66.228.62.242
{
"scan_id": 1757185134,
"ip": "66.228.62.242",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "66.228.56.0/21",
"postal_code": "30301",
"coordinates": {
"latitude": "33.7485",
"longitude": "-84.3871"
},
"geo_point": "33.7485, -84.3871",
"locale_code": "en",
"continent": "North America",
"country_code": "US",
"country_name": "United States",
"city": "Atlanta"
},
"location_updated_at": "2025-09-07T00:33:55Z",
"asn": {
"number": "AS63949",
"organization": "Akamai Connected Cloud",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "66.228.32.0/19",
"organization": "Akamai Technologies, Inc.",
"descr": "Akamai Technologies, Inc.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2025-02-04T15:07:06Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-09-07T00:33:55Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-09-07T01:34:39Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-09-07T00:33:55Z"
}
],
"hostnames": [
{
"name": "66-228-62-242.ip.linodeusercontent.com",
"last_updated_at": "2025-09-08T12:59:35.54871018Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "2.0",
"product": "PCMan's FTP Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:pcman%27s_ftp_server_project:pcman%27s_ftp_server:2.0",
"part": "a",
"vendor": "pcman\\'s_ftp_server_project",
"product": "pcman\\'s_ftp_server",
"version": "2\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 PCMan's FTP Server 2.0 Ready.\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T23:17:08.139Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "8.9p1",
"product": "OpenSSH",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:8.9p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "8\\.9p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-HUAWEI-VRP-3.10",
"client_to_server_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"host_key_algorithms": [
"rsa-sha2-256",
"rsa-sha2-512",
"ssh-rsa"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group14-sha256",
"diffie-hellman-group14-sha1",
"[email protected]"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "4a57f26790b40b40673ed7b2e8e3fd3e4204f02e031f608ea2549ebf73f9e2ef"
},
"server_to_client_ciphers": [
"[email protected]",
"[email protected]",
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"software": "HUAWEI-VRP-3.10",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"severity": "high"
},
{
"id": "CVE-2023-28531",
"severity": "critical"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T09:42:11.679Z"
},
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Cowrie Honeypot telnetd",
"extra_info": "",
"tunnel": "",
"modules": {
"telnet": {
"banner": "CPE login: "
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T22:17:49.18Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "8.14.7/8.14.7",
"product": "Sendmail",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.14\\.7\\/8\\.14\\.7",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www.oowoo.cc ESMTP Postfix smtpd; 1756778038179@be6761099d2fadfc40f034a8e78d4640-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e1cc6ed93abc9be7fcd9240e2105== xsm\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T01:54:01.86Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mortbay:jetty:winstone-2.8",
"part": "a",
"vendor": "mortbay",
"product": "jetty",
"version": "winstone\\-2\\.8",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -436671628,
"body_sha256": "a2140aeb26e4fddf138021b3de8a75dbebe17af89fbceecada67394f67bde048",
"component": [
"Ruby on Rails",
"Adobe ColdFusion",
"Microsoft ASP.NET",
"WordPress",
"PHP",
"Bugzilla:5.0.1",
"Perl",
"Django",
"SPIP:4.1.11",
"CFML",
"Liveinternet",
"BEM",
"MySQL",
"Python",
"Ruby",
"Symfony",
"F5 BigIP",
"Roadiz CMS:1.2.36"
],
"content_length": 126229,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://66.228.62.242:80/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"126229"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Sep 2025 16:43:22 GMT"
],
"server": [
"BIG-IP"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "GPON ONT"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:80/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T16:50:11.476Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"pop3": {
