWW-Authenticate: Basic realm=\"NETGEAR DGN1000\"\nWWW-Authenticate: Digest realm=\"IgdAuthentication\", domain=\"/\", nonce=\"N2UyNjgxMjA6NjQ1MWZiOTA6IDJlNjI5NDA=\", qop=\"auth\", algorithm=\"MD5\"\nSelenium is made possible through the efforts of our open source community, contributions from these\n/CDGServer3/index.jsp\n<script type=\"module\" src=\"/@vite/client\"></script>\n<tomcat-users>\n<img src=\"/web/images/admin.png\" width=\"40\" height=\"40\">\n<img src=\"/web/images/guest.png\" width=\"40\" height=\"40\"> \nBetterAuthError\nBETTER_AUTH_URL\nPUBLIC_BETTER_AUTH_URL\nNUXT_PUBLIC_BETTER_AUTH_URL\nNEXT_PUBLIC_BETTER_AUTH_URL\nbetter-auth-client\nKibana UI\nWelcome to Elastic\n<title>BigAnt Admin </title>\nuser/add【新增人员】\nhttps://polyfill.io/\nSo-I-AM \";\n/index.php/admin/index sa=uploadConfirm sa=index\nNameError\nhello testers\nposted data was written to placeholder file\n{\\\"sm_nonce\\\":\\\"62e7518a4e4284979\\\"}\ncsaPostStatus=0\n3V@1\n202cb962ac59075b964b07152d234b70\nLocation: /vimarbyweb/index.php\n<img alt='logo' src=\"custom/logos/ecsimaging-default-login.png\" style=\"height:70px; margin-top:2%;\">\n\"DetectedxuanfengOS: %OS% linux-gnu\"\n{\"os\":\"windows\",\"logo\":\"\",\"appid\":\"skylar6\",\"has_prd_cert\":1,\"console_version\":\"V6.0\"}\nRDWeb\nRESULT=0\nThis a vulnerability!\npixmaps/debian-logo.png\nSuccessfulUpload\nPayload Executed\n/OAapp/WebObjects/OAapp.woa\nSystem.ArgumentException\nHello World!\nMiCollab End User Portal\nARN02304U8\nCorrectly updated the setup options\n67fc175780739f1ba31445a21deb2eec\nHACKED\n1.13.0\nShareCenter\nurl: \"/cgi-bin/login_mgr.cgi\",\ndata:\"cmd=cgi_get_ssl_info\",\napplication/json\nExpires: 0\n/js/lib/\nZero Touch Provisioning\nLinux PA-VM 4.18.0-240.1.1.20.pan.x86_64 #1 SMP Wed Jul 31 20:37:12 PDT 2024 x86_64 x86_64 x86_64 GNU/Linu\nredirect_to\nVMG3312-T20A\n<frame name=\"menu\" src=\"/ABBMain/Menu\" scrolling=\"auto\">\n<frame name=\"main\" src=\"/ABBMain/StartPage\" scrolling=\"auto\">\nSuccessfully saved\nurl: '/reqproc/proc_get'\nShareCenter\n2024/11/09 12:52_vuln_weaver_com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction\nvuln_yongyou_lsvl\nhello tongdaoa\nvulntest\nSRun Billing System\n校园网自助服务系统\nSECExplorer666\nroot:wW0sffoqsk.EM:19426:0:99999:7:::\n\"link\":\"file:\nDolibarr 16.0.1\ndd556350275e2ee0a2e877cea9c8a74a\n/wp-content/plugins/time-clock/\n/wp-content/plugins/time-clock-pro/\n<li class=\"print-only\">Printed by Atlassian Confluence 8.5.5</li>\nuid=0(admin) gid=0(admin)\nvar Name=\"admin\";\nvar loginNum=\"1\";//恢复出厂设置后loginNum==0\nvar Manufacturer=\"D-Link\";\nvar ModelName=\"DSL-2888A\";\nvar HardwareVersion=\"T1\";\nvar SoftwareVersio=\"EG_1.00b4\";\nUpdate Success!\n12321\nyou are logged\nX-SYNO-TOKEN: MIGfMA0GCSq\n{\"productversion\":\"6.1.1\",\"buildnumber\":\"42962\",\"smallfixnumber\":\"6\",\"upnpmodelname\":\"DS3615xs\",\"fullversion\":\"6.1.1\"}\n测试报告\n/wap/first/zsff/iconfont/iconfont.css\n<meta name=\"description\" content=\"Build Your Own Botnet\" />\nCRMEB\n<META HTTP-EQUIV=REFRESH CONTENT=\"1; URL=/vicidial/welcome.php\">\n/cgi-bin/webctrl.cgi?action=index_page\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR>\ndevice.png\nTraccar GPS Tracking System\n<script id=\"wpr-addons-js-js-extra\">\nvar WprConfig = {\"ajaxurl\":\"http:\\/\\/38.54.116.130\\/wp-admin\\/admin-ajax.php\",\"resturl\":\"http:\\/\\/38.54.116.130\\/wp-json\\/wpraddons\\/v1\",\"nonce\":\"9980df5a63\",\"addedToCartText\":\"was added to cart\",\"viewCart\":\"View Cart\",\"comparePageID\":\"\",\"comparePageURL\":\"http:\\/\\/38.54.116.130\\/\",\"wishlistPageID\":\"\",\"wishlistPageURL\":\"http:\\/\\/38.54.116.130\\/\",\"chooseQuantityText\":\"Please select the required number of items.\",\"site_key\":\"\",\"is_admin\":\"\",\"input_empty\":\"Please fill out this field\",\"select_empty\":\"Nothing selected\",\"file_empty\":\"Please upload a file\",\"recaptcha_error\":\"Recaptcha Error\"};\nvar use_web_pwd_hint = \"1\";\nvar rsa_pub_key = \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/PWYMq4JjRBePpo5TFTz3Q/8ppT0I+kpk/Ust8RJ8EI2Ecx4q6mD9UBipcgHCPXIDBQ3pXtLIyFUdK88zjM2/l8+c2uClFUUHIpvvAKGyJJ/soWb4sE2kkrQSLuJI/UAdNmeQKeWFI/kY0AbAYX20Xbzo0kF51FzQa87QkrYzRwIDAQAB\";\nvar rsa_session_key = \"7HMdgareP8qfc0pm1WwbiU2PM34PLe6UwS8e3zLUABDpD2aFbTtM3wmR1trOXztV\";\n</script>\n2mFBHMfn04aMAk5koolzUbtckUh\nCASMain.XGI?cmd=GetDirApp\nSolarView Compact\ntext ml10 mr20\nIsAdmId() {return 1;}\nCLIENT_ID=7214\ndisplayClient\nshortDetail\nlocation.href=\"ssi.cgi/Login.htm\";\n/cgi/maincgi.cgi?Url=VerifyCode\nRecorDing_ID: 1804289383\nGG_Bond\nglide.db.properties\nglide.db.name = admin\nglide.db.rdbms = admin\nglide.db.user = admin\nglide.db.url = http://127.0.0.1:8080\nPNG\nHillstone\ngetPwdHash(a,'7492')\nnt authority\\system\n2l0I1SczIudyqkhJ5vdqsXq0OV8\nSEC Explorer 666\n/home/locationIndex.action\nOpenMetadata\nfart\nc8c605999f3d8352d7bb792cf3fdb25b\nFaris on the mic :D\n('<input type=\"hidden\" value=\"62e7518a4e4284979\">').attr('root')\n2k32hiQWfLomfwa97XyIQ5xDfFY\n<TITLE>Web user login</TITLE>\n<META content=\"MSHTML 6.00.2900.5583\" name=GENERATOR></HEAD>\n6e18f3565138f9162e7518a4e4284979\nSSH key is good\ncgi-bin/luci #f47f3e\nSecExplorer666\nM1-Server 已启动\nTopAccess\njava.lang.ClassCastException\nHello, World!\nOllama is running\ncaption:uid=0(root) gid=0(root) groups=0(root)CAPTION\nStruts2-vuln-Check\nNUUO\nUploaded\nVMware vSphere is virtual infrastructure software for partitioning, consolidating and managing systems in mission-critical environments. VMware ESX Server provides a highly scalable platform with advanced resource management capabilities, which can be managed by vSphere.\nVMware vSphere 6\n<name=\"waninf\"><option value=\"1_INTERNET_R_VID_101\">\nplatform/pub/welcome.do\n4288f799d79394e0fdab0d4b7b7d98df\ndb4fd6a92c8bc6bb68953cd9b4f15a7f\nGLPI Copyright (C) 2015-2021 Tecli\nError 500: javax.servlet.ServletException: java.util.HashMap incompatible with [Ljava.lang.Objects;\nvar product_name=\"cnPilot R190W\";\nvar dev=\"cnPilot R190W\";\nLogout\nAdd media\nFile asdfadasdf.inc successfully uploaded as\n<script id=\"wp-api-request-js-extra\" type=\"litespeed/javascript\"> var wpApiSettings = {\"root\":\"http://192.168.88.127/wp-json/\",\"adminUrl\":\"http://192.168.88.127/wp-admin/admin-ajax.php\",\"nonce\":\"f771da26c4\",\"versionString\":\"wp/v2/\"}; </script>\n<script type=\"text/javascript\">var cpGlobals = {\"userLang\":\"eng\",\"enableWhiteLabel\":false,\"availableUiLanguages\":[\"eng\",\"jap\"],\"buildDir\":\"build-ndlB7Wgp\",\"jsSuffix\":\".gz\",\"title\":\"Check Point Security Appliance\",\"showDetailsOnLogin\":\"true\",\"gatewayName\":\"comrade-osaka.comrade\",\"showCustomUiLogo\":false,\"managedBySmp\":true,\"macAddr\":\"00:1C:7F:7E:B6:1B\",\"cssSuffix\":\".gz\"};</script>\nimg/login_bg3.png\n系统登录\n<li>Powered by AVideo ® Platform v14.0</li>\n<script>location='/tplus/';</script>\ndef_wirelesspassword = \"bGVvbmFyZG8yNjAyNzk=\";\ndef_SSID = \"QnJhc2lsbmV0X0xlb25hcmRv\";\ncln_MAC = \"00:00:00:00:00:00\";\nAdministrator PopojiCMS\n/login.php?a=version\nvar Edit_id=\"\";\nvar userSet_size=\"5\"\nvar User_index=new Array(10);\nvar User_username=new Array(10);\nvar User_password=new Array(10);\nvar User_privilege=new Array(10);\nUser_index[0]=\"1\";\nUser_username[0]=\"admin\";\nUser_password[0]=\"admin\";\nUser_privilege[0]=\"1\";\nUser_index[1]=\"2\";\nUser_username[1]=\"masteruser\";\nUser_password[1]=\"masterP4sss1*\";\nUser_privilege[1]=\"0\";\nHelloWorld\n./images/lg_05_1.gif\neoffice_loading_tip eoffice10\nSTk=4E1D466A8377449EC3BFABED58A66B14&Action=\ngambio\n<prodServerGen>12G</prodServerGen>\nf7e0b956540676a129760a3eae309294\ncsrfKey: \"265451f570ee4337099770cc4ba9e6ac\"\n0: 'test'},\nf76d6a5f7491700cc3a678bdba2902d3\nzapppaz\ncheckMacWaitingSecond\nHello JSP\nDeathShop\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=&channel=1&stream=0.sdp'\ncvlc 'rtsp://192.168.88.127:554/user=admin&password=tlJwpbo6&channel=1&stream=0.sdp'\n<div>A2Billing v2.0.16 is a <a href=\"http://www.star2billing.com/solutions/voip-billing/\" >voip billing software</a> licensed under the <a href=\"http://www.fsf.org/licensing/licenses/agpl-3.0.html\" target=\"_blank\">AGPL 3</a>. <br/>Copyright (C) 2004-2014 - Star2billing S.L. <a href=\"http://www.star2billing.com\" >http://www.star2billing.com/</a></div>\n<div><a href=\"http://www.freepbx.org\" >FreePBX</a> is a registered trademark of<br /><a href=\"http://www.freepbx.org/copyright.html\" > Sangoma Technologies Inc.</a><br />FreePBX 16.0.40.7 is licensed under the <a href=\"http://www.gnu.org/copyleft/gpl.html\" > GPL</a><br /></div>\n<label for=\"remember\">Stay logged in (30 days)</label>\nBroadBand Device Webserver\n<pre>root</pre>\n<pre>uid=0(root) gid=0(root) groups=0(root)</pre>\n<body><pre>FFA0<form><input type=button value=\n<h2>Step 4 - Live Run</h2>root<div class>\n<SCRIPT language=\"javascript\">window.location.href = \"/workflow/jsp/logon.jsp;jsessionid=4E1D466A8377449EC3BFABED58A66B14\";</SCRIPT> <a href=\"/workflow/logonAnonymous.do?FCWEB.FORM.TOKEN=Ujihw7gU3vjQk0uP3W73>\njava.lang.ProcessImpl\nLE6i.62Mb\ntitle=\"NORMAL_CISCO_IDENTITY\"\nownable\nPredator\n<img src=\"./img/free_login_ge.gif\"> <style>body {background-image:url(./img/login_bg.gif);background-repeat:no-repeat;background-position: top right;overflow: hidden;}</style>\n<a href=\"/accounts/profile/12h/\"><span class=\"glyphicon glyphicon-user\">\nconfirm_pkg_upgrade_invalid_signature confirm_not_sig\nwhySoSerious\n<title>Laravel</title><div class=\"title m-b-md\"><script> window.Laravel = {\"csrfToken\":\"iWCHokVPLZ70D5dMHWuhZlmiIY26GfYxpCoktCY2\"} </script><script> window.Laravel = {\"csrfToken\"} </script></div>\n<div id=\"telescope\" v-cloak><strong>Laravel</strong> Telescope</div>\nSet-Cookie: laravel_session=a0ffeb\nroot:RyaoMllbTpH2tyJNx76NR:0:1:root:/root:/bin/bash\n<link rel=\"stylesheet\" id=\"bricks-frontend-css\" href=\"/wp-content/themes/bricks/assets/css/frontend-light.min.css?ver=1707910954\" media=\"all\">\nCopyright (c) 2013, 2018 by Cisco Systems, Inc.\nAll rights reserved.\nyyoa\n{\"success\":true}\nStable tag: 2.8.2\nvar um_scripts = {\"max_upload_size\":\"8488608\",\"nonce\":\"95039b0c1d\"};\nlaravel\ncurrent date is Wed Feb 28 12:41:46 PM CST 2024\nDocument follows\nRunning Processes\nSaving file\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\"/>\nCopyright © 2024 Vinchin Technology Co., Ltd. All Rights Reserved © 2024 Vinchin Vinchin build: 5.0.0\nSRX300\n/cgi-bin/showhtml?page=login.html\nCPE200-CPE-V2.2-Build20200917120259\n<SID>0000000000000000</SID>\ndt:'21feec',cu:'21feec','zul.wgt.Button','11fe','zul.fud.FileuploadDlg','21fe','zul.wgt.Fileupload','31fe',\nwatchTowr:::0:::rwoThctaw\nEmpty{name=\nDestination host\nwelcome.cgi?p=logo\nTips:you can update now\n0: '/tmp//juniper2023_08_25.php'},\n/2amy7WZKDFL9B8a3ET8qeKizzr9/\nPlatform Administrator\n<PARAM NAME=\"ProductVersion\" VALUE=\"22.0\">\n<PARAM NAME=\"ProductName\" VALUE=\"VPN\">\n<PARAM NAME=\"DownloadPath\" VALUE=\"/vpn\">\n<PARAM NAME=\"DownloadPath64\" VALUE=\"/vpn\">\n<PARAM NAME=\"DisplayName\" VALUE=\"VPN\">\n<key>version</key>\n<string>22.0.00</string>\njdbc:vvv:12:vvv\nsalt='e22f7600'\n<span>Release 18.12.3 </span>\nBegin Screen component://\nBegin Template component://\nLocation: /dana-na/auth/url_default/welcome.cgi\nIgnition by Inductive Automation. Copyright © 2003-2024. All rights reserved.\n"documentation_url": null, "version_string": "2.0.1", "version_sha": null,\n/xwiki/\nD-Link\n<title>Telescope</title> Requests Commands Schedule\nThe Cisco AnyConnect VPN Client is required to connect to the SSLVPN server\n<CGI_Result><result>0</result><flag>0011</flag></CGI_Result>\nWHR-1166DHP4 Version 2.94\nWHR-1166DHP4 Version 2.95\n?csrftoken=5pr2cyjv\"\n5pr2cyjvj3jzi7t7d3jqaczjjgigz\n<div class=\"fxc_login_div\" id=\"login_title\"><span>#AccessEdge#</span></div>\nX-Citrix-Application: Receiver for Web\n{\"issuer\":\"root\"}\nCopyright (c) Realtek Semiconductor Corp., 2003. All Rights Reserved.\n<form action=/boaform/admin/formLogin method=POST name=\"cmlogin\">\nWww-Authenticate: Digest realm=\"[email protected]\", qop=\"auth\", nonce=\"a29d421feecf680a560a4c47b269b38e\", opaque=\"T3BhcXVlIHN0cmluZyBmb3IgQUNTIEF1dGhlbnRpY2F0aW9u\", Algorithm=\"MD5\"\nPublic: OPTIONS,DESCRIBE,SETUP,TEARDOWN,PLAY,SET_PARAMETER,GET_PARAMETER\nThe zip file did not contain an entry\nexportDescriptor.properties\nWww-Authenticate: Digest realm=\"HuaweiHomeGateway\",nonce=\"eef112713ba3f6c99c5904eb1b0eede1\", qop=\"auth\", algorithm=\"MD5\"\nZXHN H108N V2.5\nCopyright © Grandstream Networks, Inc. 2014-2023. All Rights Reserved.\n<form action=\"/boaform/admin/formLogin\" method=\"POST\" name=\"cmlogin\">\nGTEN Model 4 R2 Modem\nSet-Cookie: sesskey=22263a2bf; path=/; SESSID=da122263a2bd; sessionid=ff122263a2bf; webvpnLang=webvpnLang; webvpn=; webvpncontext=00000@SSLContext;\n/internal_forms_authentication/?targetId=7617d37d-d939-455a-b481-35181b7f10c8\nThe comparison expression does not consist of three elements: .ttf\n<p>This will reveal the <code>OWNCLOUD_ADMIN_USERNAME</code> and <code>OWNCLOUD_ADMIN_PASSWORD</code>\niootzq9htsfd101000ocjdqqnj6k21nlc\nphpkniht\nnamelifyxor\nUsername : jdoe\nCurrent privilege level : 15\nCurrent Mode/s : P_PRIV P_CONF\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<auth id=\"success\">\n<title>SSL VPN Service</title>\n<message>Success</message>\n<success/>\n</auth>\n<meta name=\"keywords\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<meta name=\"description\" content=\"VOS3000, VoIP, VoIP运营支撑系统, 软交换\">\n<link rel=\"shortcut icon\" href=\"images/vos3000.ico\">\n\"etcdserver\": \"3.5.1\"\n\"etcdcluster\": \"3.5.0\"\nWww-Authenticate: Digest qop=\"auth\", realm=\"[email protected]\", nonce=\"c51a9a66f1e8db196df6c57a5401d368\"\nisRunning\nSplunk\nvar check=\"0\";\n var authLevel =\"0\";\nvar name0=\"Admin\";\nvar password0=\"14036188\";\nvar authLevel0=\"255\";\nvar name1=\"Adm\";\nvar password1=\"1234\";\nvar authLevel1=\"3\";\nvar name2=\"CallCent\";\nvar password2=\"1234\";\nvar authLevel2=\"3\";\nvar name3=\"CallServ\";\nvar password3=\"1234\";\nvar authLevel3=\"3\";\nvar name4=\"Samping\";\nvar password4=\"1234\";\nvar authLevel4=\"3\";\nvar name5=\"\";\nvar password5=\"\";\nvar authLevel5=\"3\";\nvar name6=\"User6\";\nvar password6=\"8ni3eK\";\nvar authLevel6=\"3\";\nvar name7=\"User7\";\nvar password7=\"zeszeK\";\nvar authLevel7=\"3\";\nvar syspasswd=\"admin\";\nvar productid=\"HHDQV\";\nvar vendorid=\"QVIPCAM\";\nvar serialNum=\"al09026c29\";\nvar model=\"QV_IPC\";\nvar hardVersion=\"2016-09-20\";\nvar softVersion=\"V3.1.0.2\";\nvar ipcname=\"IPDoor-225E\";\nWelcome to the OGNL console!\nwebsite you are trying\n<QDocRoot version=\"1.0\">\n<command>Disconnect</command>\n<payload> </payload>\n</QDocRoot>\n[S]ild917120[E]\n[S]root[E]\n[S]\nroot\n[S]\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.login.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/ui.utility.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<script type=\"text/javascript\"><link href=\"../mifs/css/pages/userlogin.css?10.4\" rel=\"stylesheet\" type=\"text/css\" />\n<link href=\"../ui.9.0.0.11-31sv.js\" type=\"text/javascript\" />\n<tr><td colspan=\"3\"><h1>RouterOS WebFig Login</h1>\n<tr><td class=\"label\">Login: <td><input id=\"name\" type=\"text\" tabindex=\"1\">\n<li><a id=\"dologin\"><span>Login</span></a></li>\n<tr><td class=\"label\">Password: <td><input id=\"password\" type=\"password\" tabindex=\"2\">\n<div id=\"logo\"><span id=\"identity\"></span>RouterOS<span id=\"version\"></span>\nTest for CVE-2017-9841\n\nThe total of 1212*4577 is: 5541924\niWatchDVR.exe?1.2.0.42.exe\niWatch DVR for Windows XP/Vista/7/8\niWatchDVR.tar.gz?0.0.0.0.app\niWatch DVR for Mac OS X 10.6 or above\nOpenfire, Version: 4.7.4\nOpenNMS - Version: 32.0.0\nlogin box\nphpknit\nOFBiz.Visitor=\nApache OFBiz.\n<div id=\"loginBar\"><span>Login</sapn><div id=\"company-logo\"></div></div>\n<f-icon class=\"ftnt-fortinet-grid icon-xl\"></f-icon>\nredir=/remote/index&portal=/b\nredirect_suffix\n/css/qnap-default.css\n/redirect.html?count=\nMath.random()\n/indexnas.cgi?counter=\nqnap_hyperlink\nQNAP Systems, Inc.</a > All Rights Reserved.\nredir=/remote/hostcheck_install\nWelcome to Axis2 Web Admin Module !!\nresult= 0;\nSYNO.Core.Desktop.SessionData\nAccount.Maxuser\nUser1.Username=root\nUser1.Password=123\ncmd.php\nFirmware.Version=1011-1005-1008-1002\nMACAddress=00:0E:53:01:02:03\nProduct.Type=DVR\nProduct.ID=308B\nProduct.ShortName=V_full_Indep,V_Multistream\nVideo.System=PAL\nAudio.DownloadFormat=ULAW\nVideo.Input.Num=8\nVideo.Output.Num=1\nVideo.Format=H264,MJPEG\nVideo.Format.Default=H264\nVideo.Resolution=4CIF,CIF\nVideo.Quality=BEST,HIGH,NORMAL,BASIC\nVideo.Local.Input.Num=8\nVideo.Local.Output.Num=1\nVideo.Local.Format=H264,MJPEG\nAudio.Input.Num=8\nAudio.Output.Num=1\nAudio.Format=ULAW\nAudio.Local.Input.Num=8\nAudio.Local.Output.Num=1\nAudio.Local.Format=PCM\nLanguage.Default=ENGLISH\nLanguage.Support=ENGLISH&CHINESE&JAPANESE&FRANCE&GERMAN&SPANISH&PORTUGUESE&ITALIAN&TURKISH&POLISH&RUSSIAN&CUSTOMIZE&THAI&VIETNAM&DUTCH&GREEK&ARABIC&CZECH&HUNGARIAN&HEBREW&CHINA&\nCapability=D0,80,A,80\nPushNotify.MaxChannel=8\nWiFiber 121AC inMesh\nDBSTEP V3.0 0 14 0 请使用Post方法\nmultipleParameters\t0\tLinkem_01721A\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\t0\tlinkem123\n<StateContext>citrix_ctx</StateContext>\n<RedirectURL>/citrix.do</RedirectURL>\nhttp://127.0.0.1/users/password/edit?reset_password_token=01AF\n<input type=\"hidden\" name=\"authenticity_token\" value=\"01AF\" autocomplete=\"off\" />\nYour password has been changed successfully.\nIf your email address exists in our database\n<a href=\"/mailbox/?action=readMessageFull&[email protected]\">\njava.lang.reflect.InvocationTargetException\nFailed to read result object: null\nSetup Successful\n<script>top.location.href='/Main_Login.asp';</script>\nPRTG\nQNAP-NAS\nclean\nUSERNAME=admin\nPASSWD=21232f297a57a5a743894a0e4a801fc3\nCopyright (c) 2018 by Pulse Secure, LLC. All rights reserved\nAddress HWtype HWaddress Flags Mask Iface\n172.17.0.3 ether 01:82:ab:11:00:03 C docker0\ngateway ether 00:01:00:01:00:01 C eth0\ndnsflow01v.yc3.3 ether 00:01:00:01:00:01 C eth0\npamjump01v.yc3.36 ether 00:01:00:01:00:01 C eth0\n\nbin\nboot\ndev\ndnsmasq_setup.sh\netc\nlib\nlua_plu\nmnt\noverlay\nproc\nrom\nroot\nsbin\nsys\ntmp\nusr\nvar\nwww\n<script type=\"application/javascript\">\n try {\n require(\n ['security.pages'],\n function() {\n window.renderSecurityPage('login_user', {\"authSources\": [\"oauth2\", \"internal\"], \"authSourcesEnum\": {\"KERBEROS\": \"kerberos\", \"OAUTH2\": \"oauth2\"}, \"csrfToken\": \"IjVkMDQ2ZTFhY2Q4MjVjZWYzODVkZTlhMTVlNzNjNmYzNjhkZjIzMTEi.ZnDqzA.fj6Ma3tvkYCA1eSkFg3lQReOpr2\", \"forgotPassUrl\": \"/browser/reset_password\", \"langOptions\": [{\"label\": \"English\", \"value\": \"en\"}, {\"label\": \"Spanish\", \"value\": \"es\"}], \"loginBanner\": \"this is a docker backed admin portal\", \"loginUrl\": \"/authenticate/login\", \"oauth2Config\": [{\"OAUTH2_API_BASE_URL\": \"https://www.googleapis.com/oauth2/v2/\", \"OAUTH2_AUTHORIZATION_URL\": \"https://accounts.google.com/o/oauth2/auth\", \"OAUTH2_BUTTON_COLOR\": \"#3253a8\", \"OAUTH2_CLIENT_ID\": \"647858605616-0qmca6lhfmjgujj3r612tem2l3bkkemu.apps.googleusercontent.com\", \"OAUTH2_CLIENT_SECRET\": \"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\", \"OAUTH2_DISPLAY_NAME\": \"Google\", \"OAUTH2_ICON\": \"fa-google\", \"OAUTH2_NAME\": \"google\", \"OAUTH2_SCOPE\": \"openid email\", \"OAUTH2_SERVER_METADATA_URL\": \"https://accounts.google.com/.well-known/openid-configuration\", \"OAUTH2_TOKEN_URL\": \"https://oauth2.googleapis.com/token\", \"OAUTH2_USERINFO_ENDPOINT\": \"userinfo\"}], \"userLanguage\": \"en\"},\n {\"messages\": []});\n }, function() {\n console.log(arguments);\n }\n );\n} catch (err) {\n console.log(err);\n}\n</script>\n\nAddPortMapping('58969', '58969', '192.168.1.101') => OK\n38.54.116.130\n 14:01:07 up 2 days, 21:19, 2 users, load average: 0.26, 0.10, 0.07\n7398924\n3.9G\n756422\n\n\n\n-->\n<div>\n</body>\n</html>",
"body_murmur": -376922236,
"body_sha256": "58f394bebda9ff2a5938b7d8eb2e361598487bc38df66b5493dd7bfe2350239d",
"component": [
"WordPress",
"MySQL",
"PHP",
"Ruby on Rails",
"Ruby",
"Django",
"Python"
],
"content_length": 32528,
"favicon": {
"md5_hash": "b89adb697c786ef4c9553d2caf9fc409",
"murmur_hash": -17306567,
"path": "http://38.54.116.130:29092/favicon.ico",
"size": 827
},
"headers": {
"content_length": [
"32528"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 05 Apr 2025 09:54:21 GMT"
],
"server": [
"CPE-SERVER/1.0 Supports only GET"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "38.54.116.130:29092",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "SPECO WEB SETUP"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"cache_max_memory_size": 1073741824,
"cache_snapshot_memory_size": 26214400,
"cache_snapshot_write_cold_duration": "10m0s",
"compact_full_write_cold_duration": "4h0m0s",
"data_dir": "/usr/local/var/influxdb/data",
"max_concurrent_compactions": 0,
"max_index_log_file_size": 0,
"max_series_per_database": 1000000,
"max_values_per_tag": 100000,
"meta_dir": "/usr/local/var/influxdb/meta",
"series_id_set_cache_size": 0,
"wal_dir": "/usr/local/var/influxdb/wal",
"wal_fsync_delay": "0s"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"uptime": "29h4m13.433613s",
"version": "v2.1.1"
},
"ipp": {
"printer_uris": null,
"versions": null
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "FFEC6DA06FF36D1109F7A810B95837C4",
"fingerprint_sha1": "1C7EFD4DBBEC07567EA5D989C6DE121D59551847",
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"issuer_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"jarm": "3fd3fd20d00000000043d3fd3fd43d9d4f83ac87494648a3bed4ab670795cd",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5145723181762935798",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"SH"
],
"domain_component": [
"AD",
"local"
],
"organization": [
"TFNTVMNM"
],
"organizational_unit": [
"DXYJQBA"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_dn": "/C=SH/O=TFNTVMNM/CN=localhost/OU=DXYJQBA/DC=AD/DC=local",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "634ae9f2b5e49ab06bbd5772cadcf2ac5eca96196a3ffe4ca0190aba4b0fd531",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhiYTkwNDg4OTRmNDNkOWY4Njc5ZTUxMDlhNTk2OTJkMDI5YTliZDYwYjFiY2U2MWE2MzBkZjRjZjdlMTM2MGYwMWU4YmM1MGExMGFhZDhhOWNhYzdjMTIyNDE3YTE1OWRkMWNjNzRiOGI1MTA0Mzc2YTFkYTUxZWVhZTMxNzRkYWQ0MzUwYzVlNzMxNTkyYjZkYWMzZWQwN2MzNjRjZmI3YmE4ZjJhZWUwMTk1YzQxYTVlMzFjYjU2OWJiMmI0OWZlNGExYmU3NGYwYmJjZDQ3MWIyNTQwYjRlZjVlMDJmZWE3NWViM2JmZjBlNjQyMWM1NDNhNTJkZDZjZWUxNWI4MTk0MmQxYWIyZWI0Mjc5ZjY5Yzk5YWJkMDdkZmE1MmYxODljY2QxYjU4MzIyNDAyYjlhM2NiMzc5ZTE5ZGM3NmNiZTM4ZjhkYzFkMWYyNzZiMTIwZjIzODhjM2Q2OTI1MTVjMDRmOGY5M2ViZTgzZjVmNGQ0NDI1YjU0NWI3Y2QxODI1ZmY4NWYxM2FiMWE0MTYzZTMxM2RlM2MyYjYyYmM1ODI3ZDNkZGU0ZmRhM2Y5M2Q1MGZmYWI5NjRmZjFhN2E5ZGRlZTU2OWJjZDFiMWM4YjExYTM2Y2NmMWEyMjM2ZjQ5YTFmY2FlOGIxNWNhNzNiNDE4ZGZjYTFhOWZlN2NiYjYzOGE3MjZiMjBhODdjYzM4NmUyODI1ZmEwMDY3ZmM5ODc0ODZkMmFkNDczNmYwOTdmNzZjNDg3NGRiNGEzZDlmZTgwODQ1YmNlMjc0MzBkNjAxZWFlYWVkNjZjZmY5NGRiMDE3YTNlMzRkOWRlYzI1ODZjNWM2ZmQyNDk3MzMwZDc3NGZmZGJmMDFlMDg2MDYwOTU4ZWViODMwZTk2N2VkMDY1NDQwYzYyOWI5NjNkNDVmYmFjODIxMjAyYmVkMzM1YjNjZjA4ZWEwNzY2MjRkOTEwYWRlNTg2YjY2Mzg0M2ZjMjg2ZDY4ZmZlMTIzMjhmNTg5NDEyZjU0NzYzNTA3YmFiZjUyODgwZjllMDQwNmQ1OTZjNjgyYzllZDhkZTJkMTBmNTNhNThlYzI1YzA4ZWU5MDcwZDUyMzY2ZjNlMDI0MTM0NWU3ZmY1YjcwMzQwZTI5ZDIwMmMyZDQ5ZWI2ZmI3ODEzYjZhYTYzYmQ5YzgzMTY2NWU2M2JjMjc4ZDFhYTAwMDVlODczZTE0MzU1ZjZlYWZkNzU3M2ExZGZhZTM2ZDkxODM1M2Y3YjdjNGZkZjlmOTg3YTBkYTkyMzUyMGU1M2I0ZjE3ZDQ4NjdlN2Y0N2U5YjQ1ODUxZmU2NzE2ODIxYmQ4NjM0NTkyODVjMDljMWYzMzNjOTA3"
}
},
"tbs_fingerprint": "96003e4b54c707f7cc2ff692ae2a10fdda2f3d97be150186790faa5b4ae0eba3",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-04-02T12:12:27",
"not_before": "2025-04-02T12:12:27"
},
"version": 2
},
"fingerprint_sha256": "32148DA61ECC7D811E7B51108C326166F5EF915BCD73E7F33939FCF6915D9777",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"score": 4.8,
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2019-19851",
"score": 4.8,
"severity": "medium"
}
],
"url": "https://38.54.116.130:29092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-19T09:38:57.916Z"
}
],
"services_hash": "ee713e8d635ea004e84099f474058df9a7fbaaa4a511832cb34ace55538acda4",
"last_updated_at": "2025-04-19T10:56:45.439Z",
"banner": [
"ssh",
"http",
"influxdb",
"qnap",
"solrdb",
"tls",
"dnp3",
"mysql",
"couchdb",
"redis",
"elasticsearch",
"mongodb",
"ipp",
"memcached",
"pop3",
"smtp",
"consul",
"ftp",
"telnet",
"mssql"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"1434/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"1434/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"1434/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"1434/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2006-20001": {
"id": "CVE-2006-20001",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01",
"https://security.netapp.com/advisory/ntap-20230316-0005/"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2006-3747": {
"id": "CVE-2006-3747",
"references": [
"http://docs.info.apple.com/article.html?artnum=307562",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449",
"http://kbase.redhat.com/faq/FAQ_68_8653.shtm",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048267.html",
"http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048271.html",
"http://lwn.net/Alerts/194228/",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/21197",
"http://secunia.com/advisories/21241",
"http://secunia.com/advisories/21245",
"http://secunia.com/advisories/21247",
"http://secunia.com/advisories/21266",
"http://secunia.com/advisories/21273",
"http://secunia.com/advisories/21284",
"http://secunia.com/advisories/21307",
"http://secunia.com/advisories/21313",
"http://secunia.com/advisories/21315",
"http://secunia.com/advisories/21346",
"http://secunia.com/advisories/21478",
"http://secunia.com/advisories/21509",
"http://secunia.com/advisories/22262",
"http://secunia.com/advisories/22368",
"http://secunia.com/advisories/22388",
"http://secunia.com/advisories/22523",
"http://secunia.com/advisories/23028",
"http://secunia.com/advisories/23260",
"http://secunia.com/advisories/26329",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29849",
"http://secunia.com/advisories/30430",
"http://security.gentoo.org/glsa/glsa-200608-01.xml",
"http://securityreason.com/securityalert/1312",
"http://securitytracker.com/id?1016601",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1",
"http://svn.apache.org/viewvc?view=rev&revision=426144",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK29154",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK29156",
"http://www-1.ibm.com/support/docview.wss?uid=swg24013080",
"http://www-1.ibm.com/support/docview.wss?uid=swg27007951",
"http://www.apache.org/dist/httpd/Announcement2.0.html",
"http://www.debian.org/security/2006/dsa-1131",
"http://www.debian.org/security/2006/dsa-1132",
"http://www.kb.cert.org/vuls/id/395412",
"http://www.mandriva.com/security/advisories?name=MDKSA-2006:133",
"http://www.novell.com/linux/security/advisories/2006_43_apache.html",
"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.015-apache.html",
"http://www.osvdb.org/27588",
"http://www.securityfocus.com/archive/1/441485/100/0/threaded",
"http://www.securityfocus.com/archive/1/441487/100/0/threaded",
"http://www.securityfocus.com/archive/1/441526/100/200/threaded",
"http://www.securityfocus.com/archive/1/443870/100/0/threaded",
"http://www.securityfocus.com/archive/1/445206/100/0/threaded",
"http://www.securityfocus.com/archive/1/450321/100/0/threaded",
"http://www.securityfocus.com/bid/19204",
"http://www.ubuntu.com/usn/usn-328-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2006/3017",
"http://www.vupen.com/english/advisories/2006/3264",
"http://www.vupen.com/english/advisories/2006/3282",
"http://www.vupen.com/english/advisories/2006/3884",
"http://www.vupen.com/english/advisories/2006/3995",
"http://www.vupen.com/english/advisories/2006/4015",
"http://www.vupen.com/english/advisories/2006/4207",
"http://www.vupen.com/english/advisories/2006/4300",
"http://www.vupen.com/english/advisories/2006/4868",
"http://www.vupen.com/english/advisories/2007/2783",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1246/references",
"http://www.vupen.com/english/advisories/2008/1697",
"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/28063",
"https://issues.rpath.com/browse/RPL-538",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 7.6,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.",
"vector_string": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"weakness": "CWE-189"
},
"CVE-2006-5752": {
