39.105.174.211
{
"scan_id": 1768119516,
"ip": "39.105.174.211",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "39.104.0.0/14",
"postal_code": "",
"coordinates": {
"latitude": "39.911",
"longitude": "116.395"
},
"geo_point": "39.911, 116.395",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": "Beijing"
},
"location_updated_at": "2026-01-11T16:01:57Z",
"asn": {
"number": "AS37963",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "39.104.0.0/14",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"descr": "Hangzhou Alibaba Advertising Co.,Ltd.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-01-11T16:01:57Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-01-11T16:20:57Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-01-11T16:01:57Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "",
"product": "Pure-FTPd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:pureftpd:pure-ftpd",
"part": "a",
"vendor": "pureftpd",
"product": "pure\\-ftpd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\r\n220-You are user number 1 of 50 allowed.\r\n220-Local time is now 12:31. Server port: 21.\r\n220-This is a private system - No anonymous login\r\n220-IPv6 connections are also welcome on this server.\r\n220 You will be disconnected after 15 minutes of inactivity.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "c8edbe91268dcf202167a353cecc4c58365ce91c",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "c8edbe91268dcf202167a353cecc4c58365ce91c"
},
"fingerprint_md5": "8BC251BE9AECDB6CA75A119BA9B685AD",
"fingerprint_sha1": "A42CE9153E1477DB227EC1EDE1A46C11A67B57A9",
"fingerprint_sha256": "48BAFC78088817A60F094CA51D8C452FA336252FCD704E75E204A6E6D1679BF0",
"issuer": {
"common_name": [
"39.105.174.211"
],
"country": [
"CN"
],
"email_address": [
"[email protected]"
],
"locality": [
"Dongguan"
],
"organization": [
"BT-PANEL"
],
"organizational_unit": [
"BT"
],
"province": [
"Guangdong"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "10058888238713167056",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true
},
"subject": {
"common_name": [
"39.105.174.211"
],
"country": [
"CN"
],
"email_address": [
"[email protected]"
],
"locality": [
"Dongguan"
],
"organization": [
"BT-PANEL"
],
"organizational_unit": [
"BT"
],
"province": [
"Guangdong"
]
},
"subject_alt_name": {
"dns_names": [
"39.105.174.211"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "3b0d9dab0e0666328957acb79f9f91136a50631efcaec4c532c66dea4c5f62d5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 1024
}
},
"tbs_fingerprint": "f2d10c3fa165cde3cea933bc67791b7086777e5b2b26031bf4fa713730332b18",
"validation_level": "OV",
"validity": {
"length_seconds": 307584000,
"not_after": "2029-05-30T13:59:20",
"not_before": "2019-08-31T13:59:20"
},
"version": 2
},
"fingerprint_sha256": "48BAFC78088817A60F094CA51D8C452FA336252FCD704E75E204A6E6D1679BF0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-12T01:25:41.652Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 617769728,
"body_sha256": "cdf9d8eee8c4fe967fac3aa9218a7227647ae7aaaa4221c688e1aab7a9180f69",
"component": [
"Nginx"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 08 Jan 2026 20:21:19 GMT"
],
"etag": [
"W/\"59005463-52e\""
],
"last_modified": [
"Wed, 26 Apr 2017 08:03:47 GMT"
],
"server": [
"nginx"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "没有找到站点",
"transfer_encoding": [
"chunked"
]
}
},
"url": "http://39.105.174.211/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-08T20:21:21.228Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 1795688466,
"body_sha256": "c55bb4c117b73e9046a079764ff7388510ce9bd3d3dde4ec89e03f0131f82bdc",
"component": [
"Nginx"
],
"content_length": -1,
"favicon": {
"md5_hash": "1e79e72afc0868ef71a5f1046e9e588a",
"murmur_hash": 1027123397,
"path": "https://39.105.174.211:443/favicon.ico?1598942722",
"size": 16702
},
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html;charset=UTF-8"
],
"date": [
"Thu, 08 Jan 2026 13:38:12 GMT"
],
"server": [
"nginx"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body_murmur": -23674247,
"body_sha256": "753e0dd54f28c4f7009b9c0b18a68aed175416bd8b7d134858264586eaac56f0",
"content_length": 138,
"location": "https://39.105.174.211/",
"status_code": 302,
"status_line": "302 Moved Temporarily"
}
],
"status_code": 200,
"title": "管道安装资质_压力管道资质_代办特种设备许可证-北京云创信达",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r12.i.lencr.org/"
]
},
"authority_key_id": "00b529f22d8e6f31e89b4cad783efadce90cd1d2",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://r12.c.lencr.org/87.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"www.yuncxd.cn"
]
},
"subject_key_id": "1cba10d66bc937f4fcd6ec454c09eea59721eea0"
},
"fingerprint_md5": "3154B659E19BA67102040656AE3AD106",
"fingerprint_sha1": "A08218D72A38980F1A936B00F2227F097909B9A6",
"fingerprint_sha256": "C27A46C1441B1CC8A5330F54E79F38ADF8BCE35DC78FD6DAFB685CF057887897",
"issuer": {
"common_name": [