"banner": "+OK Sendmail 8.14.7/8.14.7 ready. <1756872396762@be6761099d2fadfc40f034a8e78d4640-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc75c638bf9beefcc2380c2b==>\r\n"
}
},
"url": "http://66.228.62.242:110/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-03T04:06:37.051Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-01T14:14:01.711Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "Asterisk 15.7.4",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -1954261635,
"body_sha256": "2fe40d4aaa069b687eb98b9fbab3ea0b61b2635754ab2adad11bf6af9398b2e5",
"component": [
"PHP",
"Liveinternet",
"Adobe ColdFusion",
"Ruby",
"WordPress",
"MySQL",
"Microsoft ASP.NET",
"Ruby on Rails",
"SPIP:4.1.11",
"Django",
"CFML",
"Bugzilla:5.0.1",
"Roadiz CMS:1.2.36",
"Symfony",
"BEM",
"Python",
"Perl"
],
"content_length": 125318,
"favicon": {
"md5_hash": "41776fd18cb6fdadf3c2262a81ac0242",
"murmur_hash": 1045696447,
"path": "http://66.228.62.242:443/favicon.ico",
"size": 1150
},
"headers": {
"content_length": [
"125318"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Sep 2025 03:35:01 GMT"
],
"server": [
"RTKWeb0.9"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Harbor"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T03:35:24.672Z"
},
{
"port": 445,
"protocol": "tcp",
"name": "http-proxy",
"version": "4.13-VCS",
"product": "Squid http proxy",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:squid-cache:squid:4.13-vcs",
"part": "a",
"vendor": "squid\\-cache",
"product": "squid",
"version": "4\\.13\\-vcs",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 80842444,
"body_sha256": "84159a051295fb14e8a0a5154f6fddd93da247065c6c776276ea01e4045a1cd0",
"component": [
"PHP",
"Microsoft ASP.NET",
"SPIP:4.1.11",
"Roadiz CMS:1.2.36",
"Django",
"MySQL",
"Bugzilla:5.0.1",
"Perl",
"Liveinternet",
"Python",
"CFML",
"Ruby on Rails",
"Ruby",
"Symfony",
"Adobe ColdFusion",
"WordPress",
"BEM"
],
"content_length": 126242,
"headers": {
"content_length": [
"126242"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Sep 2025 14:34:51 GMT"
],
"server": [
"hidden"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Default Web Site Page"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2020-25097",
"severity": "high"
},
{
"id": "CVE-2021-28116",
"severity": "medium"
},
{
"id": "CVE-2021-28651",
"severity": "high"
}
],
"url": "https://66.228.62.242:445/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T14:35:14.762Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "8.14.7/8.14.7",
"product": "Sendmail",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.14\\.7\\/8\\.14\\.7",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-06T22:49:41.887Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "8.14.7/8.14.7",
"product": "Sendmail",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
"part": "a",
"vendor": "sendmail",
"product": "sendmail",
"version": "8\\.14\\.7\\/8\\.14\\.7",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 www.oowoo.cc ESMTP Postfix smtpd; 1757311412221@be6761099d2fadfc40f034a8e78d4640-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc77c63bba87f8ffda3b11250b== xsm\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T06:03:35.728Z"
},
{
"port": 631,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -375199542,
"body_sha256": "458d19e8cecdd1c7c324caaa6559d8049967d76291260cb658403210882f54cf",
"component": [
"Virtuoso",
"BEM",
"WordPress",
"Ruby",
"Django",
"CFML",
"Microsoft ASP.NET",
"Adobe ColdFusion",
"PHP",
"MySQL",
"Ruby on Rails",
"Python",
"Liveinternet"
],
"content_length": 124609,
"headers": {
"content_length": [
"124609"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 16 Aug 2025 22:05:03 GMT"
],
"server": [
"Virtuoso"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "PENTAGRAM"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"ipp": {
"printer_uris": null,
"versions": null
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "87D168466725262211AB4EB857EC3C68",
"fingerprint_sha1": "0F37352DD028FC95F13284F6763E0A399D057F96",
"fingerprint_sha256": "7065BA0978F74ECEE9DFD00A289EF70835AEE60D40A3FE9BDE54AB04A264250D",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"PF"
],
"domain_component": [
"BSHZJ",
"local"
],
"organization": [
"MDQOOVLP"
],
"organizational_unit": [