"id": "CVE-2006-5752",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://osvdb.org/37052",
"http://rhn.redhat.com/errata/RHSA-2007-0534.html",
"http://rhn.redhat.com/errata/RHSA-2007-0556.html",
"http://secunia.com/advisories/25827",
"http://secunia.com/advisories/25830",
"http://secunia.com/advisories/25873",
"http://secunia.com/advisories/25920",
"http://secunia.com/advisories/26273",
"http://secunia.com/advisories/26443",
"http://secunia.com/advisories/26458",
"http://secunia.com/advisories/26508",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27037",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28212",
"http://secunia.com/advisories/28224",
"http://secunia.com/advisories/28606",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1",
"http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"http://svn.apache.org/viewvc?view=rev&revision=549159",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:140",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:141",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:142",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/support/errata/RHSA-2007-0532.html",
"http://www.redhat.com/support/errata/RHSA-2007-0557.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/24645",
"http://www.securitytracker.com/id?1018302",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-499-1",
"http://www.vupen.com/english/advisories/2007/2727",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3386",
"http://www.vupen.com/english/advisories/2007/4305",
"http://www.vupen.com/english/advisories/2008/0233",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/35097",
"https://issues.rpath.com/browse/RPL-1500",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154",
"https://rhn.redhat.com/errata/RHSA-2007-0533.html",
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://osvdb.org/37052",
"http://rhn.redhat.com/errata/RHSA-2007-0534.html",
"http://rhn.redhat.com/errata/RHSA-2007-0556.html",
"http://secunia.com/advisories/25827",
"http://secunia.com/advisories/25830",
"http://secunia.com/advisories/25873",
"http://secunia.com/advisories/25920",
"http://secunia.com/advisories/26273",
"http://secunia.com/advisories/26443",
"http://secunia.com/advisories/26458",
"http://secunia.com/advisories/26508",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27037",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28212",
"http://secunia.com/advisories/28224",
"http://secunia.com/advisories/28606",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1",
"http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"http://svn.apache.org/viewvc?view=rev&revision=549159",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:140",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:141",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:142",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/support/errata/RHSA-2007-0532.html",
"http://www.redhat.com/support/errata/RHSA-2007-0557.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/24645",
"http://www.securitytracker.com/id?1018302",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-499-1",
"http://www.vupen.com/english/advisories/2007/2727",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3386",
"http://www.vupen.com/english/advisories/2007/4305",
"http://www.vupen.com/english/advisories/2008/0233",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/35097",
"https://issues.rpath.com/browse/RPL-1500",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154",
"https://rhn.redhat.com/errata/RHSA-2007-0533.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-1863": {
"id": "CVE-2007-1863",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://osvdb.org/37079",
"http://rhn.redhat.com/errata/RHSA-2007-0534.html",
"http://rhn.redhat.com/errata/RHSA-2007-0556.html",
"http://secunia.com/advisories/25830",
"http://secunia.com/advisories/25873",
"http://secunia.com/advisories/25920",
"http://secunia.com/advisories/26273",
"http://secunia.com/advisories/26443",
"http://secunia.com/advisories/26508",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27037",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28606",
"http://secunia.com/advisories/30430",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"http://svn.apache.org/viewvc?view=rev&revision=535617",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:140",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:141",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/support/errata/RHSA-2007-0557.html",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/24649",
"http://www.securitytracker.com/id?1018303",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-499-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2007/2727",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3386",
"http://www.vupen.com/english/advisories/2008/0233",
"http://www.vupen.com/english/advisories/2008/1697",
"https://issues.rpath.com/browse/RPL-1500",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824",
"https://rhn.redhat.com/errata/RHSA-2007-0533.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-3304": {
"id": "CVE-2007-3304",
"references": [
"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc",
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e",
"http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2",
"http://osvdb.org/38939",
"http://rhn.redhat.com/errata/RHSA-2007-0556.html",
"http://secunia.com/advisories/25827",
"http://secunia.com/advisories/25830",
"http://secunia.com/advisories/25920",
"http://secunia.com/advisories/26211",
"http://secunia.com/advisories/26273",
"http://secunia.com/advisories/26443",
"http://secunia.com/advisories/26508",
"http://secunia.com/advisories/26611",
"http://secunia.com/advisories/26759",
"http://secunia.com/advisories/26790",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27121",
"http://secunia.com/advisories/27209",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28212",
"http://secunia.com/advisories/28224",
"http://secunia.com/advisories/28606",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://security.psnc.pl/files/apache_report.pdf",
"http://securityreason.com/securityalert/2814",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1",
"http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm",
"http://svn.apache.org/viewvc?view=rev&revision=547987",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:140",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:142",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/errata/RHSA-2007-0532.html",
"http://www.redhat.com/support/errata/RHSA-2007-0557.html",
"http://www.redhat.com/support/errata/RHSA-2007-0662.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/469899/100/0/threaded",
"http://www.securityfocus.com/archive/1/471832/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/24215",
"http://www.securitytracker.com/id?1018304",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-499-1",
"http://www.vupen.com/english/advisories/2007/2727",
"http://www.vupen.com/english/advisories/2007/3100",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3420",
"http://www.vupen.com/english/advisories/2007/3494",
"http://www.vupen.com/english/advisories/2007/4305",
"http://www.vupen.com/english/advisories/2008/0233",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/35095",
"https://issues.rpath.com/browse/RPL-1710",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589",
"ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc",
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e",
"http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2",
"http://osvdb.org/38939",
"http://rhn.redhat.com/errata/RHSA-2007-0556.html",
"http://secunia.com/advisories/25827",
"http://secunia.com/advisories/25830",
"http://secunia.com/advisories/25920",
"http://secunia.com/advisories/26211",
"http://secunia.com/advisories/26273",
"http://secunia.com/advisories/26443",
"http://secunia.com/advisories/26508",
"http://secunia.com/advisories/26611",
"http://secunia.com/advisories/26759",
"http://secunia.com/advisories/26790",
"http://secunia.com/advisories/26822",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27121",
"http://secunia.com/advisories/27209",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28212",
"http://secunia.com/advisories/28224",
"http://secunia.com/advisories/28606",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://security.psnc.pl/files/apache_report.pdf",
"http://securityreason.com/securityalert/2814",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1",
"http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm",
"http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm",
"http://svn.apache.org/viewvc?view=rev&revision=547987",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:140",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:142",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/errata/RHSA-2007-0532.html",
"http://www.redhat.com/support/errata/RHSA-2007-0557.html",
"http://www.redhat.com/support/errata/RHSA-2007-0662.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/469899/100/0/threaded",
"http://www.securityfocus.com/archive/1/471832/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/24215",
"http://www.securitytracker.com/id?1018304",
"http://www.trustix.org/errata/2007/0026/",
"http://www.ubuntu.com/usn/usn-499-1",
"http://www.vupen.com/english/advisories/2007/2727",
"http://www.vupen.com/english/advisories/2007/3100",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3420",
"http://www.vupen.com/english/advisories/2007/3494",
"http://www.vupen.com/english/advisories/2007/4305",
"http://www.vupen.com/english/advisories/2008/0233",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/35095",
"https://issues.rpath.com/browse/RPL-1710",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589"
],
"score": 4.7,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"",
"vector_string": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2007-3847": {
"id": "CVE-2007-3847",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://docs.info.apple.com/article.html?artnum=307562",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=apache-cvs&m=118592992309395&w=2",
"http://marc.info/?l=apache-httpd-dev&m=118595556504202&w=2",
"http://marc.info/?l=apache-httpd-dev&m=118595953217856&w=2",
"http://secunia.com/advisories/26636",
"http://secunia.com/advisories/26722",
"http://secunia.com/advisories/26790",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26952",
"http://secunia.com/advisories/26993",
"http://secunia.com/advisories/27209",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27593",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/27882",
"http://secunia.com/advisories/27971",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28606",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28922",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/30430",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748",
"http://support.avaya.com/elmodocs2/security/ASA-2007-500.htm",
"http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK50469",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html",
"http://www.mandriva.com/security/advisories?name=MDKSA-2007:235",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/support/errata/RHSA-2007-0746.html",
"http://www.redhat.com/support/errata/RHSA-2007-0747.html",
"http://www.redhat.com/support/errata/RHSA-2007-0911.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/25489",
"http://www.securitytracker.com/id?1018633",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2007/3020",
"http://www.vupen.com/english/advisories/2007/3095",
"http://www.vupen.com/english/advisories/2007/3283",
"http://www.vupen.com/english/advisories/2007/3494",
"http://www.vupen.com/english/advisories/2007/3955",
"http://www.vupen.com/english/advisories/2008/0233",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1697",
"https://issues.rpath.com/browse/RPL-1710",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10525",
"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-125"
},
"CVE-2007-4465": {
"id": "CVE-2007-4465",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=186219",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://marc.info/?l=bugtraq&m=124654546101607&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://secunia.com/advisories/26842",
"http://secunia.com/advisories/26952",
"http://secunia.com/advisories/27563",
"http://secunia.com/advisories/27732",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/30430",
"http://secunia.com/advisories/31651",
"http://secunia.com/advisories/33105",
"http://secunia.com/advisories/35650",
"http://security.gentoo.org/glsa/glsa-200711-06.xml",
"http://securityreason.com/achievement_securityalert/46",
"http://securityreason.com/securityalert/3113",
"http://securitytracker.com/id?1019194",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://www.apache.org/dist/httpd/CHANGES_2.2.6",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.novell.com/linux/security/advisories/2007_61_apache2.html",
"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html",
"http://www.redhat.com/support/errata/RHSA-2007-0911.html",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/479237/100/0/threaded",
"http://www.securityfocus.com/bid/25653",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2008/1697",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36586",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089",
"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2007-5000": {
"id": "CVE-2007-5000",
"references": [
"http://docs.info.apple.com/article.html?artnum=307562",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/28046",
"http://secunia.com/advisories/28073",
"http://secunia.com/advisories/28081",
"http://secunia.com/advisories/28196",
"http://secunia.com/advisories/28375",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28525",
"http://secunia.com/advisories/28526",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28750",
"http://secunia.com/advisories/28922",
"http://secunia.com/advisories/28977",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/29806",
"http://secunia.com/advisories/29988",
"http://secunia.com/advisories/30356",
"http://secunia.com/advisories/30430",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/31142",
"http://secunia.com/advisories/32800",
"http://securitytracker.com/id?1019093",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK58024",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK58074",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273",
"http://www-1.ibm.com/support/docview.wss?uid=swg24019245",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200801e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:015",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:016",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/39134",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0007.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0009.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/494428/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/26838",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2007/4201",
"http://www.vupen.com/english/advisories/2007/4202",
"http://www.vupen.com/english/advisories/2007/4301",
"http://www.vupen.com/english/advisories/2008/0084",
"http://www.vupen.com/english/advisories/2008/0178",
"http://www.vupen.com/english/advisories/2008/0398",
"http://www.vupen.com/english/advisories/2008/0809/references",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1224/references",
"http://www.vupen.com/english/advisories/2008/1623/references",
"http://www.vupen.com/english/advisories/2008/1697",
"http://www.vupen.com/english/advisories/2008/1875/references",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39001",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39002",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html",
"http://docs.info.apple.com/article.html?artnum=307562",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/28046",
"http://secunia.com/advisories/28073",
"http://secunia.com/advisories/28081",
"http://secunia.com/advisories/28196",
"http://secunia.com/advisories/28375",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28525",
"http://secunia.com/advisories/28526",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28750",
"http://secunia.com/advisories/28922",
"http://secunia.com/advisories/28977",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/29806",
"http://secunia.com/advisories/29988",
"http://secunia.com/advisories/30356",
"http://secunia.com/advisories/30430",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/31142",
"http://secunia.com/advisories/32800",
"http://securitytracker.com/id?1019093",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK58024",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK58074",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273",
"http://www-1.ibm.com/support/docview.wss?uid=swg24019245",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200801e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:015",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:016",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/39134",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0007.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0009.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/494428/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/26838",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2007/4201",
"http://www.vupen.com/english/advisories/2007/4202",
"http://www.vupen.com/english/advisories/2007/4301",
"http://www.vupen.com/english/advisories/2008/0084",
"http://www.vupen.com/english/advisories/2008/0178",
"http://www.vupen.com/english/advisories/2008/0398",
"http://www.vupen.com/english/advisories/2008/0809/references",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1224/references",
"http://www.vupen.com/english/advisories/2008/1623/references",
"http://www.vupen.com/english/advisories/2008/1697",
"http://www.vupen.com/english/advisories/2008/1875/references",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39001",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39002",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2007-6203": {
"id": "CVE-2007-6203",
"references": [
"http://docs.info.apple.com/article.html?artnum=307562",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://procheckup.com/Vulnerability_PR07-37.php",
"http://secunia.com/advisories/27906",
"http://secunia.com/advisories/28196",
"http://secunia.com/advisories/29348",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/30356",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/33105",
"http://secunia.com/advisories/34219",
"http://security.gentoo.org/glsa/glsa-200803-19.xml",
"http://securityreason.com/securityalert/3411",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952",
"http://www-1.ibm.com/support/docview.wss?uid=swg24019245",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html",
"http://www.securityfocus.com/archive/1/484410/100/0/threaded",
"http://www.securityfocus.com/bid/26663",
"http://www.securitytracker.com/id?1019030",
"http://www.ubuntu.com/usn/USN-731-1",
"http://www.vupen.com/english/advisories/2007/4060",
"http://www.vupen.com/english/advisories/2007/4301",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1623/references",
"http://www.vupen.com/english/advisories/2008/1875/references",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/38800",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12166"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a \"413 Request Entity Too Large\" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2007-6388": {
"id": "CVE-2007-6388",
"references": [
"http://docs.info.apple.com/article.html?artnum=307562",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28526",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28922",
"http://secunia.com/advisories/28965",
"http://secunia.com/advisories/28977",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29504",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/29806",
"http://secunia.com/advisories/29988",
"http://secunia.com/advisories/30356",
"http://secunia.com/advisories/30430",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/31142",
"http://secunia.com/advisories/32800",
"http://secunia.com/advisories/33200",
"http://securityreason.com/securityalert/3541",
"http://securitytracker.com/id?1019154",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=689039",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK62966",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273",
"http://www-1.ibm.com/support/docview.wss?uid=swg24019245",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK59667&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200808e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:015",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:016",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0007.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0009.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/488082/100/0/threaded",
"http://www.securityfocus.com/archive/1/488082/100/0/threaded",
"http://www.securityfocus.com/archive/1/494428/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/27237",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2008/0047",
"http://www.vupen.com/english/advisories/2008/0447/references",
"http://www.vupen.com/english/advisories/2008/0554",
"http://www.vupen.com/english/advisories/2008/0809/references",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/0986/references",
"http://www.vupen.com/english/advisories/2008/1224/references",
"http://www.vupen.com/english/advisories/2008/1623/references",
"http://www.vupen.com/english/advisories/2008/1697",
"http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2008/05/023342-01.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39472",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10272",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html",
"http://docs.info.apple.com/article.html?artnum=307562",
"http://httpd.apache.org/security/vulnerabilities_13.html",
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28526",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28922",
"http://secunia.com/advisories/28965",
"http://secunia.com/advisories/28977",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29504",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/29806",
"http://secunia.com/advisories/29988",
"http://secunia.com/advisories/30356",
"http://secunia.com/advisories/30430",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/31142",
"http://secunia.com/advisories/32800",
"http://secunia.com/advisories/33200",
"http://securityreason.com/securityalert/3541",
"http://securitytracker.com/id?1019154",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=689039",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK62966",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273",
"http://www-1.ibm.com/support/docview.wss?uid=swg24019245",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PK59667&apar=only",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200808e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:015",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:016",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0007.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0009.html",
"http://www.redhat.com/support/errata/RHSA-2008-0261.html",
"http://www.securityfocus.com/archive/1/488082/100/0/threaded",
"http://www.securityfocus.com/archive/1/488082/100/0/threaded",
"http://www.securityfocus.com/archive/1/494428/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/498523/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/27237",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.us-cert.gov/cas/techalerts/TA08-150A.html",
"http://www.vupen.com/english/advisories/2008/0047",
"http://www.vupen.com/english/advisories/2008/0447/references",
"http://www.vupen.com/english/advisories/2008/0554",
"http://www.vupen.com/english/advisories/2008/0809/references",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/0986/references",
"http://www.vupen.com/english/advisories/2008/1224/references",
"http://www.vupen.com/english/advisories/2008/1623/references",
"http://www.vupen.com/english/advisories/2008/1697",
"http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2008/05/023342-01.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39472",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10272",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2007-6420": {
"id": "CVE-2007-6420",
"references": [
"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://secunia.com/advisories/31026",
"http://secunia.com/advisories/32222",
"http://secunia.com/advisories/33797",
"http://secunia.com/advisories/34219",
"http://security.gentoo.org/glsa/glsa-200807-06.xml",
"http://securityreason.com/securityalert/3523",
"http://support.apple.com/kb/HT3216",
"http://www.redhat.com/support/errata/RHSA-2008-0966.html",
"http://www.securityfocus.com/archive/1/486169/100/0/threaded",
"http://www.securityfocus.com/archive/1/494858/100/0/threaded",
"http://www.securityfocus.com/bid/27236",
"http://www.securityfocus.com/bid/31681",
"http://www.ubuntu.com/usn/USN-731-1",
"http://www.vupen.com/english/advisories/2008/2780",
"http://www.vupen.com/english/advisories/2009/0320",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-352"
},
"CVE-2007-6750": {
"id": "CVE-2007-6750",
"references": [
"http://archives.neohapsis.com/archives/bugtraq/2007-01/0229.html",
"http://ha.ckers.org/slowloris/",
"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://www.securityfocus.com/bid/21865",
"http://www.securitytracker.com/id/1038144",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/72345",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19481",
"http://archives.neohapsis.com/archives/bugtraq/2007-01/0229.html",
"http://ha.ckers.org/slowloris/",
"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://www.securityfocus.com/bid/21865",
"http://www.securitytracker.com/id/1038144",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/72345",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19481"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2008-0005": {
"id": "CVE-2008-0005",
"references": [
"http://docs.info.apple.com/article.html?artnum=307562",
"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html",
"http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
"http://marc.info/?l=bugtraq&m=124654546101607&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://secunia.com/advisories/28467",
"http://secunia.com/advisories/28471",
"http://secunia.com/advisories/28526",
"http://secunia.com/advisories/28607",
"http://secunia.com/advisories/28749",
"http://secunia.com/advisories/28977",
"http://secunia.com/advisories/29348",
"http://secunia.com/advisories/29420",
"http://secunia.com/advisories/29640",
"http://secunia.com/advisories/30732",
"http://secunia.com/advisories/35650",
"http://security.gentoo.org/glsa/glsa-200803-19.xml",
"http://securityreason.com/achievement_securityalert/49",
"http://securityreason.com/securityalert/3526",
"http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:014",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:015",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:016",
"http://www.redhat.com/support/errata/RHSA-2008-0004.html",
"http://www.redhat.com/support/errata/RHSA-2008-0005.html",
"http://www.redhat.com/support/errata/RHSA-2008-0006.html",
"http://www.redhat.com/support/errata/RHSA-2008-0007.html",
"http://www.redhat.com/support/errata/RHSA-2008-0008.html",
"http://www.redhat.com/support/errata/RHSA-2008-0009.html",
"http://www.securityfocus.com/archive/1/486167/100/0/threaded",
"http://www.securityfocus.com/archive/1/505990/100/0/threaded",
"http://www.securityfocus.com/bid/27234",
"http://www.securitytracker.com/id?1019185",
"http://www.ubuntu.com/usn/usn-575-1",
"http://www.vupen.com/english/advisories/2008/0924/references",
"http://www.vupen.com/english/advisories/2008/1875/references",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39615",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10812",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2008-0455": {
"id": "CVE-2008-0455",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1591.html",
"http://rhn.redhat.com/errata/RHSA-2012-1592.html",
"http://rhn.redhat.com/errata/RHSA-2012-1594.html",
"http://rhn.redhat.com/errata/RHSA-2013-0130.html",
"http://secunia.com/advisories/29348",