"R12"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"jarm": "29d29d00029d29d22c42d42d000000307ee0eb468e9fdb5cfcd698a80a67ef",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2026-01-17T19:44:57",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "546405544755338864443131518437729041321046",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "cb38f715897c84a1445f5bc1ddfbc96ef29a59cd470a690585b0cb14c31458e7",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100acbeb6511ab00aef53add616ea4abde170d2ec81abde51d81ac716203edc15f302200ebfcfbc9df946b3bbbadb34d325303ebd5765c5be6a658462f2d6dd1d1bf49d"
},
"timestamp": "2025-10-19T14:39:51.290000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402204ab7a1d9bb5bae3c759294eda31e1e4dec160de96725e4fee02cde6b0fbdadfb02202ed6be1452a7916955e3b6527f29a07e35e5b0318312da99af54c6f588d9eca8"
},
"timestamp": "2025-10-19T14:39:51.284000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"www.yuncxd.cn"
]
},
"subject_alt_name": {
"dns_names": [
"www.yuncxd.cn"
],
"extended_dns_names": [
{
"domain": "yuncxd",
"fld": "yuncxd.cn",
"subdomain": "www",
"tld": "cn"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "3b2d959c5bce00ce91fb5f5762c57fb5a068405cabfca932a892742c5932ae43",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "90a6f2ee233ee08586a10e54045d82b6c38582b6e1f969d3c42b677d6435e0f8",
"tbs_noct_fingerprint": "34fab2b292283a0efe4e8a8614ef03e8f3b23d3bf74365bf91658b3dce99a1eb",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2026-01-17T13:41:20",
"not_before": "2025-10-19T13:41:21"
},
"version": 2
},
"fingerprint_sha256": "C27A46C1441B1CC8A5330F54E79F38ADF8BCE35DC78FD6DAFB685CF057887897",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://39.105.174.211/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-08T20:16:36.325Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.6.44-log",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:5.6.44-log",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "5\\.6\\.44\\-log",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.6.44-log"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-12T00:18:05.86Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "http",
"version": "2.4.56",
"product": "Apache httpd",
"extra_info": "(Debian)",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.56",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.56",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -1619590980,
"body_sha256": "85c72fd14e384b3741c3b419983ec367ae4d64f5aa1ce6c935b8993f50e6ed5b",
"component": [
"Debian",
"Apache HTTP Server:2.4.56",
"AngularJS",
"Matomo Analytics"
],
"content_length": -1,
"favicon": {
"md5_hash": "2a1b270c5cc27bc15325791ce1e7d9a2",
"murmur_hash": -2023266783,
"path": "http://39.105.174.211:8080/plugins/CoreHome/images/favicon.png",
"size": 2233
},
"headers": {
"cache_control": [
"no-store, must-revalidate"
],
"content_security_policy": [
"default-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' 'unsafe-inline' 'unsafe-eval' data:;"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Fri, 09 Jan 2026 17:03:24 GMT"
],
"server": [
"Apache/2.4.56 (Debian)"
],
"set_cookie": [
"MATOMO_SESSID=23a462873a932b97663f030ec48a0f75; path=/; HttpOnly; SameSite=Lax"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"same-origin"
]
},
{
"key": "x_matomo_request_id",
"value": [
"e9357"
]
}
],
"vary": [
"Accept-Encoding"
],
"x_frame_options": [
"sameorigin"
],
"x_powered_by": [
"PHP/8.1.17"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Sign in - Matomo"
}
},
"cve": [
{
"id": "CVE-2023-31122",
"severity": "high"
},
{
"id": "CVE-2023-43622",
"severity": "high"
},
{
"id": "CVE-2023-45802",
"severity": "medium"
}
],
"url": "http://39.105.174.211:8080/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-09T17:03:27.387Z"
}
],
"services_hash": "d694d8d62954d2b8b8cf7c477b46c541b0a89204f1c4e7dee42b51a036b330a0",
"last_updated_at": "2026-01-12T01:25:41.652Z",
"banner": [
"mysql",
"ftp",
"tls",
"http"
],
"is_vuln": true,
"cveDetails": {
"CVE-2023-31122": {
"id": "CVE-2023-31122",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-43622": {
"id": "CVE-2023-43622",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known \"slow loris\" attack pattern.nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.nnThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.nn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2023-45802": {
"id": "CVE-2023-45802",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 5.9,
"services": [
"8080/http"
],
"severity": "medium",
"summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8080/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"8080/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-829"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/10",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2024/07/17/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240808-0006/"
],
"score": 7.5,
"services": [
"8080/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
}
}
}