"SSTBLXJ"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8887193343177629331",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"PF"
],
"domain_component": [
"BSHZJ",
"local"
],
"organization": [
"MDQOOVLP"
],
"organizational_unit": [
"SSTBLXJ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e38344c9330202b12cfb75d21a590a56bccad4e1504a4f4ef01458df417ec3f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "fc0d7b3caea05c5e1db4cd32d540b94f13baf775898b50e96fd16e664d900110",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-16T08:52:37",
"not_before": "2025-08-16T08:52:37"
},
"version": 2
},
"fingerprint_sha256": "7065BA0978F74ECEE9DFD00A289EF70835AEE60D40A3FE9BDE54AB04A264250D",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:631/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-01T22:12:28.906Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "http",
"version": "2.3.2",
"product": "Tengine httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:alibaba:tengine:2.3.2",
"part": "a",
"vendor": "alibaba",
"product": "tengine",
"version": "2\\.3\\.2",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 890749286,
"body_sha256": "46e3e86e552c2cc9232b1459a170842d254a995ee214f15a44995b98f118ee61",
"component": [
"Bugzilla:5.0.1",
"Symfony",
"Perl",
"Microsoft ASP.NET",
"MySQL",
"PHP",
"Ruby",
"Liveinternet",
"Python",
"Ruby on Rails",
"Django",
"WordPress",
"CFML",
"SPIP:4.1.11",
"Roadiz CMS:1.2.36",
"BEM",
"Adobe ColdFusion"
],
"content_length": 126521,
"headers": {
"content_length": [
"126521"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 07 Sep 2025 01:33:34 GMT"
],
"server": [
"yuntuc"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "H168N"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:993/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T01:33:58.431Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 563815031,
"body_sha256": "96223162963741712c28f777a96be81b2b340af1191e86e9478dd41aed245860",
"component": [
"Ruby on Rails",
"Ruby",
"SPIP:4.1.11",
"Python",
"Perl",
"Bugzilla:5.0.1",
"CFML",
"BEM",
"Roadiz CMS:1.2.36",
"Liveinternet",
"Django",
"MySQL",
"PHP",
"Microsoft ASP.NET",
"Symfony",
"Adobe ColdFusion",
"WordPress"
],
"content_length": 125333,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://66.228.62.242:995/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"125333"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 28 Aug 2025 03:20:25 GMT"
],
"server": [
"-"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Apache Tomcat/7.0.103"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:995/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-01T07:49:38.178Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_NOT_SUP",
"instance_name": "",
"version": "15.0.4153"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T05:01:25.423Z"
},
{
"port": 1434,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -463310534,
"body_sha256": "df3be56c3b304761a0890ebf715177a7dcc6edc5be56f34189aaf73d687be20d",
"component": [
"Roadiz CMS:1.2.36",
"SPIP:4.1.11",
"Django",
"BEM",
"Liveinternet",
"CFML",
"Ruby",
"Symfony",
"Bugzilla:5.0.1",
"Perl",
"WordPress",
"PHP",
"Adobe ColdFusion",
"Ruby on Rails",
"Python",
"Microsoft ASP.NET",
"MySQL"
],
"content_length": 125335,
"favicon": {
"md5_hash": "44071663a97aa46640d124dd31fe7521",
"murmur_hash": 2091717113,
"path": "http://66.228.62.242:1434/favicon.ico",
"size": 7659
},
"headers": {
"content_length": [
"125335"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 29 Aug 2025 11:37:16 GMT"
],
"server": [
"Payara Server 5.2021.7 #badassfish"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "DG-SC385 Network Camera"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:1434/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-06T20:41:08.305Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body_murmur": 1530341069,
"body_sha256": "b10e0ede0629b7262d6a1ebbb324df918e4e6c32f018c22b70c94b0ac1be1b19",
"component": [
"Adobe ColdFusion",
"WordPress",
"Ruby on Rails",
"Django",
"Python",
"CFML",
"BEM",
"Microsoft ASP.NET",
"MySQL",
"PHP",
"Liveinternet",
"Ruby"
],
"content_length": 124206,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://66.228.62.242:1883/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"124206"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 15 Aug 2025 00:44:44 GMT"