"http://secunia.com/advisories/51607",
"http://security.gentoo.org/glsa/glsa-200803-19.xml",
"http://securityreason.com/securityalert/3575",
"http://securitytracker.com/id?1019256",
"http://www.mindedsecurity.com/MSA01150108.html",
"http://www.securityfocus.com/archive/1/486847/100/0/threaded",
"http://www.securityfocus.com/bid/27409",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39867",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2008-0456": {
"id": "CVE-2008-0456",
"references": [
"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
"http://rhn.redhat.com/errata/RHSA-2013-0130.html",
"http://secunia.com/advisories/29348",
"http://secunia.com/advisories/35074",
"http://security.gentoo.org/glsa/glsa-200803-19.xml",
"http://securityreason.com/securityalert/3575",
"http://securitytracker.com/id?1019256",
"http://support.apple.com/kb/HT3549",
"http://www.mindedsecurity.com/MSA01150108.html",
"http://www.securityfocus.com/archive/1/486847/100/0/threaded",
"http://www.securityfocus.com/bid/27409",
"http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
"http://www.vupen.com/english/advisories/2009/1297",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/39893",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 2.6,
"services": [
"9042/http"
],
"severity": "low",
"summary": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"weakness": "CWE-74"
},
"CVE-2008-1531": {
"id": "CVE-2008-1531",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html",
"http://secunia.com/advisories/29505",
"http://secunia.com/advisories/29544",
"http://secunia.com/advisories/29636",
"http://secunia.com/advisories/29649",
"http://secunia.com/advisories/30023",
"http://security.gentoo.org/glsa/glsa-200804-08.xml",
"http://trac.lighttpd.net/trac/changeset/2136",
"http://trac.lighttpd.net/trac/changeset/2139",
"http://trac.lighttpd.net/trac/changeset/2140",
"http://trac.lighttpd.net/trac/ticket/285#comment:18",
"http://trac.lighttpd.net/trac/ticket/285#comment:21",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0132",
"http://www.debian.org/security/2008/dsa-1540",
"http://www.osvdb.org/43788",
"http://www.securityfocus.com/archive/1/490323/100/0/threaded",
"http://www.securityfocus.com/bid/28489",
"http://www.vupen.com/english/advisories/2008/1063/references",
"https://bugs.gentoo.org/show_bug.cgi?id=214892",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/41545",
"https://issues.rpath.com/browse/RPL-2407",
"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00562.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00587.html"
],
"score": 4.3,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2008-2364": {
"id": "CVE-2008-2364",
"references": [
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432",
"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://rhn.redhat.com/errata/RHSA-2008-0967.html",
"http://secunia.com/advisories/30621",
"http://secunia.com/advisories/31026",
"http://secunia.com/advisories/31404",
"http://secunia.com/advisories/31416",
"http://secunia.com/advisories/31651",
"http://secunia.com/advisories/31904",
"http://secunia.com/advisories/32222",
"http://secunia.com/advisories/32685",
"http://secunia.com/advisories/32838",
"http://secunia.com/advisories/33156",
"http://secunia.com/advisories/33797",
"http://secunia.com/advisories/34219",
"http://secunia.com/advisories/34259",
"http://secunia.com/advisories/34418",
"http://security.gentoo.org/glsa/glsa-200807-06.xml",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1",
"http://support.apple.com/kb/HT3216",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328",
"http://www-01.ibm.com/support/docview.wss?uid=swg27008517",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:195",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:237",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2008-0966.html",
"http://www.securityfocus.com/archive/1/494858/100/0/threaded",
"http://www.securityfocus.com/archive/1/498567/100/0/threaded",
"http://www.securityfocus.com/bid/29653",
"http://www.securityfocus.com/bid/31681",
"http://www.securitytracker.com/id?1020267",
"http://www.ubuntu.com/usn/USN-731-1",
"http://www.vupen.com/english/advisories/2008/1798",
"http://www.vupen.com/english/advisories/2008/2780",
"http://www.vupen.com/english/advisories/2009/0320",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/42987",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577",
"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html",
"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-770"
},
"CVE-2008-2939": {
"id": "CVE-2008-2939",
"references": [
"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://rhn.redhat.com/errata/RHSA-2008-0967.html",
"http://secunia.com/advisories/31384",
"http://secunia.com/advisories/31673",
"http://secunia.com/advisories/32685",
"http://secunia.com/advisories/32838",
"http://secunia.com/advisories/33156",
"http://secunia.com/advisories/33797",
"http://secunia.com/advisories/34219",
"http://secunia.com/advisories/35074",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1",
"http://support.apple.com/kb/HT3549",
"http://svn.apache.org/viewvc?view=rev&revision=682868",
"http://svn.apache.org/viewvc?view=rev&revision=682870",
"http://svn.apache.org/viewvc?view=rev&revision=682871",
"http://wiki.rpath.com/Advisories:rPSA-2008-0327",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937",
"http://www.kb.cert.org/vuls/id/663763",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:194",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:195",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:124",
"http://www.rapid7.com/advisories/R7-0033",
"http://www.redhat.com/support/errata/RHSA-2008-0966.html",
"http://www.securityfocus.com/archive/1/495180/100/0/threaded",
"http://www.securityfocus.com/archive/1/498566/100/0/threaded",
"http://www.securityfocus.com/archive/1/498567/100/0/threaded",
"http://www.securityfocus.com/bid/30560",
"http://www.securitytracker.com/id?1020635",
"http://www.ubuntu.com/usn/USN-731-1",
"http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
"http://www.vupen.com/english/advisories/2008/2315",
"http://www.vupen.com/english/advisories/2008/2461",
"http://www.vupen.com/english/advisories/2009/0320",
"http://www.vupen.com/english/advisories/2009/1297",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44223",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11316",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7716",
"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://marc.info/?l=bugtraq&m=123376588623823&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://marc.info/?l=bugtraq&m=125631037611762&w=2",
"http://rhn.redhat.com/errata/RHSA-2008-0967.html",
"http://secunia.com/advisories/31384",
"http://secunia.com/advisories/31673",
"http://secunia.com/advisories/32685",
"http://secunia.com/advisories/32838",
"http://secunia.com/advisories/33156",
"http://secunia.com/advisories/33797",
"http://secunia.com/advisories/34219",
"http://secunia.com/advisories/35074",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1",
"http://support.apple.com/kb/HT3549",
"http://svn.apache.org/viewvc?view=rev&revision=682868",
"http://svn.apache.org/viewvc?view=rev&revision=682870",
"http://svn.apache.org/viewvc?view=rev&revision=682871",
"http://wiki.rpath.com/Advisories:rPSA-2008-0327",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197",
"http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937",
"http://www.kb.cert.org/vuls/id/663763",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:194",
"http://www.mandriva.com/security/advisories?name=MDVSA-2008:195",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:124",
"http://www.rapid7.com/advisories/R7-0033",
"http://www.redhat.com/support/errata/RHSA-2008-0966.html",
"http://www.securityfocus.com/archive/1/495180/100/0/threaded",
"http://www.securityfocus.com/archive/1/498566/100/0/threaded",
"http://www.securityfocus.com/archive/1/498567/100/0/threaded",
"http://www.securityfocus.com/bid/30560",
"http://www.securitytracker.com/id?1020635",
"http://www.ubuntu.com/usn/USN-731-1",
"http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
"http://www.vupen.com/english/advisories/2008/2315",
"http://www.vupen.com/english/advisories/2008/2461",
"http://www.vupen.com/english/advisories/2009/0320",
"http://www.vupen.com/english/advisories/2009/1297",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44223",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11316",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7716"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2008-4298": {
"id": "CVE-2008-4298",
"references": [
"http://bugs.gentoo.org/show_bug.cgi?id=238180",
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html",
"http://secunia.com/advisories/32069",
"http://secunia.com/advisories/32132",
"http://secunia.com/advisories/32480",
"http://secunia.com/advisories/32834",
"http://secunia.com/advisories/32972",
"http://security.gentoo.org/glsa/glsa-200812-04.xml",
"http://trac.lighttpd.net/trac/changeset/2305",
"http://trac.lighttpd.net/trac/ticket/1774",
"http://wiki.rpath.com/Advisories:rPSA-2008-0309",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0309",
"http://www.debian.org/security/2008/dsa-1645",
"http://www.lighttpd.net/security/lighttpd_sa_2008_07.txt",
"http://www.openwall.com/lists/oss-security/2008/09/26/5",
"http://www.securityfocus.com/archive/1/497932/100/0/threaded",
"http://www.securityfocus.com/bid/31434",
"http://www.vupen.com/english/advisories/2008/2741",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45471"
],
"score": 5,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2008-4359": {
"id": "CVE-2008-4359",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html",
"http://openwall.com/lists/oss-security/2008/09/30/1",
"http://openwall.com/lists/oss-security/2008/09/30/2",
"http://openwall.com/lists/oss-security/2008/09/30/3",
"http://secunia.com/advisories/32069",
"http://secunia.com/advisories/32132",
"http://secunia.com/advisories/32480",
"http://secunia.com/advisories/32834",
"http://secunia.com/advisories/32972",
"http://security.gentoo.org/glsa/glsa-200812-04.xml",
"http://trac.lighttpd.net/trac/changeset/2278",
"http://trac.lighttpd.net/trac/changeset/2307",
"http://trac.lighttpd.net/trac/changeset/2309",
"http://trac.lighttpd.net/trac/changeset/2310",
"http://trac.lighttpd.net/trac/ticket/1720",
"http://wiki.rpath.com/Advisories:rPSA-2008-0309",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0309",
"http://www.debian.org/security/2008/dsa-1645",
"http://www.lighttpd.net/security/lighttpd-1.4.x_rewrite_redirect_decode_url.patch",
"http://www.lighttpd.net/security/lighttpd_sa_2008_05.txt",
"http://www.securityfocus.com/archive/1/497932/100/0/threaded",
"http://www.securityfocus.com/bid/31599",
"http://www.vupen.com/english/advisories/2008/2741",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45690"
],
"score": 7.5,
"services": [
"1911/http"
],
"severity": "high",
"summary": "lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-200"
},
"CVE-2008-4360": {
"id": "CVE-2008-4360",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html",
"http://openwall.com/lists/oss-security/2008/09/30/1",
"http://openwall.com/lists/oss-security/2008/09/30/2",
"http://openwall.com/lists/oss-security/2008/09/30/3",
"http://secunia.com/advisories/32069",
"http://secunia.com/advisories/32132",
"http://secunia.com/advisories/32480",
"http://secunia.com/advisories/32834",
"http://secunia.com/advisories/32972",
"http://security.gentoo.org/glsa/glsa-200812-04.xml",
"http://trac.lighttpd.net/trac/changeset/2283",
"http://trac.lighttpd.net/trac/changeset/2308",
"http://trac.lighttpd.net/trac/ticket/1589",
"http://wiki.rpath.com/Advisories:rPSA-2008-0309",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0309",
"http://www.debian.org/security/2008/dsa-1645",
"http://www.lighttpd.net/security/lighttpd-1.4.x_userdir_lowercase.patch",
"http://www.lighttpd.net/security/lighttpd_sa_2008_06.txt",
"http://www.securityfocus.com/archive/1/497932/100/0/threaded",
"http://www.securityfocus.com/bid/31600",
"http://www.vupen.com/english/advisories/2008/2741",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45689"
],
"score": 7.5,
"services": [
"1911/http"
],
"severity": "high",
"summary": "mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-200"
},
"CVE-2009-0023": {
"id": "CVE-2009-0023",
"references": [
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://secunia.com/advisories/34724",
"http://secunia.com/advisories/35284",
"http://secunia.com/advisories/35360",
"http://secunia.com/advisories/35395",
"http://secunia.com/advisories/35444",
"http://secunia.com/advisories/35487",
"http://secunia.com/advisories/35565",
"http://secunia.com/advisories/35710",
"http://secunia.com/advisories/35797",
"http://secunia.com/advisories/35843",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-03.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc?view=rev&revision=779880",
"http://wiki.rpath.com/Advisories:rPSA-2009-0144",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478",
"http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
"http://www.debian.org/security/2009/dsa-1812",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:131",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2009-1107.html",
"http://www.redhat.com/support/errata/RHSA-2009-1108.html",
"http://www.securityfocus.com/archive/1/507855/100/0/threaded",
"http://www.securityfocus.com/bid/35221",
"http://www.ubuntu.com/usn/usn-786-1",
"http://www.ubuntu.com/usn/usn-787-1",
"http://www.vupen.com/english/advisories/2009/1907",
"http://www.vupen.com/english/advisories/2009/3184",
"https://bugzilla.redhat.com/show_bug.cgi?id=503928",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/50964",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10968",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12321",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "CWE-119"
},
"CVE-2009-1195": {
"id": "CVE-2009-1195",
"references": [
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=apache-httpd-dev&m=124048996106302&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://osvdb.org/54733",
"http://secunia.com/advisories/35261",
"http://secunia.com/advisories/35264",
"http://secunia.com/advisories/35395",
"http://secunia.com/advisories/35453",
"http://secunia.com/advisories/35721",
"http://secunia.com/advisories/37152",
"http://security.gentoo.org/glsa/glsa-200907-04.xml",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc?view=rev&revision=772997",
"http://wiki.rpath.com/Advisories:rPSA-2009-0142",
"http://www.debian.org/security/2009/dsa-1816",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:124",
"http://www.redhat.com/support/errata/RHSA-2009-1075.html",
"http://www.redhat.com/support/errata/RHSA-2009-1156.html",
"http://www.securityfocus.com/archive/1/507852/100/0/threaded",
"http://www.securityfocus.com/archive/1/507857/100/0/threaded",
"http://www.securityfocus.com/bid/35115",
"http://www.securitytracker.com/id?1022296",
"http://www.ubuntu.com/usn/usn-787-1",
"http://www.vupen.com/english/advisories/2009/1444",
"http://www.vupen.com/english/advisories/2009/3184",
"https://bugzilla.redhat.com/show_bug.cgi?id=489436",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/50808",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11094",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12377",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8704",
"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
],
"score": 4.9,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"weakness": "CWE-16"
},
"CVE-2009-1890": {
"id": "CVE-2009-1890",
"references": [
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://osvdb.org/55553",
"http://secunia.com/advisories/35691",
"http://secunia.com/advisories/35721",
"http://secunia.com/advisories/35793",
"http://secunia.com/advisories/35865",
"http://secunia.com/advisories/37152",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-04.xml",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=790587&r2=790586&pathrev=790587",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?revision=790587",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=790587&r2=790586&pathrev=790587",
"http://svn.apache.org/viewvc?view=rev&revision=790587",
"http://wiki.rpath.com/Advisories:rPSA-2009-0142",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91259",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480",
"http://www.debian.org/security/2009/dsa-1834",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:149",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2009-1156.html",
"http://www.securityfocus.com/archive/1/507852/100/0/threaded",
"http://www.securityfocus.com/archive/1/507857/100/0/threaded",
"http://www.securityfocus.com/bid/35565",
"http://www.securitytracker.com/id?1022509",
"http://www.ubuntu.com/usn/USN-802-1",
"http://www.vupen.com/english/advisories/2009/3184",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb33be0aa9bd8cac9536293e3821dcd4cf8180ad95a8036eedd46365e%40%3Cusers.mina.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12330",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8616",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9403",
"https://rhn.redhat.com/errata/RHSA-2009-1148.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
],
"score": 7.1,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"weakness": "CWE-400"
},
"CVE-2009-1891": {
"id": "CVE-2009-1891",
"references": [
"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712",
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2",
"http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://osvdb.org/55782",
"http://secunia.com/advisories/35721",
"http://secunia.com/advisories/35781",
"http://secunia.com/advisories/35793",
"http://secunia.com/advisories/35865",
"http://secunia.com/advisories/37152",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-04.xml",
"http://support.apple.com/kb/HT3937",
"http://wiki.rpath.com/Advisories:rPSA-2009-0142",
"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480",
"http://www.debian.org/security/2009/dsa-1834",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:149",
"http://www.redhat.com/support/errata/RHSA-2009-1156.html",
"http://www.securityfocus.com/archive/1/507857/100/0/threaded",
"http://www.securitytracker.com/id?1022529",
"http://www.ubuntu.com/usn/USN-802-1",
"http://www.vupen.com/english/advisories/2009/1841",
"http://www.vupen.com/english/advisories/2009/3184",
"https://bugzilla.redhat.com/show_bug.cgi?id=509125",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248",
"https://rhn.redhat.com/errata/RHSA-2009-1148.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
],
"score": 7.1,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"weakness": "CWE-400"
},
"CVE-2009-1955": {
"id": "CVE-2009-1955",
"references": [
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://marc.info/?l=apr-dev&m=124396021826125&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://secunia.com/advisories/34724",
"http://secunia.com/advisories/35284",
"http://secunia.com/advisories/35360",
"http://secunia.com/advisories/35395",
"http://secunia.com/advisories/35444",
"http://secunia.com/advisories/35487",
"http://secunia.com/advisories/35565",
"http://secunia.com/advisories/35710",
"http://secunia.com/advisories/35797",
"http://secunia.com/advisories/35843",
"http://secunia.com/advisories/36473",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-03.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc?view=rev&revision=781403",
"http://wiki.rpath.com/Advisories:rPSA-2009-0123",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478",
"http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
"http://www.debian.org/security/2009/dsa-1812",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:131",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2009/06/03/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2009-1107.html",
"http://www.redhat.com/support/errata/RHSA-2009-1108.html",
"http://www.securityfocus.com/archive/1/506053/100/0/threaded",
"http://www.securityfocus.com/bid/35253",
"http://www.ubuntu.com/usn/usn-786-1",
"http://www.ubuntu.com/usn/usn-787-1",
"http://www.vupen.com/english/advisories/2009/1907",
"http://www.vupen.com/english/advisories/2009/3184",
"http://www.vupen.com/english/advisories/2010/1107",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473",
"https://www.exploit-db.com/exploits/8842",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html",
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://marc.info/?l=apr-dev&m=124396021826125&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://secunia.com/advisories/34724",
"http://secunia.com/advisories/35284",
"http://secunia.com/advisories/35360",
"http://secunia.com/advisories/35395",
"http://secunia.com/advisories/35444",
"http://secunia.com/advisories/35487",
"http://secunia.com/advisories/35565",
"http://secunia.com/advisories/35710",
"http://secunia.com/advisories/35797",
"http://secunia.com/advisories/35843",
"http://secunia.com/advisories/36473",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-03.xml",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc?view=rev&revision=781403",
"http://wiki.rpath.com/Advisories:rPSA-2009-0123",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478",
"http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
"http://www.debian.org/security/2009/dsa-1812",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:131",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2009/06/03/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2009-1107.html",
"http://www.redhat.com/support/errata/RHSA-2009-1108.html",
"http://www.securityfocus.com/archive/1/506053/100/0/threaded",
"http://www.securityfocus.com/bid/35253",
"http://www.ubuntu.com/usn/usn-786-1",
"http://www.ubuntu.com/usn/usn-787-1",
"http://www.vupen.com/english/advisories/2009/1907",
"http://www.vupen.com/english/advisories/2009/3184",
"http://www.vupen.com/english/advisories/2010/1107",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473",
"https://www.exploit-db.com/exploits/8842",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-776"
},
"CVE-2009-1956": {
"id": "CVE-2009-1956",
"references": [
"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://secunia.com/advisories/34724",
"http://secunia.com/advisories/35284",
"http://secunia.com/advisories/35395",
"http://secunia.com/advisories/35487",
"http://secunia.com/advisories/35565",
"http://secunia.com/advisories/35710",
"http://secunia.com/advisories/35797",
"http://secunia.com/advisories/35843",
"http://secunia.com/advisories/37221",
"http://security.gentoo.org/glsa/glsa-200907-03.xml",
"http://support.apple.com/kb/HT3937",
"http://svn.apache.org/viewvc?view=rev&revision=768417",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478",
"http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
"http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
"http://www.mail-archive.com/dev%40apr.apache.org/msg21591.html",
"http://www.mail-archive.com/dev%40apr.apache.org/msg21592.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:131",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2009/06/06/1",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2009-1107.html",
"http://www.redhat.com/support/errata/RHSA-2009-1108.html",
"http://www.securityfocus.com/bid/35251",
"http://www.ubuntu.com/usn/usn-786-1",
"http://www.ubuntu.com/usn/usn-787-1",
"http://www.vupen.com/english/advisories/2009/1907",
"http://www.vupen.com/english/advisories/2009/3184",
"https://bugzilla.redhat.com/show_bug.cgi?id=504390",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11567",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12237",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
],
"score": 6.4,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"weakness": "CWE-189"
},
"CVE-2009-2699": {
"id": "CVE-2009-2699",
"references": [
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://securitytracker.com/id?1022988",
"http://www.apache.org/dist/httpd/CHANGES_2.2.14",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.securityfocus.com/bid/36596",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/53666",
"https://issues.apache.org/bugzilla/show_bug.cgi?id=47645",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2009-3094": {
"id": "CVE-2009-3094",
"references": [
"http://intevydis.com/vd-list.shtml",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=bugtraq&m=126998684522511&w=2",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://secunia.com/advisories/36549",
"http://secunia.com/advisories/37152",
"http://wiki.rpath.com/Advisories:rPSA-2009-0155",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PK96858",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM09161",
"http://www.debian.org/security/2009/dsa-1934",
"http://www.intevydis.com/blog/?p=59",
"http://www.securityfocus.com/archive/1/508075/100/0/threaded",
"http://www.vupen.com/english/advisories/2010/0609",
"https://bugzilla.redhat.com/show_bug.cgi?id=521619",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10981",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8087",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html"
],
"score": 2.6,
"services": [
"9042/http"
],
"severity": "low",
"summary": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "CWE-476"
},
"CVE-2009-3095": {
"id": "CVE-2009-3095",
"references": [
"http://intevydis.com/vd-list.shtml",
"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=bugtraq&m=126998684522511&w=2",
"http://marc.info/?l=bugtraq&m=126998684522511&w=2",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://secunia.com/advisories/37152",
"http://support.apple.com/kb/HT4077",
"http://wiki.rpath.com/Advisories:rPSA-2009-0155",
"http://www.debian.org/security/2009/dsa-1934",
"http://www.securityfocus.com/archive/1/508075/100/0/threaded",
"https://bugzilla.redhat.com/show_bug.cgi?id=522209",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8662",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9363",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html",
"http://intevydis.com/vd-list.shtml",
"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"http://marc.info/?l=bugtraq&m=126998684522511&w=2",
"http://marc.info/?l=bugtraq&m=126998684522511&w=2",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://secunia.com/advisories/37152",
"http://support.apple.com/kb/HT4077",
"http://wiki.rpath.com/Advisories:rPSA-2009-0155",
"http://www.debian.org/security/2009/dsa-1934",
"http://www.securityfocus.com/archive/1/508075/100/0/threaded",
"https://bugzilla.redhat.com/show_bug.cgi?id=522209",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8662",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9363",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2009-3555": {
"id": "CVE-2009-3555",
"references": [
"http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html",
"http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html",
"http://blogs.iss.net/archive/sslmitmiscsrf.html",
"http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during",
"http://clicky.me/tlsvuln",
"http://extendedsubset.com/?p=8",
"http://extendedsubset.com/Renegotiating_TLS.pdf",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041",
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
"http://kbase.redhat.com/faq/docs/DOC-20491",
"http://lists.apple.com/archives/security-announce/2010//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2010//May/msg00002.html",
"http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html",
"http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html",
"http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2",
"http://marc.info/?l=bugtraq&m=126150535619567&w=2",
"http://marc.info/?l=bugtraq&m=126150535619567&w=2",
"http://marc.info/?l=bugtraq&m=127128920008563&w=2",
"http://marc.info/?l=bugtraq&m=127128920008563&w=2",
"http://marc.info/?l=bugtraq&m=127419602507642&w=2",
"http://marc.info/?l=bugtraq&m=127419602507642&w=2",
"http://marc.info/?l=bugtraq&m=127557596201693&w=2",
"http://marc.info/?l=bugtraq&m=127557596201693&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=132077688910227&w=2",
"http://marc.info/?l=bugtraq&m=132077688910227&w=2",
"http://marc.info/?l=bugtraq&m=133469267822771&w=2",
"http://marc.info/?l=bugtraq&m=133469267822771&w=2",
"http://marc.info/?l=bugtraq&m=134254866602253&w=2",
"http://marc.info/?l=bugtraq&m=142660345230545&w=2",
"http://marc.info/?l=bugtraq&m=142660345230545&w=2",
"http://marc.info/?l=cryptography&m=125752275331877&w=2",
"http://openbsd.org/errata45.html#010_openssl",
