Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

39.104.178.222

SummaryCVE DetailsRaw Data
13 Dec 2025, 20:12:00 UTC
{
  "scan_id": 1765499346,
  "ip": "39.104.178.222",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "39.104.0.0/14",
    "postal_code": "",
    "coordinates": {
      "latitude": "39.911",
      "longitude": "116.395"
    },
    "geo_point": "39.911, 116.395",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "CN",
    "country_name": "China",
    "city": "Beijing"
  },
  "location_updated_at": "2025-12-13T12:33:06Z",
  "asn": {
    "number": "AS37963",
    "organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "39.104.0.0/14",
    "organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
    "descr": "Hangzhou Alibaba Advertising Co.,Ltd.",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:26:59Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-12-13T12:33:06Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-12-13T15:22:33Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-12-13T12:33:06Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\n    body {\n        width: 35em;\n        margin: 0 auto;\n        font-family: Tahoma, Verdana, Arial, sans-serif;\n    }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
          "body_murmur": 1651973090,
          "body_sha256": "38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521",
          "component": [
            "Nginx:1.10.3"
          ],
          "content_length": 612,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_length": [
              "612"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Tue, 02 Dec 2025 01:36:46 GMT"
            ],
            "etag": [
              "\"58906090-264\""
            ],
            "last_modified": [
              "Tue, 31 Jan 2017 10:01:52 GMT"
            ],
            "server": [
              "nginx/1.10.3"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "39.104.178.222",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "Welcome to nginx!"
        }
      },
      "url": "http://39.104.178.222/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-11T23:44:04.372Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Error</title>\n<style>\n    body {\n        width: 35em;\n        margin: 0 auto;\n        font-family: Tahoma, Verdana, Arial, sans-serif;\n    }\n</style>\n</head>\n<body>\n<h1>An error occurred.</h1>\n<p>Sorry, the page you are looking for is currently unavailable.<br/>\nPlease try again later.</p>\n<p>If you are the system administrator of this resource then you should check\nthe <a href=\"http://nginx.org/r/error_log\">error log</a> for details.</p>\n<p><em>Faithfully yours, nginx.</em></p>\n</body>\n</html>\n",
          "body_murmur": -1227898223,
          "body_sha256": "3c264d74770fd706d59c68d90ca1eb893ac379a666ff136f9acc66ca01daec02",
          "component": [
            "Nginx"
          ],
          "content_length": 537,
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_length": [
              "537"
            ],
            "content_type": [
              "text/html; charset=utf8"
            ],
            "date": [
              "Thu, 11 Dec 2025 12:42:23 GMT"
            ],
            "etag": [
              "\"58906090-219\""
            ],
            "server": [
              "nginx"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "39.104.178.222",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 502,
          "title": "Error"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://r13.i.lencr.org/"
                ]
              },
              "authority_key_id": "e7ab9f0f2c33a053d35e4f78c8b2840e3bd69233",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://r13.c.lencr.org/15.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n                4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n    Timestamp : Oct 22 03:20:32.495 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:A0:B5:9D:EC:FE:B4:FE:92:53:26:3D:\n                A5:72:A0:F8:81:32:52:5C:70:09:76:62:22:26:82:2C:\n                F8:F4:C4:30:52:02:20:21:62:65:85:BF:5B:4C:2A:68:\n                3F:96:39:28:E7:6A:38:25:71:53:89:07:A1:66:FA:4E:\n                C0:C9:DA:D9:83:AA:F0\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:\n                DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21\n    Timestamp : Oct 22 03:20:32.503 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:CA:76:EC:13:DD:E3:BC:B8:3C:75:C6:\n                9C:C8:9F:56:69:02:F7:BE:73:2D:86:15:20:CC:08:EC:\n                57:4C:E4:5D:A6:02:21:00:B9:2A:0B:96:95:99:AA:69:\n                3A:98:A0:B2:2D:4B:93:F1:27:D1:6C:0B:B3:29:E1:F9:\n                06:B4:17:9F:58:A1:CC:1F",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.yuanbenkeji.com"
                ]
              },
              "subject_key_id": "1cfd8b3da6efd918e2edfd0974090e0505cc7630"
            },
            "fingerprint_md5": "E09B9541BFC483923BAB03DE9E697EE5",
            "fingerprint_sha1": "FFE3491473A1AA71EACD277F0CC5A703B95E742D",
            "fingerprint_sha256": "09643A0CA0EBB8DFAB4D1CEAEF7AA1DE96730A76A9FB75E9565048F2C04999AB",
            "issuer": {
              "common_name": [
                "R13"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "Let's Encrypt"
              ]
            },
            "issuer_dn": "/C=US/O=Let's Encrypt/CN=R13",
            "jarm": "29d29d00029d29d22c29d29d29d29d881e59db99b9f67f908be168829ecef9",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-12-20T16:09:42",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "584473548873334716794163532688029966162190",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100a0b59decfeb4fe9253263da572a0f88132525c700976622226822cf8f4c43052022021626585bf5b4c2a683f963928e76a382571538907a166fa4ec0c9dad983aaf0"
                },