],
"server": [
"Wintendo1.3.3.7"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "JCG Wireless Router"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "84CA3191929D64F8706C45CEA47C2EF4",
"fingerprint_sha1": "6FD452FFC724F559942A5BA11D3686FB48ED6DEF",
"fingerprint_sha256": "906A75AF7BD3FB5893854503C110C1C395F6E58368E545946593EE05847C9985",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"MV"
],
"domain_component": [
"NAFCZUJ",
"local"
],
"organization": [
"WLGRMFOM"
],
"organizational_unit": [
"OZODLGR"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "7184102998572398894",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"MV"
],
"domain_component": [
"NAFCZUJ",
"local"
],
"organization": [
"WLGRMFOM"
],
"organizational_unit": [
"OZODLGR"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "02e7651a25191b4892dcae0e9a7c8a93b40e12db45a3cf6828ce16813aad4b39",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "a96e31d6adeb42f6f5cacfeb21a148dffb86b51c5e1f5a72be3f1d0ee5e368fc",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-14T09:15:28",
"not_before": "2025-08-14T09:15:28"
},
"version": 2
},
"fingerprint_sha256": "906A75AF7BD3FB5893854503C110C1C395F6E58368E545946593EE05847C9985",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:1883/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T00:49:20.023Z"
},
{
"port": 1911,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -783773197,
"body_sha256": "92f638936a116a1abcb6862800e5bac16abb3266975ea8b2fe27c476769ec1ec",
"component": [
"Ruby on Rails",
"WordPress",
"Python",
"Liveinternet",
"Ruby",
"Microsoft ASP.NET",
"CFML",
"Django",
"MySQL",
"Adobe ColdFusion",
"PHP",
"BEM",
"IIS:5.1",
"Windows Server"
],
"content_length": 124744,
"headers": {
"content_length": [
"124744"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 19 Aug 2025 07:14:41 GMT"
],
"server": [
"Microsoft-IIS/5.1"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "KACO new energy"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "AF1090CD169BE4E6B1608B4304F94EE1",
"fingerprint_sha1": "3A6CE942954D6713642B99E20B1C570F4F289D5A",
"fingerprint_sha256": "41F87DE39788F3A7BF067CA415F740949F96135087FC254605EBAB65E4E42EF4",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"CO"
],
"domain_component": [
"EORSYAWH",
"local"
],
"organization": [
"RMVNXLTG"
],
"organizational_unit": [
"OFEIIEC"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5087694588637568647",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"CO"
],
"domain_component": [
"EORSYAWH",
"local"
],
"organization": [
"RMVNXLTG"
],
"organizational_unit": [
"OFEIIEC"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "47a7c71a93b84fdc4225af5b8611b36f7ada75d909a74591275dec80c098c2a8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "cbda1b93bd6d8bae420bbf006d6b01215a67354762f4f55a30f3fb23ab46fd66",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-18T10:03:02",
"not_before": "2025-08-18T10:03:02"
},
"version": 2
},
"fingerprint_sha256": "41F87DE39788F3A7BF067CA415F740949F96135087FC254605EBAB65E4E42EF4",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:1911/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T05:32:57.201Z"
},
{
"port": 2181,
"protocol": "tcp",
"name": "http",
"version": "3.2.2",
"product": "CherryPy httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:cherrypy:cherrypy:3.2.2",
"part": "a",
"vendor": "cherrypy",
"product": "cherrypy",
"version": "3\\.2\\.2",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -408338125,
"body_sha256": "a459918f8dbd0899664bd904e9665bd723b3980d3285c03f3e47b2ae5b8eebe6",
"component": [
"Roadiz CMS:1.2.36",
"Symfony",
"Perl",
"Python",
"Microsoft ASP.NET",
"WordPress",
"MySQL",
"Ruby on Rails",
"Liveinternet",
"PHP",
"Ruby",
"SPIP:4.1.11",
"BEM",
"Adobe ColdFusion",
"CFML",
"Bugzilla:5.0.1",
"Django"
],
"content_length": 126527,
"favicon": {
"md5_hash": "b5c66b07a742597376263bb23fc11b15",
"murmur_hash": 444712798,
"path": "http://66.228.62.242:2181/favicon.ico",
"size": 5506
},
"headers": {
"content_length": [
"126527"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 06 Sep 2025 22:11:49 GMT"
],
"server": [