"http://openbsd.org/errata46.html#004_openssl",
"http://osvdb.org/60521",
"http://osvdb.org/60972",
"http://osvdb.org/62210",
"http://osvdb.org/65202",
"http://seclists.org/fulldisclosure/2009/Nov/139",
"http://secunia.com/advisories/37291",
"http://secunia.com/advisories/37292",
"http://secunia.com/advisories/37320",
"http://secunia.com/advisories/37383",
"http://secunia.com/advisories/37399",
"http://secunia.com/advisories/37453",
"http://secunia.com/advisories/37501",
"http://secunia.com/advisories/37504",
"http://secunia.com/advisories/37604",
"http://secunia.com/advisories/37640",
"http://secunia.com/advisories/37656",
"http://secunia.com/advisories/37675",
"http://secunia.com/advisories/37859",
"http://secunia.com/advisories/38003",
"http://secunia.com/advisories/38020",
"http://secunia.com/advisories/38056",
"http://secunia.com/advisories/38241",
"http://secunia.com/advisories/38484",
"http://secunia.com/advisories/38687",
"http://secunia.com/advisories/38781",
"http://secunia.com/advisories/39127",
"http://secunia.com/advisories/39136",
"http://secunia.com/advisories/39242",
"http://secunia.com/advisories/39243",
"http://secunia.com/advisories/39278",
"http://secunia.com/advisories/39292",
"http://secunia.com/advisories/39317",
"http://secunia.com/advisories/39461",
"http://secunia.com/advisories/39500",
"http://secunia.com/advisories/39628",
"http://secunia.com/advisories/39632",
"http://secunia.com/advisories/39713",
"http://secunia.com/advisories/39819",
"http://secunia.com/advisories/40070",
"http://secunia.com/advisories/40545",
"http://secunia.com/advisories/40747",
"http://secunia.com/advisories/40866",
"http://secunia.com/advisories/41480",
"http://secunia.com/advisories/41490",
"http://secunia.com/advisories/41818",
"http://secunia.com/advisories/41967",
"http://secunia.com/advisories/41972",
"http://secunia.com/advisories/42377",
"http://secunia.com/advisories/42379",
"http://secunia.com/advisories/42467",
"http://secunia.com/advisories/42724",
"http://secunia.com/advisories/42733",
"http://secunia.com/advisories/42808",
"http://secunia.com/advisories/42811",
"http://secunia.com/advisories/42816",
"http://secunia.com/advisories/43308",
"http://secunia.com/advisories/44183",
"http://secunia.com/advisories/44954",
"http://secunia.com/advisories/48577",
"http://security.gentoo.org/glsa/glsa-200912-01.xml",
"http://security.gentoo.org/glsa/glsa-201203-22.xml",
"http://security.gentoo.org/glsa/glsa-201406-32.xml",
"http://securitytracker.com/id?1023148",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1",
"http://support.apple.com/kb/HT4004",
"http://support.apple.com/kb/HT4170",
"http://support.apple.com/kb/HT4171",
"http://support.avaya.com/css/P8/documents/100070150",
"http://support.avaya.com/css/P8/documents/100081611",
"http://support.avaya.com/css/P8/documents/100114315",
"http://support.avaya.com/css/P8/documents/100114327",
"http://support.citrix.com/article/CTX123359",
"http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES",
"http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released",
"http://sysoev.ru/nginx/patch.cve-2009-3555.txt",
"http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html",
"http://ubuntu.com/usn/usn-923-1",
"http://wiki.rpath.com/Advisories:rPSA-2009-0155",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247",
"http://www-01.ibm.com/support/docview.wss?uid=swg21426108",
"http://www-01.ibm.com/support/docview.wss?uid=swg21432298",
"http://www-01.ibm.com/support/docview.wss?uid=swg24006386",
"http://www-01.ibm.com/support/docview.wss?uid=swg24025312",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only",
"http://www.arubanetworks.com/support/alerts/aid-020810.txt",
"http://www.betanews.com/article/1257452450",
"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml",
"http://www.debian.org/security/2009/dsa-1934",
"http://www.debian.org/security/2011/dsa-2141",
"http://www.debian.org/security/2015/dsa-3253",
"http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html",
"http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html",
"http://www.ietf.org/mail-archive/web/tls/current/msg03928.html",
"http://www.ietf.org/mail-archive/web/tls/current/msg03948.html",
"http://www.ingate.com/Relnote.php?ver=481",
"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"http://www.kb.cert.org/vuls/id/120541",
"http://www.links.org/?p=780",
"http://www.links.org/?p=786",
"http://www.links.org/?p=789",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:089",
"http://www.mozilla.org/security/announce/2010/mfsa2010-22.html",
"http://www.openoffice.org/security/cves/CVE-2009-3555.html",
"http://www.openssl.org/news/secadv_20091111.txt",
"http://www.openwall.com/lists/oss-security/2009/11/05/3",
"http://www.openwall.com/lists/oss-security/2009/11/05/5",
"http://www.openwall.com/lists/oss-security/2009/11/06/3",
"http://www.openwall.com/lists/oss-security/2009/11/07/3",
"http://www.openwall.com/lists/oss-security/2009/11/20/1",
"http://www.openwall.com/lists/oss-security/2009/11/23/10",
"http://www.opera.com/docs/changelogs/unix/1060/",
"http://www.opera.com/support/search/view/944/",
"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c",
"http://www.redhat.com/support/errata/RHSA-2010-0119.html",
"http://www.redhat.com/support/errata/RHSA-2010-0130.html",
"http://www.redhat.com/support/errata/RHSA-2010-0155.html",
"http://www.redhat.com/support/errata/RHSA-2010-0165.html",
"http://www.redhat.com/support/errata/RHSA-2010-0167.html",
"http://www.redhat.com/support/errata/RHSA-2010-0337.html",
"http://www.redhat.com/support/errata/RHSA-2010-0338.html",
"http://www.redhat.com/support/errata/RHSA-2010-0339.html",
"http://www.redhat.com/support/errata/RHSA-2010-0768.html",
"http://www.redhat.com/support/errata/RHSA-2010-0770.html",
"http://www.redhat.com/support/errata/RHSA-2010-0786.html",
"http://www.redhat.com/support/errata/RHSA-2010-0807.html",
"http://www.redhat.com/support/errata/RHSA-2010-0865.html",
"http://www.redhat.com/support/errata/RHSA-2010-0986.html",
"http://www.redhat.com/support/errata/RHSA-2010-0987.html",
"http://www.redhat.com/support/errata/RHSA-2011-0880.html",
"http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html",
"http://www.securityfocus.com/archive/1/507952/100/0/threaded",
"http://www.securityfocus.com/archive/1/508075/100/0/threaded",
"http://www.securityfocus.com/archive/1/508130/100/0/threaded",
"http://www.securityfocus.com/archive/1/515055/100/0/threaded",
"http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"http://www.securityfocus.com/archive/1/522176",
"http://www.securityfocus.com/archive/1/522176",
"http://www.securityfocus.com/bid/36935",
"http://www.securitytracker.com/id?1023163",
"http://www.securitytracker.com/id?1023204",
"http://www.securitytracker.com/id?1023205",
"http://www.securitytracker.com/id?1023206",
"http://www.securitytracker.com/id?1023207",
"http://www.securitytracker.com/id?1023208",
"http://www.securitytracker.com/id?1023209",
"http://www.securitytracker.com/id?1023210",
"http://www.securitytracker.com/id?1023211",
"http://www.securitytracker.com/id?1023212",
"http://www.securitytracker.com/id?1023213",
"http://www.securitytracker.com/id?1023214",
"http://www.securitytracker.com/id?1023215",
"http://www.securitytracker.com/id?1023216",
"http://www.securitytracker.com/id?1023217",
"http://www.securitytracker.com/id?1023218",
"http://www.securitytracker.com/id?1023219",
"http://www.securitytracker.com/id?1023224",
"http://www.securitytracker.com/id?1023243",
"http://www.securitytracker.com/id?1023270",
"http://www.securitytracker.com/id?1023271",
"http://www.securitytracker.com/id?1023272",
"http://www.securitytracker.com/id?1023273",
"http://www.securitytracker.com/id?1023274",
"http://www.securitytracker.com/id?1023275",
"http://www.securitytracker.com/id?1023411",
"http://www.securitytracker.com/id?1023426",
"http://www.securitytracker.com/id?1023427",
"http://www.securitytracker.com/id?1023428",
"http://www.securitytracker.com/id?1024789",
"http://www.tombom.co.uk/blog/?p=85",
"http://www.ubuntu.com/usn/USN-1010-1",
"http://www.ubuntu.com/usn/USN-927-1",
"http://www.ubuntu.com/usn/USN-927-4",
"http://www.ubuntu.com/usn/USN-927-5",
"http://www.us-cert.gov/cas/techalerts/TA10-222A.html",
"http://www.us-cert.gov/cas/techalerts/TA10-287A.html",
"http://www.vmware.com/security/advisories/VMSA-2010-0019.html",
"http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"http://www.vupen.com/english/advisories/2009/3164",
"http://www.vupen.com/english/advisories/2009/3165",
"http://www.vupen.com/english/advisories/2009/3205",
"http://www.vupen.com/english/advisories/2009/3220",
"http://www.vupen.com/english/advisories/2009/3310",
"http://www.vupen.com/english/advisories/2009/3313",
"http://www.vupen.com/english/advisories/2009/3353",
"http://www.vupen.com/english/advisories/2009/3354",
"http://www.vupen.com/english/advisories/2009/3484",
"http://www.vupen.com/english/advisories/2009/3521",
"http://www.vupen.com/english/advisories/2009/3587",
"http://www.vupen.com/english/advisories/2010/0086",
"http://www.vupen.com/english/advisories/2010/0173",
"http://www.vupen.com/english/advisories/2010/0748",
"http://www.vupen.com/english/advisories/2010/0848",
"http://www.vupen.com/english/advisories/2010/0916",
"http://www.vupen.com/english/advisories/2010/0933",
"http://www.vupen.com/english/advisories/2010/0982",
"http://www.vupen.com/english/advisories/2010/0994",
"http://www.vupen.com/english/advisories/2010/1054",
"http://www.vupen.com/english/advisories/2010/1107",
"http://www.vupen.com/english/advisories/2010/1191",
"http://www.vupen.com/english/advisories/2010/1350",
"http://www.vupen.com/english/advisories/2010/1639",
"http://www.vupen.com/english/advisories/2010/1673",
"http://www.vupen.com/english/advisories/2010/1793",
"http://www.vupen.com/english/advisories/2010/2010",
"http://www.vupen.com/english/advisories/2010/2745",
"http://www.vupen.com/english/advisories/2010/3069",
"http://www.vupen.com/english/advisories/2010/3086",
"http://www.vupen.com/english/advisories/2010/3126",
"http://www.vupen.com/english/advisories/2011/0032",
"http://www.vupen.com/english/advisories/2011/0033",
"http://www.vupen.com/english/advisories/2011/0086",
"http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html",
"https://bugzilla.mozilla.org/show_bug.cgi?id=526689",
"https://bugzilla.mozilla.org/show_bug.cgi?id=545755",
"https://bugzilla.redhat.com/show_bug.cgi?id=533125",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/54158",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888",
"https://kb.bluecoat.com/index?page=content&id=SA50",
"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10088",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11578",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11617",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7315",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7478",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7973",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8366",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8535",
"https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html",
"https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html",
"http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html",
"http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html",
"http://blogs.iss.net/archive/sslmitmiscsrf.html",
"http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during",
"http://clicky.me/tlsvuln",
"http://extendedsubset.com/?p=8",
"http://extendedsubset.com/Renegotiating_TLS.pdf",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041",
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
"http://kbase.redhat.com/faq/docs/DOC-20491",
"http://lists.apple.com/archives/security-announce/2010//May/msg00001.html",
"http://lists.apple.com/archives/security-announce/2010//May/msg00002.html",
"http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html",
"http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html",
"http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2",
"http://marc.info/?l=bugtraq&m=126150535619567&w=2",
"http://marc.info/?l=bugtraq&m=126150535619567&w=2",
"http://marc.info/?l=bugtraq&m=127128920008563&w=2",
"http://marc.info/?l=bugtraq&m=127128920008563&w=2",
"http://marc.info/?l=bugtraq&m=127419602507642&w=2",
"http://marc.info/?l=bugtraq&m=127419602507642&w=2",
"http://marc.info/?l=bugtraq&m=127557596201693&w=2",
"http://marc.info/?l=bugtraq&m=127557596201693&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=130497311408250&w=2",
"http://marc.info/?l=bugtraq&m=132077688910227&w=2",
"http://marc.info/?l=bugtraq&m=132077688910227&w=2",
"http://marc.info/?l=bugtraq&m=133469267822771&w=2",
"http://marc.info/?l=bugtraq&m=133469267822771&w=2",
"http://marc.info/?l=bugtraq&m=134254866602253&w=2",
"http://marc.info/?l=bugtraq&m=142660345230545&w=2",
"http://marc.info/?l=bugtraq&m=142660345230545&w=2",
"http://marc.info/?l=cryptography&m=125752275331877&w=2",
"http://openbsd.org/errata45.html#010_openssl",
"http://openbsd.org/errata46.html#004_openssl",
"http://osvdb.org/60521",
"http://osvdb.org/60972",
"http://osvdb.org/62210",
"http://osvdb.org/65202",
"http://seclists.org/fulldisclosure/2009/Nov/139",
"http://secunia.com/advisories/37291",
"http://secunia.com/advisories/37292",
"http://secunia.com/advisories/37320",
"http://secunia.com/advisories/37383",
"http://secunia.com/advisories/37399",
"http://secunia.com/advisories/37453",
"http://secunia.com/advisories/37501",
"http://secunia.com/advisories/37504",
"http://secunia.com/advisories/37604",
"http://secunia.com/advisories/37640",
"http://secunia.com/advisories/37656",
"http://secunia.com/advisories/37675",
"http://secunia.com/advisories/37859",
"http://secunia.com/advisories/38003",
"http://secunia.com/advisories/38020",
"http://secunia.com/advisories/38056",
"http://secunia.com/advisories/38241",
"http://secunia.com/advisories/38484",
"http://secunia.com/advisories/38687",
"http://secunia.com/advisories/38781",
"http://secunia.com/advisories/39127",
"http://secunia.com/advisories/39136",
"http://secunia.com/advisories/39242",
"http://secunia.com/advisories/39243",
"http://secunia.com/advisories/39278",
"http://secunia.com/advisories/39292",
"http://secunia.com/advisories/39317",
"http://secunia.com/advisories/39461",
"http://secunia.com/advisories/39500",
"http://secunia.com/advisories/39628",
"http://secunia.com/advisories/39632",
"http://secunia.com/advisories/39713",
"http://secunia.com/advisories/39819",
"http://secunia.com/advisories/40070",
"http://secunia.com/advisories/40545",
"http://secunia.com/advisories/40747",
"http://secunia.com/advisories/40866",
"http://secunia.com/advisories/41480",
"http://secunia.com/advisories/41490",
"http://secunia.com/advisories/41818",
"http://secunia.com/advisories/41967",
"http://secunia.com/advisories/41972",
"http://secunia.com/advisories/42377",
"http://secunia.com/advisories/42379",
"http://secunia.com/advisories/42467",
"http://secunia.com/advisories/42724",
"http://secunia.com/advisories/42733",
"http://secunia.com/advisories/42808",
"http://secunia.com/advisories/42811",
"http://secunia.com/advisories/42816",
"http://secunia.com/advisories/43308",
"http://secunia.com/advisories/44183",
"http://secunia.com/advisories/44954",
"http://secunia.com/advisories/48577",
"http://security.gentoo.org/glsa/glsa-200912-01.xml",
"http://security.gentoo.org/glsa/glsa-201203-22.xml",
"http://security.gentoo.org/glsa/glsa-201406-32.xml",
"http://securitytracker.com/id?1023148",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1",
"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1",
"http://support.apple.com/kb/HT4004",
"http://support.apple.com/kb/HT4170",
"http://support.apple.com/kb/HT4171",
"http://support.avaya.com/css/P8/documents/100070150",
"http://support.avaya.com/css/P8/documents/100081611",
"http://support.avaya.com/css/P8/documents/100114315",
"http://support.avaya.com/css/P8/documents/100114327",
"http://support.citrix.com/article/CTX123359",
"http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES",
"http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released",
"http://sysoev.ru/nginx/patch.cve-2009-3555.txt",
"http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html",
"http://ubuntu.com/usn/usn-923-1",
"http://wiki.rpath.com/Advisories:rPSA-2009-0155",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054",
"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247",
"http://www-01.ibm.com/support/docview.wss?uid=swg21426108",
"http://www-01.ibm.com/support/docview.wss?uid=swg21432298",
"http://www-01.ibm.com/support/docview.wss?uid=swg24006386",
"http://www-01.ibm.com/support/docview.wss?uid=swg24025312",
"http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only",
"http://www.arubanetworks.com/support/alerts/aid-020810.txt",
"http://www.betanews.com/article/1257452450",
"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml",
"http://www.debian.org/security/2009/dsa-1934",
"http://www.debian.org/security/2011/dsa-2141",
"http://www.debian.org/security/2015/dsa-3253",
"http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html",
"http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html",
"http://www.ietf.org/mail-archive/web/tls/current/msg03928.html",
"http://www.ietf.org/mail-archive/web/tls/current/msg03948.html",
"http://www.ingate.com/Relnote.php?ver=481",
"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"http://www.kb.cert.org/vuls/id/120541",
"http://www.links.org/?p=780",
"http://www.links.org/?p=786",
"http://www.links.org/?p=789",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:089",
"http://www.mozilla.org/security/announce/2010/mfsa2010-22.html",
"http://www.openoffice.org/security/cves/CVE-2009-3555.html",
"http://www.openssl.org/news/secadv_20091111.txt",
"http://www.openwall.com/lists/oss-security/2009/11/05/3",
"http://www.openwall.com/lists/oss-security/2009/11/05/5",
"http://www.openwall.com/lists/oss-security/2009/11/06/3",
"http://www.openwall.com/lists/oss-security/2009/11/07/3",
"http://www.openwall.com/lists/oss-security/2009/11/20/1",
"http://www.openwall.com/lists/oss-security/2009/11/23/10",
"http://www.opera.com/docs/changelogs/unix/1060/",
"http://www.opera.com/support/search/view/944/",
"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c",
"http://www.redhat.com/support/errata/RHSA-2010-0119.html",
"http://www.redhat.com/support/errata/RHSA-2010-0130.html",
"http://www.redhat.com/support/errata/RHSA-2010-0155.html",
"http://www.redhat.com/support/errata/RHSA-2010-0165.html",
"http://www.redhat.com/support/errata/RHSA-2010-0167.html",
"http://www.redhat.com/support/errata/RHSA-2010-0337.html",
"http://www.redhat.com/support/errata/RHSA-2010-0338.html",
"http://www.redhat.com/support/errata/RHSA-2010-0339.html",
"http://www.redhat.com/support/errata/RHSA-2010-0768.html",
"http://www.redhat.com/support/errata/RHSA-2010-0770.html",
"http://www.redhat.com/support/errata/RHSA-2010-0786.html",
"http://www.redhat.com/support/errata/RHSA-2010-0807.html",
"http://www.redhat.com/support/errata/RHSA-2010-0865.html",
"http://www.redhat.com/support/errata/RHSA-2010-0986.html",
"http://www.redhat.com/support/errata/RHSA-2010-0987.html",
"http://www.redhat.com/support/errata/RHSA-2011-0880.html",
"http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html",
"http://www.securityfocus.com/archive/1/507952/100/0/threaded",
"http://www.securityfocus.com/archive/1/508075/100/0/threaded",
"http://www.securityfocus.com/archive/1/508130/100/0/threaded",
"http://www.securityfocus.com/archive/1/515055/100/0/threaded",
"http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"http://www.securityfocus.com/archive/1/522176",
"http://www.securityfocus.com/archive/1/522176",
"http://www.securityfocus.com/bid/36935",
"http://www.securitytracker.com/id?1023163",
"http://www.securitytracker.com/id?1023204",
"http://www.securitytracker.com/id?1023205",
"http://www.securitytracker.com/id?1023206",
"http://www.securitytracker.com/id?1023207",
"http://www.securitytracker.com/id?1023208",
"http://www.securitytracker.com/id?1023209",
"http://www.securitytracker.com/id?1023210",
"http://www.securitytracker.com/id?1023211",
"http://www.securitytracker.com/id?1023212",
"http://www.securitytracker.com/id?1023213",
"http://www.securitytracker.com/id?1023214",
"http://www.securitytracker.com/id?1023215",
"http://www.securitytracker.com/id?1023216",
"http://www.securitytracker.com/id?1023217",
"http://www.securitytracker.com/id?1023218",
"http://www.securitytracker.com/id?1023219",
"http://www.securitytracker.com/id?1023224",
"http://www.securitytracker.com/id?1023243",
"http://www.securitytracker.com/id?1023270",
"http://www.securitytracker.com/id?1023271",
"http://www.securitytracker.com/id?1023272",
"http://www.securitytracker.com/id?1023273",
"http://www.securitytracker.com/id?1023274",
"http://www.securitytracker.com/id?1023275",
"http://www.securitytracker.com/id?1023411",
"http://www.securitytracker.com/id?1023426",
"http://www.securitytracker.com/id?1023427",
"http://www.securitytracker.com/id?1023428",
"http://www.securitytracker.com/id?1024789",
"http://www.tombom.co.uk/blog/?p=85",
"http://www.ubuntu.com/usn/USN-1010-1",
"http://www.ubuntu.com/usn/USN-927-1",
"http://www.ubuntu.com/usn/USN-927-4",
"http://www.ubuntu.com/usn/USN-927-5",
"http://www.us-cert.gov/cas/techalerts/TA10-222A.html",
"http://www.us-cert.gov/cas/techalerts/TA10-287A.html",
"http://www.vmware.com/security/advisories/VMSA-2010-0019.html",
"http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"http://www.vupen.com/english/advisories/2009/3164",
"http://www.vupen.com/english/advisories/2009/3165",
"http://www.vupen.com/english/advisories/2009/3205",
"http://www.vupen.com/english/advisories/2009/3220",
"http://www.vupen.com/english/advisories/2009/3310",
"http://www.vupen.com/english/advisories/2009/3313",
"http://www.vupen.com/english/advisories/2009/3353",
"http://www.vupen.com/english/advisories/2009/3354",
"http://www.vupen.com/english/advisories/2009/3484",
"http://www.vupen.com/english/advisories/2009/3521",
"http://www.vupen.com/english/advisories/2009/3587",
"http://www.vupen.com/english/advisories/2010/0086",
"http://www.vupen.com/english/advisories/2010/0173",
"http://www.vupen.com/english/advisories/2010/0748",
"http://www.vupen.com/english/advisories/2010/0848",
"http://www.vupen.com/english/advisories/2010/0916",
"http://www.vupen.com/english/advisories/2010/0933",
"http://www.vupen.com/english/advisories/2010/0982",
"http://www.vupen.com/english/advisories/2010/0994",
"http://www.vupen.com/english/advisories/2010/1054",
"http://www.vupen.com/english/advisories/2010/1107",
"http://www.vupen.com/english/advisories/2010/1191",
"http://www.vupen.com/english/advisories/2010/1350",
"http://www.vupen.com/english/advisories/2010/1639",
"http://www.vupen.com/english/advisories/2010/1673",
"http://www.vupen.com/english/advisories/2010/1793",
"http://www.vupen.com/english/advisories/2010/2010",
"http://www.vupen.com/english/advisories/2010/2745",
"http://www.vupen.com/english/advisories/2010/3069",
"http://www.vupen.com/english/advisories/2010/3086",
"http://www.vupen.com/english/advisories/2010/3126",
"http://www.vupen.com/english/advisories/2011/0032",
"http://www.vupen.com/english/advisories/2011/0033",
"http://www.vupen.com/english/advisories/2011/0086",
"http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html",
"https://bugzilla.mozilla.org/show_bug.cgi?id=526689",
"https://bugzilla.mozilla.org/show_bug.cgi?id=545755",
"https://bugzilla.redhat.com/show_bug.cgi?id=533125",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/54158",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888",
"https://kb.bluecoat.com/index?page=content&id=SA50",
"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10088",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11578",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11617",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7315",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7478",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7973",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8366",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8535",
"https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html",
"https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html"
],
"score": 5.8,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"weakness": "CWE-295"
},
"CVE-2009-3560": {
"id": "CVE-2009-3560",
"references": [
"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165",
"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165",
"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"http://lists.vmware.com/pipermail/security-announce/2010/000082.html",
"http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html",
"http://marc.info/?l=bugtraq&m=130168502603566&w=2",
"http://secunia.com/advisories/37537",
"http://secunia.com/advisories/38231",
"http://secunia.com/advisories/38794",
"http://secunia.com/advisories/38832",
"http://secunia.com/advisories/38834",
"http://secunia.com/advisories/39478",
"http://secunia.com/advisories/41701",
"http://secunia.com/advisories/43300",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1",
"http://www.debian.org/security/2009/dsa-1953",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:316",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.securityfocus.com/bid/37203",
"http://www.securitytracker.com/id?1023278",
"http://www.ubuntu.com/usn/USN-890-1",
"http://www.ubuntu.com/usn/USN-890-6",
"http://www.vupen.com/english/advisories/2010/0528",
"http://www.vupen.com/english/advisories/2010/0896",
"http://www.vupen.com/english/advisories/2010/1107",
"http://www.vupen.com/english/advisories/2011/0359",
"https://bugzilla.redhat.com/show_bug.cgi?id=533174",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-119"
},
"CVE-2009-3720": {
"id": "CVE-2009-3720",
"references": [
"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&view=patch",
"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051228.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051247.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051367.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051405.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051442.html",
"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"http://lists.vmware.com/pipermail/security-announce/2010/000082.html",
"http://mail.python.org/pipermail/expat-bugs/2009-January/002781.html",
"http://marc.info/?l=bugtraq&m=130168502603566&w=2",
"http://secunia.com/advisories/37324",
"http://secunia.com/advisories/37537",
"http://secunia.com/advisories/37925",
"http://secunia.com/advisories/38050",
"http://secunia.com/advisories/38231",
"http://secunia.com/advisories/38794",
"http://secunia.com/advisories/38832",
"http://secunia.com/advisories/38834",
"http://secunia.com/advisories/39478",
"http://secunia.com/advisories/41701",
"http://secunia.com/advisories/42326",
"http://secunia.com/advisories/42338",
"http://secunia.com/advisories/43300",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
"http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127",
"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1",
"http://svn.python.org/view?view=rev&revision=74429",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:211",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:212",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:215",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:216",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:217",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:218",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:219",
"http://www.mandriva.com/security/advisories?name=MDVSA-2009:220",
"http://www.openwall.com/lists/oss-security/2009/08/21/2",
"http://www.openwall.com/lists/oss-security/2009/08/26/3",
"http://www.openwall.com/lists/oss-security/2009/08/26/4",
"http://www.openwall.com/lists/oss-security/2009/08/27/6",
"http://www.openwall.com/lists/oss-security/2009/09/06/1",
"http://www.openwall.com/lists/oss-security/2009/10/22/5",
"http://www.openwall.com/lists/oss-security/2009/10/22/9",
"http://www.openwall.com/lists/oss-security/2009/10/23/2",
"http://www.openwall.com/lists/oss-security/2009/10/23/6",
"http://www.openwall.com/lists/oss-security/2009/10/26/3",
"http://www.openwall.com/lists/oss-security/2009/10/28/3",
"http://www.redhat.com/support/errata/RHSA-2010-0002.html",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.securitytracker.com/id?1023160",
"http://www.ubuntu.com/usn/USN-890-1",
"http://www.ubuntu.com/usn/USN-890-6",
"http://www.vupen.com/english/advisories/2010/0528",