                "timestamp": "2025-10-22T03:20:32.495000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100ca76ec13dde3bcb83c75c69cc89f566902f7be732d861520cc08ec574ce45da6022100b92a0b969599aa693a98a0b22d4b93f127d16c0bb329e1f906b4179f58a1cc1f"
                },
                "timestamp": "2025-10-22T03:20:32.503000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.yuanbenkeji.com"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.yuanbenkeji.com"
              ],
              "extended_dns_names": [
                {
                  "domain": "yuanbenkeji",
                  "fld": "yuanbenkeji.com",
                  "subdomain": "*",
                  "tld": "com"
                }
              ]
            },
            "subject_dn": "/CN=*.yuanbenkeji.com",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "f6a75042e5e772dc20f918529b386eb3a3a746b50122a0a520898a2d6dc0b3fc",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 3072,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "3da95f13841b50ca5a8513d9a47415ed0d34ca90699ec4134a0c3bce6b4b6ae4",
            "tbs_noct_fingerprint": "5d1439fa8a0f62d5486d5dfea360265f324955a95324b9033d4fa72912878143",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7775999,
              "not_after": "2026-01-20T02:22:01",
              "not_before": "2025-10-22T02:22:02"
            },
            "version": 2
          },
          "fingerprint_sha256": "09643A0CA0EBB8DFAB4D1CEAEF7AA1DE96730A76A9FB75E9565048F2C04999AB",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://39.104.178.222/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-11T16:34:29.255Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "ms-sql-s",
      "version": "12.00.5000; SP2",
      "product": "Microsoft SQL Server 2014",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:sql_server:2014:sp2",
          "part": "a",
          "vendor": "microsoft",
          "product": "sql_server",
          "version": "2014",
          "language": "ANY",
          "edition": "ANY",
          "update": "sp2"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_ON",
          "instance_name": "",
          "version": "12.0.5000"
        }
      },
      "cve": [
        {
          "id": "CVE-2015-1761",
          "score": 6.5,
          "severity": "medium"
        },
        {
          "id": "CVE-2015-1762",
          "score": 7.1,
          "severity": "high"
        },
        {
          "id": "CVE-2015-1763",
          "score": 8.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-13T11:41:46.401Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.7.24-log",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.7.24-log",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.7\\.24\\-log",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.7.24-log"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-13T20:12:00.817Z"
    },
    {
      "port": 6000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-01T11:35:59.023Z"
    },
    {
      "port": 6443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-02T19:18:17.727Z"
    }
  ],
  "services_hash": "ee74104c7abc1b30d7d11989e6c3d3dc48e12a97647874e77a754dc474f7ba8e",
  "last_updated_at": "2025-12-13T20:12:00.817Z",
  "banner": [
    "mssql",
    "mysql",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2015-1761": {
      "id": "CVE-2015-1761",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
      ],
      "score": 6.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "medium",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-284"
    },
    "CVE-2015-1762": {
      "id": "CVE-2015-1762",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 7.1,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-74"
    },
    "CVE-2015-1763": {
      "id": "CVE-2015-1763",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 8.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-284"
    },
    "CVE-2016-7250": {
      "id": "CVE-2016-7250",
      "references": [
        "http://www.securityfocus.com/bid/94060",
        "http://www.securitytracker.com/id/1037250",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2014 SP1, 2014 SP2, and 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka \"SQL RDBMS Engine Elevation of Privilege Vulnerability.\"",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-264"
    },
    "CVE-2016-7253": {
      "id": "CVE-2016-7253",
      "references": [
        "http://www.securityfocus.com/bid/94056",
        "http://www.securitytracker.com/id/1037250",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "The agent in Microsoft SQL Server 2012 SP2, 2012 SP3, 2014 SP1, 2014 SP2, and 2016 does not properly check the atxcore.dll ACL, which allows remote authenticated users to gain privileges via unspecified vectors, aka \"SQL Server Agent Elevation of Privilege Vulnerability.\"",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-264"
    },
    "CVE-2017-8516": {
      "id": "CVE-2017-8516",
      "references": [
        "http://www.securityfocus.com/bid/100041",
        "http://www.securitytracker.com/id/1039110",
        "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8516"
      ],
      "score": 7.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server Analysis Services in Microsoft SQL Server 2012, Microsoft SQL Server 2014, and Microsoft SQL Server 2016 allows an information disclosure vulnerability when it improperly enforces permissions, aka \"Microsoft SQL Server Analysis Services Information Disclosure Vulnerability\".",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2019-1068": {
      "id": "CVE-2019-1068",
      "references": [
        "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1068"
      ],
      "score": 8.8,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions, aka 'Microsoft SQL Server Remote Code Execution Vulnerability'.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    }
  }
}