"Virtual Web 0.9"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "TamasiPHNAS"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:2181/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-06T22:12:10.852Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smtp": {
"banner": "220 www.oowoo.cc ESMTP Exim smtpd/4.94.2; 1757255347262@be6761099d2fadfc40f034a8e78d4640-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e3ce6eda38bb9be1fdc23f0b== xsm\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T14:29:10.855Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.7.31",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:5.7.31",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "5\\.7\\.31",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.7.31"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T14:40:41.88Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "http",
"version": "10.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:10.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "10\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 911697663,
"body_sha256": "a1d398f5d766238a1894401040e0311c4d09679ce913a7f722b2304e72fe27ae",
"component": [
"WordPress",
"Perl",
"SPIP:4.1.11",
"Adobe ColdFusion",
"CFML",
"BEM",
"MySQL",
"Symfony",
"Django",
"Python",
"Microsoft ASP.NET",
"PHP",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"Bugzilla:5.0.1",
"Liveinternet",
"Ruby"
],
"content_length": 126513,
"favicon": {
"md5_hash": "c87bab9d4a9129f7d2e97044dbae6793",
"murmur_hash": -399311436,
"path": "http://66.228.62.242:5000/favicon.ico",
"size": 4286
},
"headers": {
"content_length": [
"126513"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 08 Sep 2025 02:48:14 GMT"
],
"server": [
"WMSServer/2.0.1.0"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "TL-WR940N"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:5000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T02:48:37.894Z"
},
{
"port": 5060,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T16:50:35.737Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T03:53:26.482Z"
},
{
"port": 5671,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body_murmur": -1936216475,
"body_sha256": "5d564ba39f7991705860857001734ff74fc2eca3fd0edc6b7532ef7392643b53",
"component": [
"PHP",
"CFML",
"Perl",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"Python",
"WordPress",
"Ruby",
"MySQL",
"Microsoft ASP.NET",
"BEM",
"Adobe ColdFusion",
"Liveinternet",
"Symfony",
"SunOS",
"Django",
"Bugzilla:5.0.1",
"SPIP:4.1.11"
],
"content_length": 125341,
"favicon": {
"md5_hash": "6220f00b190723200494ffaa4dc8c00a",
"murmur_hash": 1592926977,
"path": "http://66.228.62.242:5671/favicon.ico",
"size": 7457
},
"headers": {
"content_length": [
"125341"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 29 Aug 2025 15:47:57 GMT"
],
"server": [
"SunOS"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ICU_Dragon_3_0_18 - Overview - LuCI"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:5671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T05:05:47.167Z"
},
{
"port": 5984,
"protocol": "tcp",
"name": "http",
"version": "10",
"product": "JBoss WildFly Application Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:redhat:jboss_wildfly_application_server:10",
"part": "a",
"vendor": "redhat",
"product": "jboss_wildfly_application_server",
"version": "10",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:vmware:ESXi:6.5.0",
"part": "o",
"vendor": "vmware",
"product": "esxi",
"version": "6\\.5\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"couchdb": {
"databases": [
"_replicator",
"_users",
"admin",
"passwords",
"core-configuration",
"core-locales",
"core-photos",
"core-tasks",
"fml",
"mcx",
"mlkvljnah",
"mllbqddlikk",
"mzpp",
"nsjl",
"oqulw",
"pmbt",
"qys",
"todv",
"user00230",
"user00400",
"user02030",
"user02212",
"user03200",
"user21212",
"user22100",
"user22402",
"user23122",
"user23213",
"user23421",
"user24022",
"user31210",
"user33212",
"user33233",
"user40114",
"user40430",
"user42341",
"vfl",
"wryknmigdtx",
"wtpl"
],
"version": "1.6.1"
},
"http": {
"body_murmur": 1033467107,
"body_sha256": "84c1b0de24fe7c380a9eaf1a23043033d282cce52b3143f99ba221bf5ccc95c8",
"component": [
"CouchDB:1.6.1",
"Erlang: otp/17"
],
"content_length": 32,
"headers": {
"content_length": [
"32"
],
"content_type": [
"application/json"
],
"date": [