"http://www.vupen.com/english/advisories/2010/0896",
"http://www.vupen.com/english/advisories/2010/1107",
"http://www.vupen.com/english/advisories/2010/3035",
"http://www.vupen.com/english/advisories/2010/3053",
"http://www.vupen.com/english/advisories/2010/3061",
"http://www.vupen.com/english/advisories/2011/0359",
"https://bugs.gentoo.org/show_bug.cgi?id=280615",
"https://bugzilla.redhat.com/show_bug.cgi?id=531697",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11019",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12719",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7112",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01274.html"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2010-0295": {
"id": "CVE-2010-0295",
"references": [
"http://blogs.sun.com/security/entry/cve_2010_0295_vulnerability_in",
"http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.x_fix_slow_request_dos.patch",
"http://download.lighttpd.net/lighttpd/security/lighttpd-1.5_fix_slow_request_dos.patch",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2010_01.txt",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041264.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041296.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041307.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html",
"http://redmine.lighttpd.net/issues/2147",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2710",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2711",
"http://secunia.com/advisories/38403",
"http://secunia.com/advisories/39765",
"http://security.gentoo.org/glsa/glsa-201006-17.xml",
"http://www.debian.org/security/2010/dsa-1987",
"http://www.openwall.com/lists/oss-security/2010/02/01/8",
"http://www.securityfocus.com/bid/38036",
"http://www.vupen.com/english/advisories/2011/0172",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56038",
"http://blogs.sun.com/security/entry/cve_2010_0295_vulnerability_in",
"http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.x_fix_slow_request_dos.patch",
"http://download.lighttpd.net/lighttpd/security/lighttpd-1.5_fix_slow_request_dos.patch",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2010_01.txt",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041264.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041296.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041307.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html",
"http://redmine.lighttpd.net/issues/2147",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2710",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2711",
"http://secunia.com/advisories/38403",
"http://secunia.com/advisories/39765",
"http://security.gentoo.org/glsa/glsa-201006-17.xml",
"http://www.debian.org/security/2010/dsa-1987",
"http://www.openwall.com/lists/oss-security/2010/02/01/8",
"http://www.securityfocus.com/bid/38036",
"http://www.vupen.com/english/advisories/2011/0172",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56038"
],
"score": 5,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow rate.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2010-0408": {
"id": "CVE-2010-0408",
"references": [
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://secunia.com/advisories/39100",
"http://secunia.com/advisories/39501",
"http://secunia.com/advisories/39628",
"http://secunia.com/advisories/39632",
"http://secunia.com/advisories/39656",
"http://secunia.com/advisories/40096",
"http://support.apple.com/kb/HT4435",
"http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/modules/proxy/mod_proxy_ajp.c?r1=917876&r2=917875&pathrev=917876",
"http://svn.apache.org/viewvc?view=revision&revision=917876",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829",
"http://www.debian.org/security/2010/dsa-2035",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:053",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.redhat.com/support/errata/RHSA-2010-0168.html",
"http://www.securityfocus.com/bid/38491",
"http://www.vupen.com/english/advisories/2010/0911",
"http://www.vupen.com/english/advisories/2010/0994",
"http://www.vupen.com/english/advisories/2010/1001",
"http://www.vupen.com/english/advisories/2010/1057",
"http://www.vupen.com/english/advisories/2010/1411",
"https://bugzilla.redhat.com/show_bug.cgi?id=569905",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8619",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9935"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2010-0425": {
"id": "CVE-2010-0425",
"references": [
"http://httpd.apache.org/security/vulnerabilities_20.html",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.vmware.com/pipermail/security-announce/2010/000105.html",
"http://secunia.com/advisories/38978",
"http://secunia.com/advisories/39628",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870",
"http://svn.apache.org/viewvc?view=revision&revision=917870",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247",
"http://www.kb.cert.org/vuls/id/280613",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/38494",
"http://www.securitytracker.com/id?1023701",
"http://www.senseofsecurity.com.au/advisories/SOS-10-002",
"http://www.vmware.com/security/advisories/VMSA-2010-0014.html",
"http://www.vupen.com/english/advisories/2010/0634",
"http://www.vupen.com/english/advisories/2010/0994",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56624",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439",
"https://www.exploit-db.com/exploits/11650"
],
"score": 10,
"services": [
"9042/http"
],
"severity": "high",
"summary": "modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and \"orphaned callback pointers.\"",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2010-0434": {
"id": "CVE-2010-0434",
"references": [
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html",
"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html",
"http://lists.vmware.com/pipermail/security-announce/2010/000105.html",
"http://marc.info/?l=bugtraq&m=127557640302499&w=2",
"http://secunia.com/advisories/39100",
"http://secunia.com/advisories/39115",
"http://secunia.com/advisories/39501",
"http://secunia.com/advisories/39628",
"http://secunia.com/advisories/39632",
"http://secunia.com/advisories/39656",
"http://secunia.com/advisories/40096",
"http://support.apple.com/kb/HT4435",
"http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h",
"http://svn.apache.org/viewvc?view=revision&revision=917867",
"http://svn.apache.org/viewvc?view=revision&revision=918427",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829",
"http://www.debian.org/security/2010/dsa-2035",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2010-0168.html",
"http://www.redhat.com/support/errata/RHSA-2010-0175.html",
"http://www.securityfocus.com/bid/38494",
"http://www.vmware.com/security/advisories/VMSA-2010-0014.html",
"http://www.vupen.com/english/advisories/2010/0911",
"http://www.vupen.com/english/advisories/2010/0994",
"http://www.vupen.com/english/advisories/2010/1001",
"http://www.vupen.com/english/advisories/2010/1057",
"http://www.vupen.com/english/advisories/2010/1411",
"https://bugzilla.redhat.com/show_bug.cgi?id=570171",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/56625",
"https://issues.apache.org/bugzilla/show_bug.cgi?id=48359",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2010-1452": {
"id": "CVE-2010-1452",
"references": [
"http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html",
"http://marc.info/?l=apache-announce&m=128009718610929&w=2",
"http://marc.info/?l=bugtraq&m=129190899612998&w=2",
"http://marc.info/?l=bugtraq&m=133355494609819&w=2",
"http://secunia.com/advisories/42367",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395",
"http://support.apple.com/kb/HT4581",
"http://ubuntu.com/usn/usn-1021-1",
"http://www.redhat.com/support/errata/RHSA-2010-0659.html",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.redhat.com/support/errata/RHSA-2011-0897.html",
"http://www.vupen.com/english/advisories/2010/2218",
"http://www.vupen.com/english/advisories/2010/3064",
"http://www.vupen.com/english/advisories/2011/0291",
"https://issues.apache.org/bugzilla/show_bug.cgi?id=49246",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2010-1623": {
"id": "CVE-2010-1623",
"references": [
"http://blogs.sun.com/security/entry/cve_2010_1623_memory_leak",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049885.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049939.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html",
"http://marc.info/?l=bugtraq&m=130168502603566&w=2",
"http://secunia.com/advisories/41701",
"http://secunia.com/advisories/42015",
"http://secunia.com/advisories/42361",
"http://secunia.com/advisories/42367",
"http://secunia.com/advisories/42403",
"http://secunia.com/advisories/42537",
"http://secunia.com/advisories/43211",
"http://secunia.com/advisories/43285",
"http://security-tracker.debian.org/tracker/CVE-2010-1623",
"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.627828",
"http://svn.apache.org/viewvc?view=revision&revision=1003492",
"http://svn.apache.org/viewvc?view=revision&revision=1003493",
"http://svn.apache.org/viewvc?view=revision&revision=1003494",
"http://svn.apache.org/viewvc?view=revision&revision=1003495",
"http://svn.apache.org/viewvc?view=revision&revision=1003626",
"http://ubuntu.com/usn/usn-1021-1",
"http://www-01.ibm.com/support/docview.wss?uid=swg1PM31601",
"http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
"http://www.mandriva.com/security/advisories?name=MDVSA-2010:192",
"http://www.redhat.com/support/errata/RHSA-2010-0950.html",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.redhat.com/support/errata/RHSA-2011-0897.html",
"http://www.securityfocus.com/bid/43673",
"http://www.ubuntu.com/usn/USN-1022-1",
"http://www.vupen.com/english/advisories/2010/2556",
"http://www.vupen.com/english/advisories/2010/2557",
"http://www.vupen.com/english/advisories/2010/2806",
"http://www.vupen.com/english/advisories/2010/3064",
"http://www.vupen.com/english/advisories/2010/3065",
"http://www.vupen.com/english/advisories/2010/3074",
"http://www.vupen.com/english/advisories/2011/0358",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12800"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-119"
},
"CVE-2011-0419": {
"id": "CVE-2011-0419",
"references": [
"http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22",
"http://cxib.net/stuff/apache.fnmatch.phps",
"http://cxib.net/stuff/apr_fnmatch.txts",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html",
"http://marc.info/?l=bugtraq&m=131551295528105&w=2",
"http://marc.info/?l=bugtraq&m=131551295528105&w=2",
"http://marc.info/?l=bugtraq&m=131731002122529&w=2",
"http://marc.info/?l=bugtraq&m=131731002122529&w=2",
"http://marc.info/?l=bugtraq&m=132033751509019&w=2",
"http://marc.info/?l=bugtraq&m=132033751509019&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://secunia.com/advisories/44490",
"http://secunia.com/advisories/44564",
"http://secunia.com/advisories/44574",
"http://secunia.com/advisories/48308",
"http://securityreason.com/achievement_securityalert/98",
"http://securityreason.com/securityalert/8246",
"http://securitytracker.com/id?1025527",
"http://support.apple.com/kb/HT5002",
"http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&r2=1098902",
"http://svn.apache.org/viewvc?view=revision&revision=1098188",
"http://svn.apache.org/viewvc?view=revision&revision=1098799",
"http://www.apache.org/dist/apr/Announcement1.x.html",
"http://www.apache.org/dist/apr/CHANGES-APR-1.4",
"http://www.apache.org/dist/httpd/Announcement2.2.html",
"http://www.debian.org/security/2011/dsa-2237",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23960.html",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23961.html",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23976.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:084",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2011-0507.html",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.redhat.com/support/errata/RHSA-2011-0897.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=703390",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14638",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14804",
"http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22",
"http://cxib.net/stuff/apache.fnmatch.phps",
"http://cxib.net/stuff/apr_fnmatch.txts",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html",
"http://marc.info/?l=bugtraq&m=131551295528105&w=2",
"http://marc.info/?l=bugtraq&m=131551295528105&w=2",
"http://marc.info/?l=bugtraq&m=131731002122529&w=2",
"http://marc.info/?l=bugtraq&m=131731002122529&w=2",
"http://marc.info/?l=bugtraq&m=132033751509019&w=2",
"http://marc.info/?l=bugtraq&m=132033751509019&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://secunia.com/advisories/44490",
"http://secunia.com/advisories/44564",
"http://secunia.com/advisories/44574",
"http://secunia.com/advisories/48308",
"http://securityreason.com/achievement_securityalert/98",
"http://securityreason.com/securityalert/8246",
"http://securitytracker.com/id?1025527",
"http://support.apple.com/kb/HT5002",
"http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&r2=1098902",
"http://svn.apache.org/viewvc?view=revision&revision=1098188",
"http://svn.apache.org/viewvc?view=revision&revision=1098799",
"http://www.apache.org/dist/apr/Announcement1.x.html",
"http://www.apache.org/dist/apr/CHANGES-APR-1.4",
"http://www.apache.org/dist/httpd/Announcement2.2.html",
"http://www.debian.org/security/2011/dsa-2237",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23960.html",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23961.html",
"http://www.mail-archive.com/dev%40apr.apache.org/msg23976.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:084",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.redhat.com/support/errata/RHSA-2011-0507.html",
"http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"http://www.redhat.com/support/errata/RHSA-2011-0897.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=703390",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14638",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14804"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "CWE-770"
},
"CVE-2011-3192": {
"id": "CVE-2011-3192",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html",
"http://blogs.oracle.com/security/entry/security_alert_for_cve_2011",
"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html",
"http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e",
"http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e",
"http://marc.info/?l=bugtraq&m=131551295528105&w=2",
"http://marc.info/?l=bugtraq&m=131731002122529&w=2",
"http://marc.info/?l=bugtraq&m=132033751509019&w=2",
"http://marc.info/?l=bugtraq&m=133477473521382&w=2",
"http://marc.info/?l=bugtraq&m=133951357207000&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://osvdb.org/74721",
"http://seclists.org/fulldisclosure/2011/Aug/175",
"http://secunia.com/advisories/45606",
"http://secunia.com/advisories/45937",
"http://secunia.com/advisories/46000",
"http://secunia.com/advisories/46125",
"http://secunia.com/advisories/46126",
"http://securitytracker.com/id?1025960",
"http://support.apple.com/kb/HT5002",
"http://www.apache.org/dist/httpd/Announcement2.2.html",
"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml",
"http://www.exploit-db.com/exploits/17696",
"http://www.gossamer-threads.com/lists/apache/dev/401638",
"http://www.kb.cert.org/vuls/id/405811",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:130",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"http://www.redhat.com/support/errata/RHSA-2011-1245.html",
"http://www.redhat.com/support/errata/RHSA-2011-1294.html",
"http://www.redhat.com/support/errata/RHSA-2011-1300.html",
"http://www.redhat.com/support/errata/RHSA-2011-1329.html",
"http://www.redhat.com/support/errata/RHSA-2011-1330.html",
"http://www.redhat.com/support/errata/RHSA-2011-1369.html",
"http://www.securityfocus.com/bid/49303",
"http://www.ubuntu.com/usn/USN-1199-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=732928",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/69396",
"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"https://issues.apache.org/bugzilla/show_bug.cgi?id=51714",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827"
],
"score": 7.8,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"weakness": "CWE-400"
},
"CVE-2011-3368": {
"id": "CVE-2011-3368",
"references": [
"http://kb.juniper.net/JSA10585",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html",
"http://marc.info/?l=bugtraq&m=133294460209056&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://osvdb.org/76079",
"http://rhn.redhat.com/errata/RHSA-2012-0542.html",
"http://rhn.redhat.com/errata/RHSA-2012-0543.html",
"http://seclists.org/fulldisclosure/2011/Oct/232",
"http://seclists.org/fulldisclosure/2011/Oct/273",
"http://secunia.com/advisories/46288",
"http://secunia.com/advisories/46414",
"http://secunia.com/advisories/48551",
"http://support.apple.com/kb/HT5501",
"http://svn.apache.org/viewvc?view=revision&revision=1179239",
"http://web.archiveorange.com/archive/v/ZyS0hzECD5zzb2NkvQlt",
"http://www-01.ibm.com/support/docview.wss?uid=nas2064c7e5f53452ff686257927003c8d42",
"http://www-01.ibm.com/support/docview.wss?uid=nas2b7c57b1f1035675186257927003c8d48",
"http://www.contextis.com/research/blog/reverseproxybypass/",
"http://www.debian.org/security/2012/dsa-2405",
"http://www.exploit-db.com/exploits/17969",
"http://www.mandriva.com/security/advisories?name=MDVSA-2011:144",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.redhat.com/support/errata/RHSA-2011-1391.html",
"http://www.redhat.com/support/errata/RHSA-2011-1392.html",
"http://www.securityfocus.com/bid/49957",
"http://www.securitytracker.com/id?1026144",
"https://bugzilla.redhat.com/show_bug.cgi?id=740045",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/70336",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-20"
},
"CVE-2011-3607": {
"id": "CVE-2011-3607",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html",
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://marc.info/?l=bugtraq&m=133294460209056&w=2",
"http://marc.info/?l=bugtraq&m=133494237717847&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"http://rhn.redhat.com/errata/RHSA-2012-0542.html",
"http://rhn.redhat.com/errata/RHSA-2012-0543.html",
"http://secunia.com/advisories/45793",
"http://secunia.com/advisories/48551",
"http://securitytracker.com/id?1026267",
"http://support.apple.com/kb/HT5501",
"http://www.debian.org/security/2012/dsa-2405",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/",
"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2012:003",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.osvdb.org/76744",
"http://www.securityfocus.com/bid/50494",
"https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422",
"https://bugzilla.redhat.com/show_bug.cgi?id=750935",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/71093",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 4.4,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.",
"vector_string": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"weakness": "CWE-189"
},
"CVE-2011-3639": {
"id": "CVE-2011-3639",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"http://svn.apache.org/viewvc?view=revision&revision=1188745",
"http://www.debian.org/security/2012/dsa-2405",
"https://bugzilla.redhat.com/show_bug.cgi?id=752080"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-20"
},
"CVE-2011-4317": {
"id": "CVE-2011-4317",
"references": [
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"http://kb.juniper.net/JSA10585",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html",
"http://marc.info/?l=bugtraq&m=133294460209056&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"http://secunia.com/advisories/48551",
"http://support.apple.com/kb/HT5501",
"http://thread.gmane.org/gmane.comp.apache.devel/46440",
"http://www.debian.org/security/2012/dsa-2405",
"http://www.mandriva.com/security/advisories?name=MDVSA-2012:003",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securitytracker.com/id?1026353",
"https://bugzilla.redhat.com/show_bug.cgi?id=756483",
"https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-20"
},
"CVE-2011-4362": {
"id": "CVE-2011-4362",
"references": [
"http://archives.neohapsis.com/archives/bugtraq/2011-12/0167.html",
"http://blog.pi3.com.pl/?p=277",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://redmine.lighttpd.net/issues/2370",
"http://secunia.com/advisories/47260",
"http://www.debian.org/security/2011/dsa-2368",
"http://www.exploit-db.com/exploits/18295",
"http://www.openwall.com/lists/oss-security/2011/11/29/13",
"http://www.openwall.com/lists/oss-security/2011/11/29/8",
"http://www.securitytracker.com/id?1026359",
"https://bugzilla.redhat.com/show_bug.cgi?id=758624",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/71536",
"http://archives.neohapsis.com/archives/bugtraq/2011-12/0167.html",
"http://blog.pi3.com.pl/?p=277",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://redmine.lighttpd.net/issues/2370",
"http://secunia.com/advisories/47260",
"http://www.debian.org/security/2011/dsa-2368",
"http://www.exploit-db.com/exploits/18295",
"http://www.openwall.com/lists/oss-security/2011/11/29/13",
"http://www.openwall.com/lists/oss-security/2011/11/29/8",
"http://www.securitytracker.com/id?1026359",
"https://bugzilla.redhat.com/show_bug.cgi?id=758624",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/71536"
],
"score": 5,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-2011-4415": {
"id": "CVE-2011-4415",
"references": [
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"http://www.gossamer-threads.com/lists/apache/dev/403775",
"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/",
"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html"
],
"score": 1.2,
"services": [
"9042/http"
],
"severity": "low",
"summary": "The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the \"len +=\" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.",
"vector_string": "AV:L/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2012-0031": {
"id": "CVE-2012-0031",
"references": [
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html",
"http://marc.info/?l=bugtraq&m=133294460209056&w=2",
"http://marc.info/?l=bugtraq&m=133494237717847&w=2",
"http://marc.info/?l=bugtraq&m=134987041210674&w=2",
"http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"http://rhn.redhat.com/errata/RHSA-2012-0542.html",
"http://rhn.redhat.com/errata/RHSA-2012-0543.html",
"http://secunia.com/advisories/47410",
"http://secunia.com/advisories/48551",
"http://support.apple.com/kb/HT5501",
"http://svn.apache.org/viewvc?view=revision&revision=1230065",
"http://www.debian.org/security/2012/dsa-2405",
"http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/",
"http://www.mandriva.com/security/advisories?name=MDVSA-2012:012",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/51407",
"https://bugzilla.redhat.com/show_bug.cgi?id=773744",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 4.6,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0053": {
"id": "CVE-2012-0053",
"references": [
"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://kb.juniper.net/JSA10585",
"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html",
"http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html",
"http://marc.info/?l=bugtraq&m=133294460209056&w=2",
"http://marc.info/?l=bugtraq&m=133494237717847&w=2",
"http://marc.info/?l=bugtraq&m=133951357207000&w=2",
"http://marc.info/?l=bugtraq&m=136441204617335&w=2",
"http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"http://rhn.redhat.com/errata/RHSA-2012-0542.html",
"http://rhn.redhat.com/errata/RHSA-2012-0543.html",
"http://secunia.com/advisories/48551",
"http://support.apple.com/kb/HT5501",
"http://svn.apache.org/viewvc?view=revision&revision=1235454",
"http://www.debian.org/security/2012/dsa-2405",
"http://www.mandriva.com/security/advisories?name=MDVSA-2012:012",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/51706",
"https://bugzilla.redhat.com/show_bug.cgi?id=785069",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0883": {
"id": "CVE-2012-0883",
"references": [
"http://article.gmane.org/gmane.comp.apache.devel/48158",
"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html",
"http://marc.info/?l=bugtraq&m=134012830914727&w=2",
"http://secunia.com/advisories/48849",
"http://support.apple.com/kb/HT5880",
"http://svn.apache.org/viewvc?view=revision&revision=1296428",
"http://www.apache.org/dist/httpd/Announcement2.4.html",
"http://www.apachelounge.com/Changelog-2.4.html",
"http://www.securityfocus.com/bid/53046",
"http://www.securitytracker.com/id?1026932",
"http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/74901",
"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
],
"score": 6.9,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.",
"vector_string": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-2687": {
"id": "CVE-2012-2687",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html",
"http://mail-archives.apache.org/mod_mbox/www-announce/201208.mbox/%3C0BFFEA9B-801B-4BAA-9534-56F640268E30%40apache.org%3E",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://rhn.redhat.com/errata/RHSA-2012-1591.html",
"http://rhn.redhat.com/errata/RHSA-2012-1592.html",
"http://rhn.redhat.com/errata/RHSA-2012-1594.html",
"http://rhn.redhat.com/errata/RHSA-2013-0130.html",
"http://secunia.com/advisories/50894",
"http://secunia.com/advisories/51607",
"http://support.apple.com/kb/HT5880",
"http://www-01.ibm.com/support/docview.wss?uid=nas2a2b50a0ca011b37c86257a96003c9a4f",
"http://www.apache.org/dist/httpd/CHANGES_2.4.3",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/55131",
"http://www.ubuntu.com/usn/USN-1627-1",
"http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18832",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19539"
],
"score": 2.6,
"services": [
"9042/http"
],
"severity": "low",
"summary": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2012-3499": {
"id": "CVE-2012-3499",
"references": [
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0815.html",
"http://rhn.redhat.com/errata/RHSA-2013-1207.html",
"http://rhn.redhat.com/errata/RHSA-2013-1208.html",
"http://rhn.redhat.com/errata/RHSA-2013-1209.html",
"http://secunia.com/advisories/55032",
"http://support.apple.com/kb/HT5880",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_info.c?r1=1225799&r2=1413732&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1389564&r2=1413732&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ldap/util_ldap_cache_mgr.c?r1=1209766&r2=1418752&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/mappers/mod_imagemap.c?r1=1398480&r2=1413732&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1404625&r2=1413732&diff_format=h",
"http://www.debian.org/security/2013/dsa-2637",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/58165",
"http://www.securityfocus.com/bid/64758",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19312"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2012-4558": {
"id": "CVE-2012-4558",
"references": [
"http://httpd.apache.org/security/vulnerabilities_22.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html",
"http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0815.html",
"http://rhn.redhat.com/errata/RHSA-2013-1207.html",
"http://rhn.redhat.com/errata/RHSA-2013-1208.html",
"http://rhn.redhat.com/errata/RHSA-2013-1209.html",
"http://support.apple.com/kb/HT5880",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_balancer.c?r1=1404653&r2=1413732&diff_format=h",
"http://www.debian.org/security/2013/dsa-2637",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/58165",
"http://www.securityfocus.com/bid/64758",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18977"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2012-5533": {
"id": "CVE-2012-5533",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt",
"http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00051.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://osvdb.org/87623",
"http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html",
"http://secunia.com/advisories/51268",
"http://secunia.com/advisories/51298",
"http://www.exploit-db.com/exploits/22902",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:100",
"http://www.openwall.com/lists/oss-security/2012/11/21/1",
"http://www.securityfocus.com/bid/56619",
"http://www.securitytracker.com/id?1027802",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/80213",
"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345"
],
"score": 5,