"Sun, 07 Sep 2025 09:10:17 GMT"
],
"server": [
"CouchDB/1.6.1 (Erlang OTP/17)"
]
},
"protocol": "HTTP/1.1",
"status_code": 200
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2016-9589",
"severity": "high"
},
{
"id": "CVE-2022-31681",
"severity": "medium"
},
{
"id": "CVE-2023-29552",
"severity": "high"
}
],
"url": "https://66.228.62.242:5984/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T09:10:39.254Z"
},
{
"port": 6000,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -1990844356,
"body_sha256": "82021257b6cdad2109d5dcf5dbf123435a7512773eef3b624adc9d99de714b60",
"component": [
"Perl",
"Ruby",
"Adobe ColdFusion",
"CFML",
"Python",
"Bugzilla:5.0.1",
"BEM",
"Symfony",
"SPIP:4.1.11",
"Liveinternet",
"Microsoft ASP.NET",
"Ruby on Rails",
"Django",
"Roadiz CMS:1.2.36",
"WordPress",
"MySQL",
"PHP"
],
"content_length": 125292,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://66.228.62.242:6000/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"125292"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 22 Aug 2025 07:28:27 GMT"
],
"server": [
"CDN_NWS_"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "中山路MAX电竞-高恪"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:6000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-01T21:11:33.116Z"
},
{
"port": 6379,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 546754136,
"body_sha256": "67e09ce17e9b98881346c9e195fa20ac7e87a8e8cc53e4255851bb9a0588b4f0",
"component": [
"MySQL",
"Django",
"CFML",
"BEM",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"Liveinternet",
"PHP",
"Bugzilla:5.0.1",
"Perl",
"Python",
"Microsoft ASP.NET",
"Ruby",
"SPIP:4.1.11",
"Symfony",
"WordPress",
"Adobe ColdFusion"
],
"content_length": 125305,
"favicon": {
"md5_hash": "c87bab9d4a9129f7d2e97044dbae6793",
"murmur_hash": -399311436,
"path": "http://66.228.62.242:6379/favicon.ico",
"size": 4286
},
"headers": {
"content_length": [
"125305"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 29 Aug 2025 22:14:23 GMT"
],
"server": [
"Phusion Passenger"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ICLAD"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"redis": {
"arch_bits": "64",
"build_id": "fac228d1928e92e0",
"gcc_version": "4.4.7",
"git_sha1": "00000000",
"major": 5,
"mem_allocator": "jemalloc-3.6.0",
"minor": 0,
"mode": "standalone",
"os": "Linux 2.6.32-220.7.1.el6.x86_64 x86_64",
"patchlevel": 13,
"total_commands_processed": 9248144,
"total_connections_received": 41002,
"uptime_in_seconds": 13212977,
"used_memory": 125657656,
"version": "5.0.13"
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:6379/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T09:13:24.51Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 2074170183,
"body_sha256": "8598f9e63389e4282e1aff4f350fe512d6df1290226f87f4c0c85d47f4dd2ad0",
"component": [
"Liveinternet",
"WordPress",
"MySQL",
"PHP",
"BEM",
"Microsoft ASP.NET",
"CFML",
"Python",
"Ruby on Rails",
"Ruby",
"Adobe ColdFusion",
"Django"
],
"content_length": 123963,
"favicon": {
"md5_hash": "77b2f4c09890ab658a72c4bad8c1077b",
"murmur_hash": 1924358485,
"path": "http://66.228.62.242:6443/favicon.ico",
"size": 1630
},
"headers": {
"content_length": [
"123963"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 09 Aug 2025 20:42:24 GMT"
],
"server": [
"Soundweb London"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "NVRE93B7A"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "B795BEEB8A27BA833F3F5C7D91487A8B",
"fingerprint_sha1": "41A221DDAA16E1F4829A2CC9E6FE53B1617787F7",
"fingerprint_sha256": "8DFDA2E79AD216B781A1C39161217D2F1678DDC97170B29C8EC06EA41A346EBA",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"BV"
],
"domain_component": [
"HV",
"local"
],
"organization": [
"HTDNJQMI"
],
"organizational_unit": [
"XYYPNXU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "771993004177871088",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"BV"
],
"domain_component": [
"HV",
"local"
],
"organization": [
"HTDNJQMI"
],
"organizational_unit": [
"XYYPNXU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "0dc8944d9f91ad193fff6523a7008b900c7e7ca3d3ac3f4ad3943a68daa526d2",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "41f6ef674952f9ed2eb762977cbc1d3459ac4ebf2812964825bb62ea2966bf83",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-07-31T10:12:40",
"not_before": "2025-07-31T10:12:40"
},
"version": 2
},
"fingerprint_sha256": "8DFDA2E79AD216B781A1C39161217D2F1678DDC97170B29C8EC06EA41A346EBA",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:6443/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T18:45:11.768Z"
},
{
"port": 7574,
"protocol": "tcp",
"name": "http",
"version": "19.8.1",
"product": "Gunicorn",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:gunicorn:gunicorn:19.8.1",
"part": "a",
"vendor": "gunicorn",
"product": "gunicorn",
"version": "19\\.8\\.1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 159894106,
"body_sha256": "6ca2da7b70ebeae0570687b0b5cd6f11dd8349b495fbc7fdc1ee3fe2b18d2fee",
"component": [
"Liveinternet",
"Ruby on Rails",
"SPIP:4.1.11",
"WordPress",
"MySQL",
"Django",
"Microsoft ASP.NET",
"Roadiz CMS:1.2.36",
"Symfony",
"Bugzilla:5.0.1",
"Ruby",
"Adobe ColdFusion",
"CFML",
"BEM",
"PHP",
"Python",
"Perl"
],
"content_length": 126385,
"favicon": {
"md5_hash": "b5c66b07a742597376263bb23fc11b15",
"murmur_hash": 444712798,
"path": "http://66.228.62.242:7574/favicon.ico",
"size": 5506
},
"headers": {
"content_length": [
"126385"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 05 Sep 2025 00:27:01 GMT"
],
"server": [
"Infinova-Webs"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Mytiendaglobal |"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:7574/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T00:27:23.484Z"
},
{
"port": 8086,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 1943397332,
"body_sha256": "0254ccd599ea776fbf8c9bdbd2f42fae8fe68f3f048f17164d18bcc8698ed066",
"component": [
"PHP",
"Django",
"Ruby on Rails",
"WordPress",
"MySQL",
"Perl",
"CFML",
"Adobe ColdFusion",
"BEM",
"Bugzilla:5.0.1",
"Python",
"Roadiz CMS:1.2.36",
"Symfony",
"Microsoft ASP.NET",
"Ruby",
"SPIP:4.1.11",
"Liveinternet"
],
"content_length": 126384,
"headers": {
"content_length": [
"126384"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 04 Sep 2025 18:41:24 GMT"
],
"server": [
"************"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "MikroTik SwOS"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:8086/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T12:44:47.713Z"
},
{
"port": 8087,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body_murmur": -856430080,
"body_sha256": "e8f437909bc21874e9e3c13500cab5d8a9643824017b7b56568645c732a8a1ae",
"component": [
"Adobe ColdFusion",
"CFML",
"Perl",
"Microsoft ASP.NET",
"MySQL",
"PHP",
"Liveinternet",
"BEM",
"Symfony",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"SPIP:4.1.11",
"Bugzilla:5.0.1",
"Django",
"Python",
"Ruby",
"WordPress"
],
"content_length": 126232,
"headers": {
"content_length": [
"126232"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 03 Sep 2025 05:23:57 GMT"
],
"server": [
"Docker/1.10.3 (linux)"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "HFL"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:8087/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T09:49:34.548Z"
},
{
"port": 8500,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"consul": {
"build_date": "2024-10-14T20:52:01Z",
"datacenter": "dc1",
"node_id": "e5ad94e9-c381-5717-4b0c-2166fc0bb30b",
"node_name": "lvmkl",
"primary_datacenter": "dc1",
"revision": "cddc6181",
"server": true,
"version": "1.20.0"
},
"http": {
"body_murmur": -861312302,
"body_sha256": "46b2635cebbcaf4604af4e437953cfb0dc00a2f6c66e73e64aa07ed94e73c074",
"component": [
"CFML",
"Microsoft ASP.NET",
"Python",
"Ruby on Rails",
"Symfony",
"Liveinternet",
"BEM",
"WordPress",
"MySQL",
"PHP",
"Adobe ColdFusion",
"Bugzilla:5.0.1",
"Perl",
"Django",
"Ruby",
"Roadiz CMS:1.2.36",
"SPIP:4.1.11"
],
"content_length": 126527,
"headers": {
"content_length": [
"126527"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 07 Sep 2025 11:09:27 GMT"
],
"server": [
"VIAWEB system/1.0.0 (http://www.viawebsystem.com.br)"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Cisco ASDM 7.8(2)"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:8500/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T11:16:19.061Z"
},
{
"port": 8883,
"protocol": "tcp",
"name": "mqtt",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T11:31:10.748Z"
},
{