"services": [
"6000/http"
],
"severity": "medium",
"summary": "The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the \"Connection: TE,,Keep-Alive\" header.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2012-5643": {
"id": "CVE-2012-5643",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2013-01/msg00052.html",
"http://lists.opensuse.org/opensuse-updates/2013-01/msg00075.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html",
"http://openwall.com/lists/oss-security/2012/12/17/4",
"http://rhn.redhat.com/errata/RHSA-2013-0505.html",
"http://secunia.com/advisories/52024",
"http://secunia.com/advisories/54839",
"http://ubuntu.com/usn/usn-1713-1",
"http://www.debian.org/security/2013/dsa-2631",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:129",
"http://www.securitytracker.com/id?1027890",
"http://www.squid-cache.org/Advisories/SQUID-2012_1.txt",
"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10479.patch",
"http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch",
"https://bugs.gentoo.org/show_bug.cgi?id=447596",
"https://bugzilla.redhat.com/show_bug.cgi?id=887962",
"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368"
],
"score": 5,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2013-1427": {
"id": "CVE-2013-1427",
"references": [
"http://osvdb.org/91462",
"http://www.debian.org/security/2013/dsa-2649",
"http://www.securityfocus.com/bid/58528",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82897",
"http://osvdb.org/91462",
"http://www.debian.org/security/2013/dsa-2649",
"http://www.securityfocus.com/bid/58528",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82897"
],
"score": 1.8,
"services": [
"1911/http"
],
"severity": "low",
"summary": "The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.",
"vector_string": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-310"
},
"CVE-2013-1862": {
"id": "CVE-2013-1862",
"references": [
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html",
"http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch",
"http://rhn.redhat.com/errata/RHSA-2013-0815.html",
"http://rhn.redhat.com/errata/RHSA-2013-1207.html",
"http://rhn.redhat.com/errata/RHSA-2013-1208.html",
"http://rhn.redhat.com/errata/RHSA-2013-1209.html",
"http://secunia.com/advisories/55032",
"http://support.apple.com/kb/HT6150",
"http://svn.apache.org/viewvc?view=revision&revision=r1469311",
"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862",
"http://www-01.ibm.com/support/docview.wss?uid=swg21644047",
"http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:174",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/59826",
"http://www.securityfocus.com/bid/64758",
"http://www.ubuntu.com/usn/USN-1903-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=953729",
"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken",
"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534"
],
"score": 5.1,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.",
"vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1896": {
"id": "CVE-2013-1896",
"references": [
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html",
"http://rhn.redhat.com/errata/RHSA-2013-1156.html",
"http://rhn.redhat.com/errata/RHSA-2013-1207.html",
"http://rhn.redhat.com/errata/RHSA-2013-1208.html",
"http://rhn.redhat.com/errata/RHSA-2013-1209.html",
"http://secunia.com/advisories/55032",
"http://support.apple.com/kb/HT6150",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log",
"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896",
"http://www-01.ibm.com/support/docview.wss?uid=swg21644047",
"http://www.apache.org/dist/httpd/Announcement2.2.html",
"http://www.securityfocus.com/bid/61129",
"http://www.ubuntu.com/usn/USN-1903-1",
"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-4508": {
"id": "CVE-2013-4508",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://openwall.com/lists/oss-security/2013/11/04/19",
"http://redmine.lighttpd.net/issues/2525",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/",
"https://www.debian.org/security/2013/dsa-2795",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://openwall.com/lists/oss-security/2013/11/04/19",
"http://redmine.lighttpd.net/issues/2525",
"http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/",
"https://www.debian.org/security/2013/dsa-2795"
],
"score": 7.5,
"services": [
"6000/http"
],
"severity": "high",
"summary": "lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-326"
},
"CVE-2013-4559": {
"id": "CVE-2013-4559",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://secunia.com/advisories/55682",
"http://www.openwall.com/lists/oss-security/2013/11/12/4",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
"https://www.debian.org/security/2013/dsa-2795",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://secunia.com/advisories/55682",
"http://www.openwall.com/lists/oss-security/2013/11/12/4",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
"https://www.debian.org/security/2013/dsa-2795"
],
"score": 7.6,
"services": [
"1911/http"
],
"severity": "high",
"summary": "lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.",
"vector_string": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"weakness": "CWE-264"
},
"CVE-2013-4560": {
"id": "CVE-2013-4560",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://secunia.com/advisories/55682",
"http://www.openwall.com/lists/oss-security/2013/11/12/4",
"https://www.debian.org/security/2013/dsa-2795",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://secunia.com/advisories/55682",
"http://www.openwall.com/lists/oss-security/2013/11/12/4",
"https://www.debian.org/security/2013/dsa-2795"
],
"score": 5,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-416"
},
"CVE-2013-5704": {
"id": "CVE-2013-5704",
"references": [
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://martin.swende.se/blog/HTTPChunked.html",
"http://rhn.redhat.com/errata/RHSA-2015-0325.html",
"http://rhn.redhat.com/errata/RHSA-2015-1249.html",
"http://rhn.redhat.com/errata/RHSA-2015-2661.html",
"http://rhn.redhat.com/errata/RHSA-2016-0061.html",
"http://rhn.redhat.com/errata/RHSA-2016-0062.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:174",
"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"http://www.securityfocus.com/bid/66550",
"http://www.ubuntu.com/usn/USN-2523-1",
"https://access.redhat.com/errata/RHSA-2015:2659",
"https://access.redhat.com/errata/RHSA-2015:2660",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201504-03",
"https://support.apple.com/HT204659",
"https://support.apple.com/HT205219",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://martin.swende.se/blog/HTTPChunked.html",
"http://rhn.redhat.com/errata/RHSA-2015-0325.html",
"http://rhn.redhat.com/errata/RHSA-2015-1249.html",
"http://rhn.redhat.com/errata/RHSA-2015-2661.html",
"http://rhn.redhat.com/errata/RHSA-2016-0061.html",
"http://rhn.redhat.com/errata/RHSA-2016-0062.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:174",
"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"http://www.securityfocus.com/bid/66550",
"http://www.ubuntu.com/usn/USN-2523-1",
"https://access.redhat.com/errata/RHSA-2015:2659",
"https://access.redhat.com/errata/RHSA-2015:2660",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201504-03",
"https://support.apple.com/HT204659",
"https://support.apple.com/HT205219"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass \"RequestHeader unset\" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states \"this is not a security issue in httpd as such.\"",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-6438": {
"id": "CVE-2013-6438",
"references": [
"http://advisories.mageia.org/MGASA-2014-0135.html",
"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://marc.info/?l=bugtraq&m=141017844705317&w=2",
"http://marc.info/?l=bugtraq&m=141390017113542&w=2",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/58230",
"http://secunia.com/advisories/59315",
"http://secunia.com/advisories/59345",
"http://secunia.com/advisories/60536",
"http://security.gentoo.org/glsa/glsa-201408-12.xml",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff_format=h",
"http://www-01.ibm.com/support/docview.wss?uid=swg21669554",
"http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
"http://www.apache.org/dist/httpd/CHANGES_2.4.9",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/66303",
"http://www.ubuntu.com/usn/USN-2152-1",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/cve-2013-6438",
"https://support.apple.com/HT204659",
"https://support.apple.com/kb/HT6535"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0098": {
"id": "CVE-2014-0098",
"references": [
"http://advisories.mageia.org/MGASA-2014-0135.html",
"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://marc.info/?l=bugtraq&m=141017844705317&w=2",
"http://marc.info/?l=bugtraq&m=141390017113542&w=2",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/58230",
"http://secunia.com/advisories/58915",
"http://secunia.com/advisories/59219",
"http://secunia.com/advisories/59315",
"http://secunia.com/advisories/59345",
"http://secunia.com/advisories/60536",
"http://security.gentoo.org/glsa/glsa-201408-12.xml",
"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15320.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c?r1=1575394&r2=1575400&diff_format=h",
"http://www-01.ibm.com/support/docview.wss?uid=swg21668973",
"http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
"http://www.apache.org/dist/httpd/CHANGES_2.4.9",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/66303",
"http://www.ubuntu.com/usn/USN-2152-1",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/cve-2014-0098",
"https://support.apple.com/HT204659",
"https://support.apple.com/kb/HT6535"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0118": {
"id": "CVE-2014-0118",
"references": [
"http://advisories.mageia.org/MGASA-2014-0304.html",
"http://advisories.mageia.org/MGASA-2014-0305.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=143748090628601&w=2",
"http://marc.info/?l=bugtraq&m=144050155601375&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://rhn.redhat.com/errata/RHSA-2014-1019.html",
"http://rhn.redhat.com/errata/RHSA-2014-1020.html",
"http://rhn.redhat.com/errata/RHSA-2014-1021.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h",
"http://www.debian.org/security/2014/dsa-2989",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/68745",
"https://bugzilla.redhat.com/show_bug.cgi?id=1120601",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/cve-2014-0118",
"https://security.gentoo.org/glsa/201504-03",
"https://support.apple.com/HT204659"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "CWE-400"
},
"CVE-2014-0226": {
"id": "CVE-2014-0226",
"references": [
"http://advisories.mageia.org/MGASA-2014-0304.html",
"http://advisories.mageia.org/MGASA-2014-0305.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=143748090628601&w=2",
"http://marc.info/?l=bugtraq&m=144050155601375&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://rhn.redhat.com/errata/RHSA-2014-1019.html",
"http://rhn.redhat.com/errata/RHSA-2014-1020.html",
"http://rhn.redhat.com/errata/RHSA-2014-1021.html",
"http://seclists.org/fulldisclosure/2014/Jul/114",
"http://secunia.com/advisories/60536",
"http://security.gentoo.org/glsa/glsa-201408-12.xml",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1450998&r2=1610491&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c?r1=1588989&r2=1610491&diff_format=h",
"http://www.debian.org/security/2014/dsa-2989",
"http://www.exploit-db.com/exploits/34133",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.osvdb.org/109216",
"http://www.securityfocus.com/bid/68678",
"http://zerodayinitiative.com/advisories/ZDI-14-236/",
"https://bugzilla.redhat.com/show_bug.cgi?id=1120603",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/cve-2014-0226",
"https://security.gentoo.org/glsa/201504-03",
"https://support.apple.com/HT204659",
"https://www.povonsec.com/apache-2-4-7-exploit/"
],
"score": 6.8,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"weakness": "CWE-362"
},
"CVE-2014-0231": {
"id": "CVE-2014-0231",
"references": [
"http://advisories.mageia.org/MGASA-2014-0304.html",
"http://advisories.mageia.org/MGASA-2014-0305.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
"http://marc.info/?l=bugtraq&m=143403519711434&w=2",
"http://marc.info/?l=bugtraq&m=143748090628601&w=2",
"http://marc.info/?l=bugtraq&m=144050155601375&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html",
"http://rhn.redhat.com/errata/RHSA-2014-1019.html",
"http://rhn.redhat.com/errata/RHSA-2014-1020.html",
"http://rhn.redhat.com/errata/RHSA-2014-1021.html",
"http://secunia.com/advisories/60536",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h",
"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h",
"http://www.debian.org/security/2014/dsa-2989",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/68742",
"https://bugzilla.redhat.com/show_bug.cgi?id=1120596",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/cve-2014-0231",
"https://security.gentoo.org/glsa/201504-03",
"https://support.apple.com/HT204659"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-399"
},
"CVE-2014-2323": {
"id": "CVE-2014-2323",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://seclists.org/oss-sec/2014/q1/561",
"http://seclists.org/oss-sec/2014/q1/564",
"http://secunia.com/advisories/57404",
"http://secunia.com/advisories/57514",
"http://www.debian.org/security/2014/dsa-2877",
"http://www.lighttpd.net/2014/3/12/1.4.35/",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://seclists.org/oss-sec/2014/q1/561",
"http://seclists.org/oss-sec/2014/q1/564",
"http://secunia.com/advisories/57404",
"http://secunia.com/advisories/57514",
"http://www.debian.org/security/2014/dsa-2877",
"http://www.lighttpd.net/2014/3/12/1.4.35/"
],
"score": 9.8,
"services": [
"1911/http"
],
"severity": "critical",
"summary": "SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-89"
},
"CVE-2014-2324": {
"id": "CVE-2014-2324",
"references": [
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://seclists.org/oss-sec/2014/q1/561",
"http://seclists.org/oss-sec/2014/q1/564",
"http://secunia.com/advisories/57404",
"http://secunia.com/advisories/57514",
"http://www.debian.org/security/2014/dsa-2877",
"http://www.lighttpd.net/2014/3/12/1.4.35/",
"http://www.securityfocus.com/bid/66157",
"http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt",
"http://jvn.jp/en/jp/JVN37417423/index.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html",
"http://marc.info/?l=bugtraq&m=141576815022399&w=2",
"http://seclists.org/oss-sec/2014/q1/561",
"http://seclists.org/oss-sec/2014/q1/564",
"http://secunia.com/advisories/57404",
"http://secunia.com/advisories/57514",
"http://www.debian.org/security/2014/dsa-2877",
"http://www.lighttpd.net/2014/3/12/1.4.35/",
"http://www.securityfocus.com/bid/66157"
],
"score": 5,
"services": [
"1911/http"
],
"severity": "medium",
"summary": "Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-22"
},
"CVE-2014-4078": {
"id": "CVE-2014-4078",
"references": [
"http://www.securityfocus.com/bid/70937",
"http://www.securitytracker.com/id/1031194",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-076"
],
"score": 5.1,
"services": [
"10250/http"
],
"severity": "medium",
"summary": "The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the \"IP Address and Domain Restrictions\" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka \"IIS Security Feature Bypass Vulnerability.\"",
"vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"weakness": "CWE-264"
},
"CVE-2014-7141": {
"id": "CVE-2014-7141",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://seclists.org/oss-sec/2014/q3/539",
"http://seclists.org/oss-sec/2014/q3/612",
"http://seclists.org/oss-sec/2014/q3/626",
"http://secunia.com/advisories/60242",
"http://ubuntu.com/usn/usn-2422-1",
"http://www.securityfocus.com/bid/69688",
"http://www.squid-cache.org/Advisories/SQUID-2014_4.txt",
"https://bugzilla.novell.com/show_bug.cgi?id=891268"
],
"score": 6.4,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"weakness": "CWE-19"
},
"CVE-2014-7142": {
"id": "CVE-2014-7142",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://seclists.org/oss-sec/2014/q3/539",
"http://seclists.org/oss-sec/2014/q3/613",
"http://seclists.org/oss-sec/2014/q3/626",
"http://secunia.com/advisories/60242",
"http://ubuntu.com/usn/usn-2422-1",
"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"http://www.securityfocus.com/bid/70022",
"http://www.squid-cache.org/Advisories/SQUID-2014_4.txt",
"https://bugzilla.novell.com/show_bug.cgi?id=891268"
],
"score": 6.4,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2015-0228": {
"id": "CVE-2015-0228",
"references": [
"http://advisories.mageia.org/MGASA-2015-0099.html",
"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html",
"http://rhn.redhat.com/errata/RHSA-2015-1666.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/CHANGES",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"http://www.securityfocus.com/bid/73041",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1032967",
"http://www.ubuntu.com/usn/USN-2523-1",
"https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef",
"https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://support.apple.com/HT205219",
"https://support.apple.com/kb/HT205031",
"http://advisories.mageia.org/MGASA-2015-0099.html",
"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html",
"http://rhn.redhat.com/errata/RHSA-2015-1666.html",
"http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/CHANGES",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"http://www.securityfocus.com/bid/73041",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1032967",
"http://www.ubuntu.com/usn/USN-2523-1",
"https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef",
"https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://support.apple.com/HT205219",
"https://support.apple.com/kb/HT205031"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-20"
},
"CVE-2015-3183": {
"id": "CVE-2015-3183",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://rhn.redhat.com/errata/RHSA-2015-1666.html",
"http://rhn.redhat.com/errata/RHSA-2015-1667.html",
"http://rhn.redhat.com/errata/RHSA-2015-1668.html",
"http://rhn.redhat.com/errata/RHSA-2015-2661.html",
"http://rhn.redhat.com/errata/RHSA-2016-0061.html",
"http://rhn.redhat.com/errata/RHSA-2016-0062.html",
"http://rhn.redhat.com/errata/RHSA-2016-2054.html",
"http://rhn.redhat.com/errata/RHSA-2016-2055.html",
"http://rhn.redhat.com/errata/RHSA-2016-2056.html",
"http://www.apache.org/dist/httpd/CHANGES_2.4",
"http://www.debian.org/security/2015/dsa-3325",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/75963",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1032967",
"http://www.ubuntu.com/usn/USN-2686-1",
"https://access.redhat.com/errata/RHSA-2015:2659",
"https://access.redhat.com/errata/RHSA-2015:2660",
"https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
"https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/CVE-2015-3183",
"https://security.gentoo.org/glsa/201610-02",
"https://support.apple.com/HT205219",
"https://support.apple.com/kb/HT205031",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
"http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://marc.info/?l=bugtraq&m=144493176821532&w=2",
"http://rhn.redhat.com/errata/RHSA-2015-1666.html",
"http://rhn.redhat.com/errata/RHSA-2015-1667.html",
"http://rhn.redhat.com/errata/RHSA-2015-1668.html",
"http://rhn.redhat.com/errata/RHSA-2015-2661.html",
"http://rhn.redhat.com/errata/RHSA-2016-0061.html",
"http://rhn.redhat.com/errata/RHSA-2016-0062.html",
"http://rhn.redhat.com/errata/RHSA-2016-2054.html",
"http://rhn.redhat.com/errata/RHSA-2016-2055.html",
"http://rhn.redhat.com/errata/RHSA-2016-2056.html",
"http://www.apache.org/dist/httpd/CHANGES_2.4",
"http://www.debian.org/security/2015/dsa-3325",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/75963",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1032967",
"http://www.ubuntu.com/usn/USN-2686-1",
"https://access.redhat.com/errata/RHSA-2015:2659",
"https://access.redhat.com/errata/RHSA-2015:2660",
"https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
"https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://puppet.com/security/cve/CVE-2015-3183",
"https://security.gentoo.org/glsa/201610-02",
"https://support.apple.com/HT205219",
"https://support.apple.com/kb/HT205031"
],
"score": 5,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "CWE-17"
},
"CVE-2015-3200": {
"id": "CVE-2015-3200",
"references": [
"http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html",
"http://redmine.lighttpd.net/issues/2646",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.securityfocus.com/bid/74813",
"http://www.securitytracker.com/id/1032405",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
"http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html",
"http://redmine.lighttpd.net/issues/2646",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.securityfocus.com/bid/74813",
"http://www.securitytracker.com/id/1032405",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10310"
],
"score": 7.5,
"services": [
"1911/http"
],
"severity": "high",
"summary": "mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-74"
},
"CVE-2015-5400": {
"id": "CVE-2015-5400",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2015/dsa-3327",
"http://www.openwall.com/lists/oss-security/2015/07/06/8",
"http://www.openwall.com/lists/oss-security/2015/07/09/12",
"http://www.openwall.com/lists/oss-security/2015/07/10/2",
"http://www.openwall.com/lists/oss-security/2015/07/17/14",
"http://www.securityfocus.com/bid/75553",
"http://www.securitytracker.com/id/1032873",
"http://www.squid-cache.org/Advisories/SQUID-2015_2.txt",
"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch",
"http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch"
],
"score": 6.8,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"weakness": "CWE-264"
},
"CVE-2016-10002": {
"id": "CVE-2016-10002",
"references": [
"http://rhn.redhat.com/errata/RHSA-2017-0182.html",
"http://rhn.redhat.com/errata/RHSA-2017-0183.html",
"http://www.debian.org/security/2016/dsa-3745",
"http://www.openwall.com/lists/oss-security/2016/12/18/1",
"http://www.securityfocus.com/bid/94953",
"http://www.securitytracker.com/id/1037513",
"http://www.squid-cache.org/Advisories/SQUID-2016_11.txt"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2016-2390": {
"id": "CVE-2016-2390",
"references": [
"http://bugs.squid-cache.org/show_bug.cgi?id=4437",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html",
"http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html",
"http://www.securitytracker.com/id/1035045",
"http://www.squid-cache.org/Advisories/SQUID-2016_1.txt"
],
"score": 5.9,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2016-3947": {
"id": "CVE-2016-3947",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.securitytracker.com/id/1035457",
"http://www.squid-cache.org/Advisories/SQUID-2016_3.txt",
"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10495.patch",
"http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11839.patch",
"http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12694.patch",
"http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13232.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.2,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"weakness": "CWE-119"
},
"CVE-2016-4051": {
"id": "CVE-2016-4051",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/04/20/6",
"http://www.openwall.com/lists/oss-security/2016/04/20/9",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/86788",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1035646",
"http://www.squid-cache.org/Advisories/SQUID-2016_5.txt",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.8,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2016-4052": {
"id": "CVE-2016-4052",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/04/20/6",
"http://www.openwall.com/lists/oss-security/2016/04/20/9",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/86788",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1035647",
"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.1,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2016-4053": {
"id": "CVE-2016-4053",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/04/20/6",
"http://www.openwall.com/lists/oss-security/2016/04/20/9",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/86788",
"http://www.securityfocus.com/bid/91787",
"http://www.securitytracker.com/id/1035647",
"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 3.7,
"services": [
"27018/http-proxy"
],
"severity": "low",
"summary": "Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-119"
},
"CVE-2016-4054": {
"id": "CVE-2016-4054",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/04/20/6",
"http://www.openwall.com/lists/oss-security/2016/04/20/9",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/86788",
"http://www.securitytracker.com/id/1035647",
"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.1,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-119"
},
"CVE-2016-4553": {
"id": "CVE-2016-4553",
"references": [
"http://bugs.squid-cache.org/show_bug.cgi?id=4501",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securitytracker.com/id/1035768",
"http://www.squid-cache.org/Advisories/SQUID-2016_7.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.6,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"weakness": "CWE-345"
},
"CVE-2016-4554": {
"id": "CVE-2016-4554",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securitytracker.com/id/1035769",
"http://www.squid-cache.org/Advisories/SQUID-2016_8.txt",
"http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch",
"http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_8.patch",
"http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch",
"http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 8.6,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a \"header smuggling\" issue.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"weakness": "CWE-345"
},
"CVE-2016-4555": {
"id": "CVE-2016-4555",
"references": [
"http://bugs.squid-cache.org/show_bug.cgi?id=4455",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/05/06/3",
"http://www.openwall.com/lists/oss-security/2016/05/06/5",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securitytracker.com/id/1035770",
"http://www.squid-cache.org/Advisories/SQUID-2016_9.txt",
"http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2016-4556": {
"id": "CVE-2016-4556",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html",
"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html",
"http://www.debian.org/security/2016/dsa-3625",
"http://www.openwall.com/lists/oss-security/2016/05/06/3",
"http://www.openwall.com/lists/oss-security/2016/05/06/5",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securitytracker.com/id/1035770",
"http://www.squid-cache.org/Advisories/SQUID-2016_9.txt",
"http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch",
"http://www.ubuntu.com/usn/USN-2995-1",
"https://access.redhat.com/errata/RHSA-2016:1138",
"https://access.redhat.com/errata/RHSA-2016:1139",
"https://access.redhat.com/errata/RHSA-2016:1140",
"https://security.gentoo.org/glsa/201607-01"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2016-4975": {
"id": "CVE-2016-4975",
"references": [
"http://www.securityfocus.com/bid/105093",
"https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180926-0006/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us"
],
"score": 6.1,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-93"
},
"CVE-2016-5387": {
"id": "CVE-2016-5387",
"references": [
"http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html",
"http://rhn.redhat.com/errata/RHSA-2016-1624.html",
"http://rhn.redhat.com/errata/RHSA-2016-1625.html",
"http://rhn.redhat.com/errata/RHSA-2016-1648.html",
"http://rhn.redhat.com/errata/RHSA-2016-1649.html",
"http://rhn.redhat.com/errata/RHSA-2016-1650.html",
"http://www.debian.org/security/2016/dsa-3623",
"http://www.kb.cert.org/vuls/id/797896",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"http://www.securityfocus.com/bid/91816",
"http://www.securitytracker.com/id/1036330",
"http://www.ubuntu.com/usn/USN-3038-1",
"https://access.redhat.com/errata/RHSA-2016:1420",
"https://access.redhat.com/errata/RHSA-2016:1421",
"https://access.redhat.com/errata/RHSA-2016:1422",
"https://access.redhat.com/errata/RHSA-2016:1635",
"https://access.redhat.com/errata/RHSA-2016:1636",
"https://access.redhat.com/errata/RHSA-2016:1851",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"https://httpoxy.org/",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/",
"https://security.gentoo.org/glsa/201701-36",
"https://support.apple.com/HT208221",
"https://www.apache.org/security/asf-httpoxy-response.txt",
"https://www.tenable.com/security/tns-2017-04",
"http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html",
"http://rhn.redhat.com/errata/RHSA-2016-1624.html",
"http://rhn.redhat.com/errata/RHSA-2016-1625.html",
"http://rhn.redhat.com/errata/RHSA-2016-1648.html",
"http://rhn.redhat.com/errata/RHSA-2016-1649.html",
"http://rhn.redhat.com/errata/RHSA-2016-1650.html",
"http://www.debian.org/security/2016/dsa-3623",
"http://www.kb.cert.org/vuls/id/797896",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"http://www.securityfocus.com/bid/91816",
"http://www.securitytracker.com/id/1036330",
"http://www.ubuntu.com/usn/USN-3038-1",
"https://access.redhat.com/errata/RHSA-2016:1420",
"https://access.redhat.com/errata/RHSA-2016:1421",
"https://access.redhat.com/errata/RHSA-2016:1422",
"https://access.redhat.com/errata/RHSA-2016:1635",
"https://access.redhat.com/errata/RHSA-2016:1636",
"https://access.redhat.com/errata/RHSA-2016:1851",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"https://httpoxy.org/",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/",
"https://security.gentoo.org/glsa/201701-36",
"https://support.apple.com/HT208221",
"https://www.apache.org/security/asf-httpoxy-response.txt",
"https://www.tenable.com/security/tns-2017-04"
],
"score": 8.1,
"services": [
"9042/http"
],
"severity": "high",
"summary": "The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"This mitigation has been assigned the identifier CVE-2016-5387\"; in other words, this is not a CVE ID for a vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-8612": {
"id": "CVE-2016-8612",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"http://www.securityfocus.com/bid/94939",
"https://access.redhat.com/errata/RHSA-2017:0193",
"https://access.redhat.com/errata/RHSA-2017:0194",
"https://bugzilla.redhat.com/show_bug.cgi?id=1387605",
"https://security.netapp.com/advisory/ntap-20180601-0005/",
"http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"http://www.securityfocus.com/bid/94939",
"https://access.redhat.com/errata/RHSA-2017:0193",
"https://access.redhat.com/errata/RHSA-2017:0194",
"https://bugzilla.redhat.com/show_bug.cgi?id=1387605",
"https://security.netapp.com/advisory/ntap-20180601-0005/"
],
"score": 4.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.",
"vector_string": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-20"
},
"CVE-2016-8743": {
"id": "CVE-2016-8743",
"references": [
"http://rhn.redhat.com/errata/RHSA-2017-1415.html",
"http://www.debian.org/security/2017/dsa-3796",
"http://www.securityfocus.com/bid/95077",
"http://www.securitytracker.com/id/1037508",
"https://access.redhat.com/errata/RHSA-2017:0906",
"https://access.redhat.com/errata/RHSA-2017:1161",
"https://access.redhat.com/errata/RHSA-2017:1413",
"https://access.redhat.com/errata/RHSA-2017:1414",
"https://access.redhat.com/errata/RHSA-2017:1721",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201701-36",
"https://security.netapp.com/advisory/ntap-20180423-0001/",
"https://support.apple.com/HT208221",
"https://www.tenable.com/security/tns-2017-04",
"http://rhn.redhat.com/errata/RHSA-2017-1415.html",
"http://www.debian.org/security/2017/dsa-3796",
"http://www.securityfocus.com/bid/95077",
"http://www.securitytracker.com/id/1037508",
"https://access.redhat.com/errata/RHSA-2017:0906",
"https://access.redhat.com/errata/RHSA-2017:1161",
"https://access.redhat.com/errata/RHSA-2017:1413",
"https://access.redhat.com/errata/RHSA-2017:1414",
"https://access.redhat.com/errata/RHSA-2017:1721",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201701-36",
"https://security.netapp.com/advisory/ntap-20180423-0001/",
"https://support.apple.com/HT208221",
"https://www.tenable.com/security/tns-2017-04"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-15710": {
"id": "CVE-2017-15710",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/8",
"http://www.securityfocus.com/bid/103512",
"http://www.securitytracker.com/id/1040569",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2017-15715": {
"id": "CVE-2017-15715",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/6",
"http://www.securityfocus.com/bid/103525",
"http://www.securitytracker.com/id/1040570",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09",
"http://www.openwall.com/lists/oss-security/2018/03/24/6",
"http://www.securityfocus.com/bid/103525",
"http://www.securitytracker.com/id/1040570",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 8.1,
"services": [
"8087/http"
],
"severity": "high",
"summary": "In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-20"
},
"CVE-2017-3167": {
"id": "CVE-2017-3167",
"references": [
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99135",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.nomachine.com/SU08O00185",
"https://www.tenable.com/security/tns-2019-09",
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99135",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.nomachine.com/SU08O00185",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-287"
},
"CVE-2017-3169": {
"id": "CVE-2017-3169",
"references": [
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99134",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.nomachine.com/SU08O00185",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2017-7659": {
"id": "CVE-2017-7659",
"references": [
"http://www.debian.org/security/2017/dsa-3896",
"http://www.securityfocus.com/bid/99132",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://lists.apache.org/thread.html/1d0b746bbaa3a64890fcdab59ee9050aaa633b7143e7d412374e5a9a%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2017-7668": {
"id": "CVE-2017-7668",
"references": [
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99137",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.tenable.com/security/tns-2019-09",
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99137",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-126"
},
"CVE-2017-7679": {
"id": "CVE-2017-7679",
"references": [
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99170",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.nomachine.com/SU08O00185",
"https://www.tenable.com/security/tns-2019-09",
"http://www.debian.org/security/2017/dsa-3896",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99170",
"http://www.securitytracker.com/id/1038711",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.nomachine.com/SU08O00185",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-126"
},
"CVE-2017-9788": {
"id": "CVE-2017-9788",
"references": [
"http://www.debian.org/security/2017/dsa-3913",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99569",
"http://www.securitytracker.com/id/1038906",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:2708",
"https://access.redhat.com/errata/RHSA-2017:2709",
"https://access.redhat.com/errata/RHSA-2017:2710",
"https://access.redhat.com/errata/RHSA-2017:3113",
"https://access.redhat.com/errata/RHSA-2017:3114",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://access.redhat.com/errata/RHSA-2017:3240",
"https://httpd.apache.org/security/vulnerabilities_22.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20170911-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.tenable.com/security/tns-2019-09",
"http://www.debian.org/security/2017/dsa-3913",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/99569",
"http://www.securitytracker.com/id/1038906",
"https://access.redhat.com/errata/RHSA-2017:2478",
"https://access.redhat.com/errata/RHSA-2017:2479",
"https://access.redhat.com/errata/RHSA-2017:2483",
"https://access.redhat.com/errata/RHSA-2017:2708",
"https://access.redhat.com/errata/RHSA-2017:2709",
"https://access.redhat.com/errata/RHSA-2017:2710",
"https://access.redhat.com/errata/RHSA-2017:3113",
"https://access.redhat.com/errata/RHSA-2017:3114",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://access.redhat.com/errata/RHSA-2017:3240",
"https://httpd.apache.org/security/vulnerabilities_22.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20170911-0002/",
"https://support.apple.com/HT208221",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 9.1,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2017-9798": {
"id": "CVE-2017-9798",
"references": [
"http://openwall.com/lists/oss-security/2017/09/18/2",
"http://www.debian.org/security/2017/dsa-3980",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/100872",
"http://www.securityfocus.com/bid/105598",
"http://www.securitytracker.com/id/1039387",
"https://access.redhat.com/errata/RHSA-2017:2882",
"https://access.redhat.com/errata/RHSA-2017:2972",
"https://access.redhat.com/errata/RHSA-2017:3018",
"https://access.redhat.com/errata/RHSA-2017:3113",
"https://access.redhat.com/errata/RHSA-2017:3114",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://access.redhat.com/errata/RHSA-2017:3240",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
"https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
"https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
"https://github.com/hannob/optionsbleed",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2017-9798",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0003/",
"https://support.apple.com/HT208331",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
"https://www.exploit-db.com/exploits/42745/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"https://www.tenable.com/security/tns-2019-09",
"http://openwall.com/lists/oss-security/2017/09/18/2",
"http://www.debian.org/security/2017/dsa-3980",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/100872",
"http://www.securityfocus.com/bid/105598",
"http://www.securitytracker.com/id/1039387",
"https://access.redhat.com/errata/RHSA-2017:2882",
"https://access.redhat.com/errata/RHSA-2017:2972",
"https://access.redhat.com/errata/RHSA-2017:3018",
"https://access.redhat.com/errata/RHSA-2017:3113",
"https://access.redhat.com/errata/RHSA-2017:3114",
"https://access.redhat.com/errata/RHSA-2017:3193",
"https://access.redhat.com/errata/RHSA-2017:3194",
"https://access.redhat.com/errata/RHSA-2017:3195",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://access.redhat.com/errata/RHSA-2017:3240",
"https://access.redhat.com/errata/RHSA-2017:3475",
"https://access.redhat.com/errata/RHSA-2017:3476",
"https://access.redhat.com/errata/RHSA-2017:3477",
"https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
"https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
"https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
"https://github.com/hannob/optionsbleed",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security-tracker.debian.org/tracker/CVE-2017-9798",
"https://security.gentoo.org/glsa/201710-32",
"https://security.netapp.com/advisory/ntap-20180601-0003/",
"https://support.apple.com/HT208331",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
"https://www.exploit-db.com/exploits/42745/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-416"
},
"CVE-2018-1000024": {
"id": "CVE-2018-1000024",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_1.txt",
"http://www.squid-cache.org/Versions/",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-1000027": {
"id": "CVE-2018-1000027",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_2.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch",
"https://github.com/squid-cache/squid/pull/129/files",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2018-11763": {
"id": "CVE-2018-11763",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html",
"http://www.securityfocus.com/bid/105414",
"http://www.securitytracker.com/id/1041713",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20190204-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3783-1/",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 5.9,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-1283": {
"id": "CVE-2018-1283",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/4",
"http://www.securityfocus.com/bid/103520",
"http://www.securitytracker.com/id/1040568",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09",
"http://www.openwall.com/lists/oss-security/2018/03/24/4",
"http://www.securityfocus.com/bid/103520",
"http://www.securitytracker.com/id/1040568",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a \"Session\" header. This comes from the \"HTTP_SESSION\" variable name used by mod_session to forward its data to CGIs, since the prefix \"HTTP_\" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-1301": {
"id": "CVE-2018-1301",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/2",
"http://www.securityfocus.com/bid/103515",
"http://www.securitytracker.com/id/1040573",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09",
"http://www.openwall.com/lists/oss-security/2018/03/24/2",
"http://www.securityfocus.com/bid/103515",
"http://www.securitytracker.com/id/1040573",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 5.9,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-119"
},
"CVE-2018-1302": {
"id": "CVE-2018-1302",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/5",
"http://www.securityfocus.com/bid/103528",
"http://www.securitytracker.com/id/1040567",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3783-1/",
"https://www.tenable.com/security/tns-2019-09",
"http://www.openwall.com/lists/oss-security/2018/03/24/5",
"http://www.securityfocus.com/bid/103528",
"http://www.securitytracker.com/id/1040567",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3783-1/",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 5.9,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2018-1303": {
"id": "CVE-2018-1303",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/3",
"http://www.securityfocus.com/bid/103522",
"http://www.securitytracker.com/id/1040572",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09",
"http://www.openwall.com/lists/oss-security/2018/03/24/3",
"http://www.securityfocus.com/bid/103522",
"http://www.securitytracker.com/id/1040572",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2018-1312": {
"id": "CVE-2018-1312",
"references": [
"http://www.openwall.com/lists/oss-security/2018/03/24/7",
"http://www.securityfocus.com/bid/103524",
"http://www.securitytracker.com/id/1040571",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://access.redhat.com/errata/RHSA-2019:1898",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
"https://security.netapp.com/advisory/ntap-20180601-0004/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3627-1/",
"https://usn.ubuntu.com/3627-2/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2018/dsa-4164",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-287"
},
"CVE-2018-1333": {
"id": "CVE-2018-1333",
"references": [
"http://www.securitytracker.com/id/1041402",
"https://access.redhat.com/errata/RHSA-2018:3558",
"https://access.redhat.com/errata/RHSA-2019:0366",
"https://access.redhat.com/errata/RHSA-2019:0367",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20180926-0007/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"https://usn.ubuntu.com/3783-1/",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2018-15891": {
"id": "CVE-2018-15891",
"references": [
"https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
"https://www.freepbx.org/",
"https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
"https://www.freepbx.org/"
],
"score": 4.8,
"services": [
"5060/sip-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2018-17189": {
"id": "CVE-2018-17189",
"references": [
"http://www.securityfocus.com/bid/106685",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY7SJQOO3PYFVINZW6H5EK4EZ3HSGZNM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7N3DUEBFVGQWQEME5HTPTTKDHGHBAC6/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.gentoo.org/glsa/201903-21",
"https://security.netapp.com/advisory/ntap-20190125-0001/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-400"
},
"CVE-2018-17199": {
"id": "CVE-2018-17199",
"references": [
"http://www.securityfocus.com/bid/106742",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.gentoo.org/glsa/201903-21",
"https://security.netapp.com/advisory/ntap-20190125-0001/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.tenable.com/security/tns-2019-09",
"http://www.securityfocus.com/bid/106742",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.gentoo.org/glsa/201903-21",
"https://security.netapp.com/advisory/ntap-20190125-0001/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.tenable.com/security/tns-2019-09"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-384"
},
"CVE-2018-19052": {
"id": "CVE-2018-19052",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00054.html",
"https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1",
"https://lists.debian.org/debian-lts-announce/2022/01/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00054.html",
"https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1",
"https://lists.debian.org/debian-lts-announce/2022/01/msg00012.html"
],
"score": 7.5,
"services": [
"1911/http"
],
"severity": "high",
"summary": "An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-22"
},
"CVE-2018-19131": {
"id": "CVE-2018-19131",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_4.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch",
"https://github.com/squid-cache/squid/pull/306"
],
"score": 6.1,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2018-19132": {
"id": "CVE-2018-19132",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_5.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-644131ff1e00c1895d77561f561d29c104ba6b11.patch",
"https://github.com/squid-cache/squid/pull/313",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4059-1/"
],
"score": 5.9,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-772"
},
"CVE-2019-0196": {
"id": "CVE-2019-0196",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://www.apache.org/dist/httpd/CHANGES_2.4.39",
"http://www.openwall.com/lists/oss-security/2019/04/02/1",
"http://www.securityfocus.com/bid/107669",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/97a1c58e138ed58a364513b58d807a802e72bf6079ff81a10948ef7c%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRYD6JMEJ6O3JKJZFNOYXMJJU5JMEJK/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTJPHI3E3OKW7OT7COQXVG7DE7IDQ2OT/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.netapp.com/advisory/ntap-20190617-0002/",
"https://support.f5.com/csp/article/K44591505",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-416"
},
"CVE-2019-0211": {
"id": "CVE-2019-0211",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html",
"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html",
"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html",
"http://www.apache.org/dist/httpd/CHANGES_2.4.39",
"http://www.openwall.com/lists/oss-security/2019/04/02/3",
"http://www.openwall.com/lists/oss-security/2019/07/26/7",
"http://www.securityfocus.com/bid/107666",
"https://access.redhat.com/errata/RHBA-2019:0959",
"https://access.redhat.com/errata/RHSA-2019:0746",
"https://access.redhat.com/errata/RHSA-2019:0980",
"https://access.redhat.com/errata/RHSA-2019:1296",
"https://access.redhat.com/errata/RHSA-2019:1297",
"https://access.redhat.com/errata/RHSA-2019:1543",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E",
"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E",
"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E",
"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://seclists.org/bugtraq/2019/Apr/16",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.gentoo.org/glsa/201904-20",
"https://security.netapp.com/advisory/ntap-20190423-0001/",
"https://support.f5.com/csp/article/K32957101",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.exploit-db.com/exploits/46676/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://www.synology.com/security/advisory/Synology_SA_19_14"
],
"score": 7.8,
"services": [
"8087/http"
],
"severity": "high",
"summary": "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2019-0217": {
"id": "CVE-2019-0217",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://www.openwall.com/lists/oss-security/2019/04/02/5",
"http://www.securityfocus.com/bid/107668",
"https://access.redhat.com/errata/RHSA-2019:2343",
"https://access.redhat.com/errata/RHSA-2019:3436",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://bugzilla.redhat.com/show_bug.cgi?id=1695020",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.netapp.com/advisory/ntap-20190423-0001/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://www.openwall.com/lists/oss-security/2019/04/02/5",
"http://www.securityfocus.com/bid/107668",
"https://access.redhat.com/errata/RHSA-2019:2343",
"https://access.redhat.com/errata/RHSA-2019:3436",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://bugzilla.redhat.com/show_bug.cgi?id=1695020",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.netapp.com/advisory/ntap-20190423-0001/",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://usn.ubuntu.com/3937-2/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-362"
},
"CVE-2019-0220": {
"id": "CVE-2019-0220",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://www.openwall.com/lists/oss-security/2019/04/02/6",
"http://www.securityfocus.com/bid/107670",
"https://access.redhat.com/errata/RHSA-2019:2343",
"https://access.redhat.com/errata/RHSA-2019:3436",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://access.redhat.com/errata/RHSA-2020:0250",
"https://access.redhat.com/errata/RHSA-2020:0251",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7%40%3Cbugs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.netapp.com/advisory/ntap-20190625-0007/",
"https://support.f5.com/csp/article/K44591505",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
"http://www.openwall.com/lists/oss-security/2019/04/02/6",
"http://www.securityfocus.com/bid/107670",
"https://access.redhat.com/errata/RHSA-2019:2343",
"https://access.redhat.com/errata/RHSA-2019:3436",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://access.redhat.com/errata/RHSA-2020:0250",
"https://access.redhat.com/errata/RHSA-2020:0251",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7%40%3Cbugs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
"https://seclists.org/bugtraq/2019/Apr/5",
"https://security.netapp.com/advisory/ntap-20190625-0007/",
"https://support.f5.com/csp/article/K44591505",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
"https://usn.ubuntu.com/3937-1/",
"https://www.debian.org/security/2019/dsa-4422",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-706"
},
"CVE-2019-10081": {
"id": "CVE-2019-10081",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://seclists.org/bugtraq/2019/Aug/47",
"https://security.gentoo.org/glsa/201909-04",
"https://security.netapp.com/advisory/ntap-20190905-0003/",
"https://support.f5.com/csp/article/K84341091?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4113-1/",
"https://www.debian.org/security/2019/dsa-4509",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2019-10082": {
"id": "CVE-2019-10082",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 9.1,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2019-10092": {
"id": "CVE-2019-10092",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
"http://www.openwall.com/lists/oss-security/2019/08/15/4",
"http://www.openwall.com/lists/oss-security/2020/08/08/1",
"http://www.openwall.com/lists/oss-security/2020/08/08/9",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/",
"https://seclists.org/bugtraq/2019/Aug/47",
"https://seclists.org/bugtraq/2019/Oct/24",
"https://security.gentoo.org/glsa/201909-04",
"https://security.netapp.com/advisory/ntap-20190905-0003/",
"https://support.f5.com/csp/article/K30442259",
"https://usn.ubuntu.com/4113-1/",
"https://www.debian.org/security/2019/dsa-4509",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
"http://www.openwall.com/lists/oss-security/2019/08/15/4",
"http://www.openwall.com/lists/oss-security/2020/08/08/1",
"http://www.openwall.com/lists/oss-security/2020/08/08/9",
"https://access.redhat.com/errata/RHSA-2019:4126",
"https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/",
"https://seclists.org/bugtraq/2019/Aug/47",
"https://seclists.org/bugtraq/2019/Oct/24",
"https://security.gentoo.org/glsa/201909-04",
"https://security.netapp.com/advisory/ntap-20190905-0003/",
"https://support.f5.com/csp/article/K30442259",
"https://usn.ubuntu.com/4113-1/",
"https://www.debian.org/security/2019/dsa-4509",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 6.1,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2019-10098": {
"id": "CVE-2019-10098",
"references": [
"http://www.openwall.com/lists/oss-security/2020/04/01/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://www.openwall.com/lists/oss-security/2020/04/01/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 6.1,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-601"
},
"CVE-2019-11072": {
"id": "CVE-2019-11072",
"references": [
"http://www.securityfocus.com/bid/107907",
"https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354",
"https://redmine.lighttpd.net/issues/2945",
"http://www.securityfocus.com/bid/107907",
"https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354",
"https://redmine.lighttpd.net/issues/2945"
],
"score": 9.8,
"services": [
"1911/http"
],
"severity": "critical",
"summary": "lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states \"The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2019-12519": {
"id": "CVE-2019-12519",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"27018/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2019-12520": {
"id": "CVE-2019-12520",
"references": [
"http://www.squid-cache.org/Versions/v4/",
"http://www.squid-cache.org/Versions/v4/changesets/",
"https://github.com/squid-cache/squid/commits/v4",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12520.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-20"
},
"CVE-2019-12521": {
"id": "CVE-2019-12521",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 5.9,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-193"
},
"CVE-2019-12522": {
"id": "CVE-2019-12522",
"references": [
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12522.txt",
"https://security.netapp.com/advisory/ntap-20210205-0006/"
],
"score": 4.5,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"weakness": "CWE-269"
},
"CVE-2019-12523": {
"id": "CVE-2019-12523",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.1,
"services": [
"27018/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-12524": {
"id": "CVE-2019-12524",
"references": [
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12524.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"27018/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-306"
},
"CVE-2019-12526": {
"id": "CVE-2019-12526",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_7.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156326",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"27018/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2019-12528": {
"id": "CVE-2019-12528",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_2.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-12529": {
"id": "CVE-2019-12529",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Versions/v4/changesets/",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch",
"https://github.com/squid-cache/squid/commits/v4",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4065-1/",
"https://usn.ubuntu.com/4065-2/",
"https://www.debian.org/security/2019/dsa-4507"
],
"score": 5.9,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2019-13345": {
"id": "CVE-2019-13345",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.securityfocus.com/bid/109095",
"https://access.redhat.com/errata/RHSA-2019:3476",
"https://bugs.squid-cache.org/show_bug.cgi?id=4957",
"https://github.com/squid-cache/squid/pull/429",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00006.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2ERPHSPUGOYVVRPQRASQBFGS2EJISFC/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4059-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2019/dsa-4507"
],
"score": 6.1,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2019-17567": {
"id": "CVE-2019-17567",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/2",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/2",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-444"
},
"CVE-2019-18676": {
"id": "CVE-2019-18676",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://github.com/squid-cache/squid/pull/275",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2019-18677": {
"id": "CVE-2019-18677",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_9.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156328",
"https://github.com/squid-cache/squid/pull/427",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 6.1,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-352"
},
"CVE-2019-18678": {
"id": "CVE-2019-18678",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_10.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156323",
"https://github.com/squid-cache/squid/pull/445",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 5.3,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-444"
},
"CVE-2019-18679": {
"id": "CVE-2019-18679",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_11.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156324",
"https://github.com/squid-cache/squid/pull/491",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2019-18860": {
"id": "CVE-2019-18860",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"https://github.com/squid-cache/squid/pull/504",
"https://github.com/squid-cache/squid/pull/505",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4732"
],
"score": 6.1,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-74"
},
"CVE-2019-19538": {
"id": "CVE-2019-19538",
"references": [
"https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
"https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution",
"https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
"https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution"
],
"score": 7.2,
"services": [
"5060/sip-proxy"
],
"severity": "high",
"summary": "In Sangoma FreePBX 13 through 15 and sysadmin (aka System Admin) 13.0.92 through 15.0.13.6 modules have a Remote Command Execution vulnerability that results in Privilege Escalation.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-19851": {
"id": "CVE-2019-19851",
"references": [
"https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
"https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities",
"https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
"https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities"
],
"score": 4.8,
"services": [
"5060/sip-proxy"
],
"severity": "medium",
"summary": "An XSS Injection vulnerability exists in Sangoma FreePBX and PBXact 13, 14, and 15 within the Debug/Test page of the Superfecta module at the admin/config.php?display=superfecta URI. This affects Superfecta through 13.0.4.7, 14.x through 14.0.24, and 15.x through 15.0.2.20.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2019-9517": {
"id": "CVE-2019-9517",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
"http://www.openwall.com/lists/oss-security/2019/08/15/7",
"https://access.redhat.com/errata/RHSA-2019:2893",
"https://access.redhat.com/errata/RHSA-2019:2925",
"https://access.redhat.com/errata/RHSA-2019:2939",
"https://access.redhat.com/errata/RHSA-2019:2946",
"https://access.redhat.com/errata/RHSA-2019:2949",
"https://access.redhat.com/errata/RHSA-2019:2950",
"https://access.redhat.com/errata/RHSA-2019:2955",
"https://access.redhat.com/errata/RHSA-2019:3932",
"https://access.redhat.com/errata/RHSA-2019:3933",
"https://access.redhat.com/errata/RHSA-2019:3935",
"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
"https://kb.cert.org/vuls/id/605641/",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
"https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/",
"https://seclists.org/bugtraq/2019/Aug/47",
"https://security.gentoo.org/glsa/201909-04",
"https://security.netapp.com/advisory/ntap-20190823-0003/",
"https://security.netapp.com/advisory/ntap-20190823-0005/",
"https://security.netapp.com/advisory/ntap-20190905-0003/",
"https://support.f5.com/csp/article/K02591030",
"https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4113-1/",
"https://www.debian.org/security/2019/dsa-4509",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://www.synology.com/security/advisory/Synology_SA_19_33"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2020-11945": {
"id": "CVE-2020-11945",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"http://www.openwall.com/lists/oss-security/2020/04/23/2",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1170313",
"https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811",
"https://github.com/squid-cache/squid/pull/585",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FWQRYZJPHAZBLXJ56FPCHJN5X2FP3VA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4MWXEZAJSOGRJSS2JCJK4WBSND4IV46/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RV2VZWFJNO3B56IVN56HHKJASG5DYUIX/",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210304-0004/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"27018/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-11993": {
"id": "CVE-2020-11993",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html",
"http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11993",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/",
"https://security.gentoo.org/glsa/202008-04",
"https://security.netapp.com/advisory/ntap-20200814-0005/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://www.oracle.com/security-alerts/cpuoct2020.html"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above \"info\" will mitigate this vulnerability for unpatched servers.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-444"
},
"CVE-2020-13938": {
"id": "CVE-2020-13938",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/3",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
"https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/3",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
"https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://security.netapp.com/advisory/ntap-20210702-0001/"
],
"score": 5.5,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-862"
},
"CVE-2020-14058": {
"id": "CVE-2020-14058",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2020_6.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-93f5fda134a2a010b84ffedbe833d670e63ba4be.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-c6d1a4f6a2cbebceebc8a3fcd8f539ceb7b7f723.patch",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-15049": {
"id": "CVE-2020-15049",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4732"
],
"score": 8.8,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing \"+\\ \"-\" or an uncommon shell whitespace character prefix to the length field-value.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2020-15810": {
"id": "CVE-2020-15810",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 6.5,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2020-15811": {
"id": "CVE-2020-15811",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 6.5,
"services": [
"27018/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-697"
},
"CVE-2020-1927": {
"id": "CVE-2020-1927",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
"http://www.openwall.com/lists/oss-security/2020/04/03/1",
"http://www.openwall.com/lists/oss-security/2020/04/04/1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
"https://security.netapp.com/advisory/ntap-20200413-0002/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
"http://www.openwall.com/lists/oss-security/2020/04/03/1",
"http://www.openwall.com/lists/oss-security/2020/04/04/1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
"https://security.netapp.com/advisory/ntap-20200413-0002/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"score": 6.1,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-601"
},
"CVE-2020-1934": {
"id": "CVE-2020-1934",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
"https://security.netapp.com/advisory/ntap-20200413-0002/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
"https://security.netapp.com/advisory/ntap-20200413-0002/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpujul2020.html"
],
"score": 5.3,
"services": [
"8087/http"
],
"severity": "medium",
"summary": "In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-908"
},
"CVE-2020-24606": {
"id": "CVE-2020-24606",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2020-25097": {
"id": "CVE-2020-25097",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJMDRVV677AJL4BZAOLCT5LMFCGBZTC2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBXFWKIGXPERDVQXG556LLPUOCMQGERC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RYBDMJCPYGOSURWDR3WJTE474UFT77/",
"https://security.gentoo.org/glsa/202105-14",
"https://security.netapp.com/advisory/ntap-20210727-0010/",
"https://www.debian.org/security/2021/dsa-4873"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": "An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"weakness": "CWE-20"
},
"CVE-2020-35452": {
"id": "CVE-2020-35452",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/5",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/5",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 7.3,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"weakness": "CWE-787"
},
"CVE-2020-8449": {
"id": "CVE-2020-8449",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-668"
},
"CVE-2020-8450": {
"id": "CVE-2020-8450",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.3,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"weakness": "CWE-131"
},
"CVE-2020-8517": {
"id": "CVE-2020-8517",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_3.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/"
],
"score": 7.5,
"services": [
"27018/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2020-9490": {
"id": "CVE-2020-9490",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html",
"http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html",
"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490",
"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r0b6541c5fb2f8fb383861333400add7def625bc993300300de0b4f8d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c4817e7b3cca419cc%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e485ce5a01c9dc3d4d785a7d28aa7400ead1e81884034ff1f03cfee%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0fca98b475240c71%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ra4da876037477c06f2677d7a1e10b5a8613000fca99c813958070fe9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rfed9fea918e090383da33e393eb6c2755fccf05032bd7d6eb4737c9e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NKWG2EXAQQB6LMLATKZ7KLSRGCSHVAN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVFDBVM6E3JF3O7RYLRPRCH3RDRHJJY/",
"https://security.gentoo.org/glsa/202008-04",
"https://security.netapp.com/advisory/ntap-20200814-0005/",
"https://usn.ubuntu.com/4458-1/",
"https://www.debian.org/security/2020/dsa-4757",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://www.oracle.com/security-alerts/cpuoct2020.html"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-444"
},
"CVE-2021-26690": {
"id": "CVE-2021-26690",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/6",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/6",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2021-26691": {
"id": "CVE-2021-26691",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/7",
"https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2021/06/10/7",
"https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202107-38",
"https://security.netapp.com/advisory/ntap-20210702-0001/",
"https://www.debian.org/security/2021/dsa-4937",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-122"
},
"CVE-2021-28116": {
"id": "CVE-2021-28116",
"references": [
"http://www.openwall.com/lists/oss-security/2021/10/04/1",
"http://www.squid-cache.org/Versions/",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.gentoo.org/glsa/202105-14",
"https://www.debian.org/security/2022/dsa-5171",
"https://www.zerodayinitiative.com/advisories/ZDI-21-157/"
],
"score": 5.3,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2021-28651": {
"id": "CVE-2021-28651",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5104",
"https://github.com/squid-cache/squid/security/advisories/GHSA-ch36-9jhx-phm4",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-401"
},
"CVE-2021-28652": {
"id": "CVE-2021-28652",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5106",
"https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 4.9,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-401"
},
"CVE-2021-28662": {
"id": "CVE-2021-28662",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v6/changesets/squid-6-051824924c709bd6162a378f746fb859454c674e.patch",
"https://github.com/squid-cache/squid/commit/051824924c709bd6162a378f746fb859454c674e",
"https://github.com/squid-cache/squid/security/advisories/GHSA-jjq6-mh2h-g39h",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"weakness": "CWE-116"
},
"CVE-2021-31806": {
"id": "CVE-2021-31806",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-116"
},
"CVE-2021-31807": {
"id": "CVE-2021-31807",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-31808": {
"id": "CVE-2021-31808",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-33193": {
"id": "CVE-2021-33193",
"references": [
"https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch",
"https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2023/03/msg00002.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/",
"https://portswigger.net/research/http2",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20210917-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2021-17"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2021-33620": {
"id": "CVE-2021-33620",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2021-34798": {
"id": "CVE-2021-34798",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2021-17",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2021-17"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2021-39275": {
"id": "CVE-2021-39275",
"references": [
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2021-40438": {
"id": "CVE-2021-40438",
"references": [
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2021-17",
"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211008-0004/",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
"https://www.debian.org/security/2021/dsa-4982",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2021-17"
],
"score": 9,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"weakness": "CWE-918"
},
"CVE-2021-44224": {
"id": "CVE-2021-44224",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2021/12/20/3",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211224-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.debian.org/security/2022/dsa-5035",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2022-01",
"https://www.tenable.com/security/tns-2022-03",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2021/12/20/3",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211224-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.debian.org/security/2022/dsa-5035",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2022-01",
"https://www.tenable.com/security/tns-2022-03"
],
"score": 8.2,
"services": [
"8087/http"
],
"severity": "high",
"summary": "A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"weakness": "CWE-476"
},
"CVE-2021-44790": {
"id": "CVE-2021-44790",
"references": [
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2021/12/20/4",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211224-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.debian.org/security/2022/dsa-5035",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2022-01",
"https://www.tenable.com/security/tns-2022-03",
"http://httpd.apache.org/security/vulnerabilities_24.html",
"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2021/12/20/4",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20211224-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.debian.org/security/2022/dsa-5035",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.tenable.com/security/tns-2022-01",
"https://www.tenable.com/security/tns-2022-03"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2021-46784": {
"id": "CVE-2021-46784",
"references": [
"http://www.openwall.com/lists/oss-security/2023/10/13/1",
"http://www.openwall.com/lists/oss-security/2023/10/13/10",
"http://www.openwall.com/lists/oss-security/2023/10/21/1",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2021_7.patch",
"https://github.com/squid-cache/squid/commit/5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9",
"https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w",
"https://security-tracker.debian.org/tracker/CVE-2021-46784",
"https://security.netapp.com/advisory/ntap-20221223-0007/"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-617"
},
"CVE-2022-22719": {
"id": "CVE-2022-22719",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-665"
},
"CVE-2022-22720": {
"id": "CVE-2022-22720",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2022-22721": {
"id": "CVE-2022-22721",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"score": 9.1,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2022-23943": {
"id": "CVE-2022-23943",
"references": [
"http://www.openwall.com/lists/oss-security/2022/03/14/1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.tenable.com/security/tns-2022-08",
"https://www.tenable.com/security/tns-2022-09",
"http://www.openwall.com/lists/oss-security/2022/03/14/1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.tenable.com/security/tns-2022-08",
"https://www.tenable.com/security/tns-2022-09"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2022-26377": {
"id": "CVE-2022-26377",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2022-28330": {
"id": "CVE-2022-28330",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 5.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2022-28614": {
"id": "CVE-2022-28614",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 5.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-190"
},
"CVE-2022-28615": {
"id": "CVE-2022-28615",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 9.1,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2022-29404": {
"id": "CVE-2022-29404",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/5",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/5",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2022-30556": {
"id": "CVE-2022-30556",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2022-31681": {
"id": "CVE-2022-31681",
"references": [
"https://www.vmware.com/security/advisories/VMSA-2022-0025.html"
],
"score": 6.5,
"services": [
"9200/http-proxy"
],
"severity": "medium",
"summary": "VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2022-31813": {
"id": "CVE-2022-31813",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/8",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/",
"http://www.openwall.com/lists/oss-security/2022/06/08/8",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 9.8,
"services": [
"9042/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-348"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"1434/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-36760": {
"id": "CVE-2022-36760",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"1434/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2022-37436": {
"id": "CVE-2022-37436",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 5.3,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-113"
},
"CVE-2022-41317": {
"id": "CVE-2022-41317",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_1.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_1.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq",
"https://www.openwall.com/lists/oss-security/2022/09/23/1"
],
"score": 6.5,
"services": [
"6379/http"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-697"
},
"CVE-2022-41318": {
"id": "CVE-2022-41318",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_2.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-394c-rr7q-6g78",
"https://www.openwall.com/lists/oss-security/2022/09/23/2"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": "A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"weakness": "CWE-190"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"1434/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"1434/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-28370": {
"id": "CVE-2023-28370",
"references": [
"https://github.com/tornadoweb/tornado/releases/tag/v6.3.2",
"https://jvn.jp/en/jp/JVN45127776/"
],
"score": 6.1,
"services": [
"27019/http"
],
"severity": "medium",
"summary": "Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-601"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"1434/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-29552": {
"id": "CVE-2023-29552",
"references": [
"https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html",
"https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html",
"https://datatracker.ietf.org/doc/html/rfc2608",
"https://github.com/curesec/slpload",
"https://security.netapp.com/advisory/ntap-20230426-0001/",
"https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp",
"https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks",
"https://www.suse.com/support/kb/doc/?id=000021051"
],
"score": 7.5,
"services": [
"9200/http-proxy"
],
"severity": "high",
"summary": "The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-31122": {
"id": "CVE-2023-31122",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-43336": {
"id": "CVE-2023-43336",
"references": [
"http://freepbx.com",
"http://sangoma.com",
"https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826",
"http://freepbx.com",
"http://sangoma.com",
"https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826"
],
"score": 8.8,
"services": [
"5060/sip-proxy"
],
"severity": "high",
"summary": "Sangoma Technologies FreePBX before cdr 15.0.18, 16.0.40, 15.0.16, and 16.0.17 was discovered to contain an access control issue via a modified parameter value, e.g., changing extension=self to extension=101.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-45802": {
"id": "CVE-2023-45802",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 5.9,
"services": [
"9042/http"
],
"severity": "medium",
"summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2023-46724": {
"id": "CVE-2023-46724",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch",
"https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810",
"https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231208-0001/",
"http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch",
"https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810",
"https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231208-0001/"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": " Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-46728": {
"id": "CVE-2023-46728",
"references": [
"https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3",
"https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231214-0006/",
"https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3",
"https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231214-0006/"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2023-46846": {
"id": "CVE-2023-46846",
"references": [
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/security/cve/CVE-2023-46846",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245910",
"https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh",
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/security/cve/CVE-2023-46846",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245910",
"https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00008.html",
"https://security.netapp.com/advisory/ntap-20231130-0002/"
],
"score": 9.3,
"services": [
"6379/http"
],
"severity": "critical",
"summary": "SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"weakness": "CWE-444"
},
"CVE-2023-46847": {
"id": "CVE-2023-46847",
"references": [
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6805",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:6882",
"https://access.redhat.com/errata/RHSA-2023:6884",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/errata/RHSA-2023:7576",
"https://access.redhat.com/errata/RHSA-2023:7578",
"https://access.redhat.com/security/cve/CVE-2023-46847",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245916",
"https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g",
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6805",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:6882",
"https://access.redhat.com/errata/RHSA-2023:6884",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/errata/RHSA-2023:7576",
"https://access.redhat.com/errata/RHSA-2023:7578",
"https://access.redhat.com/security/cve/CVE-2023-46847",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245916",
"https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://security.netapp.com/advisory/ntap-20231130-0002/"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"weakness": "CWE-120"
},
"CVE-2023-49285": {
"id": "CVE-2023-49285",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch",
"https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b",
"https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470",
"https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/",
"http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch",
"https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b",
"https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470",
"https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-126"
},
"CVE-2023-49286": {
"id": "CVE-2023-49286",
"references": [
"http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch",
"https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264",
"https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch",
"https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264",
"https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/"
],
"score": 8.6,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-253"
},
"CVE-2023-49288": {
"id": "CVE-2023-49288",
"references": [
"https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0006/"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with \"collapsed_forwarding on\" are vulnerable. Configurations with \"collapsed_forwarding off\" or without a \"collapsed_forwarding\" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2023-50269": {
"id": "CVE-2023-50269",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0005/"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-674"
},
"CVE-2023-5824": {
"id": "CVE-2023-5824",
"references": [
"https://access.redhat.com/errata/RHSA-2023:7465",
"https://access.redhat.com/errata/RHSA-2023:7668",
"https://access.redhat.com/errata/RHSA-2024:0072",
"https://access.redhat.com/errata/RHSA-2024:0397",
"https://access.redhat.com/errata/RHSA-2024:0771",
"https://access.redhat.com/errata/RHSA-2024:0772",
"https://access.redhat.com/errata/RHSA-2024:0773",
"https://access.redhat.com/errata/RHSA-2024:1153",
"https://access.redhat.com/security/cve/CVE-2023-5824",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245914",
"https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255",
"https://access.redhat.com/errata/RHSA-2023:7465",
"https://access.redhat.com/errata/RHSA-2023:7668",
"https://access.redhat.com/errata/RHSA-2024:0072",
"https://access.redhat.com/errata/RHSA-2024:0397",
"https://access.redhat.com/errata/RHSA-2024:0771",
"https://access.redhat.com/errata/RHSA-2024:0772",
"https://access.redhat.com/errata/RHSA-2024:0773",
"https://access.redhat.com/errata/RHSA-2024:1153",
"https://access.redhat.com/security/cve/CVE-2023-5824",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245914",
"https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255",
"https://security.netapp.com/advisory/ntap-20231130-0003/"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-755"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8087/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-829"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/10",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"8087/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2024/07/17/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240808-0006/"
],
"score": 7.5,
"services": [
"9042/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
},
"CVE-2024-45802": {
"id": "CVE-2024-45802",
"references": [
"https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj"
],
"score": 7.5,
"services": [
"6379/http"
],
"severity": "high",
"summary": "Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
}
}
}