"port": 8983,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body_murmur": -330541791,
"body_sha256": "b1472b374275c987724725c819db2f076b44d9238db335fee267323fa0e345e5",
"component": [
"Perl",
"Adobe ColdFusion",
"Ruby",
"Django",
"Microsoft ASP.NET",
"Roadiz CMS:1.2.36",
"SPIP:4.1.11",
"Liveinternet",
"MySQL",
"PHP",
"CFML",
"Symfony",
"Bugzilla:5.0.1",
"WordPress",
"Python",
"BEM",
"Ruby on Rails"
],
"content_length": 125336,
"favicon": {
"md5_hash": "9b71349660a2170717ff6a84f9de12a1",
"murmur_hash": 939607277,
"path": "http://66.228.62.242:8983/favicon.ico",
"size": 2340
},
"headers": {
"content_length": [
"125336"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 26 Aug 2025 00:45:42 GMT"
],
"server": [
"MoxaHttp/2.3"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Ivanti System Manager: Sign In"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:8983/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T04:36:06.154Z"
},
{
"port": 9042,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 647551289,
"body_sha256": "dff9866f0cdb83e4a61225960161978d37fe3953225d2b9ccda3253b56de7331",
"component": [
"Django",
"MySQL",
"Ruby on Rails",
"Ruby",
"Liveinternet",
"BEM",
"Python",
"CFML",
"WordPress",
"Jetty",
"Adobe ColdFusion",
"Microsoft ASP.NET",
"PHP",
"Java"
],
"content_length": 124214,
"headers": {
"content_length": [
"124214"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 13 Aug 2025 19:22:12 GMT"
],
"server": [
"Jetty/5.1.10 (Windows Server 2008/6.1 amd64 java/1.6.0_07"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ICU_Dragon_3_0_18 - Overview - LuCI"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "74BB15DC1693E08296FB5B7E305021D6",
"fingerprint_sha1": "8A984251A9FBAE842D9B3A3E667BEB96D85BFCDA",
"fingerprint_sha256": "D5F2F871222C1EB66E6FEE6D4B2AB89C4288C72B9F23C26792410FF879DF916F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"JM"
],
"domain_component": [
"XFQRDF",
"local"
],
"organization": [
"CGDSCUHC"
],
"organizational_unit": [
"ZWEGISJ"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8263504071246047857",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"JM"
],
"domain_component": [
"XFQRDF",
"local"
],
"organization": [
"CGDSCUHC"
],
"organizational_unit": [
"ZWEGISJ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "35174d4f633c126e378b9f67bfc10a9ebac65cf5d7afd2c4775f1138ebc87bc5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "8eecb6c89b412a63980dfc46325851be7bd091dc9e6a221dab92e857da11e28b",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-12T10:12:49",
"not_before": "2025-08-12T10:12:49"
},
"version": 2
},
"fingerprint_sha256": "D5F2F871222C1EB66E6FEE6D4B2AB89C4288C72B9F23C26792410FF879DF916F",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:9042/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-08T04:19:07.781Z"
},
{
"port": 9092,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 586309063,
"body_sha256": "b665e43af770b5a5d585d7414598b32373219917835a4b3d58a6bfd92900d0fb",
"component": [
"BEM",
"Liveinternet",
"Ruby",
"Microsoft ASP.NET",
"Django",
"CFML",
"Python",
"Adobe ColdFusion",
"Ruby on Rails",
"WordPress",
"MySQL",
"PHP"
],
"content_length": 124212,
"favicon": {
"md5_hash": "2981503b195488ac17d05dcf18615cd1",
"murmur_hash": -1439222863,
"path": "http://66.228.62.242:9092/favicon.ico",
"size": 1150
},
"headers": {
"content_length": [
"124212"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 13 Aug 2025 06:12:25 GMT"
],
"server": [
"gen5th/1.33.00"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "NETCORE NW735,NETCORE NW735"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "74BB15DC1693E08296FB5B7E305021D6",
"fingerprint_sha1": "8A984251A9FBAE842D9B3A3E667BEB96D85BFCDA",
"fingerprint_sha256": "D5F2F871222C1EB66E6FEE6D4B2AB89C4288C72B9F23C26792410FF879DF916F",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"JM"
],
"domain_component": [
"XFQRDF",
"local"
],
"organization": [
"CGDSCUHC"
],
"organizational_unit": [
"ZWEGISJ"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "8263504071246047857",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"JM"
],
"domain_component": [
"XFQRDF",
"local"
],
"organization": [
"CGDSCUHC"
],
"organizational_unit": [
"ZWEGISJ"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "35174d4f633c126e378b9f67bfc10a9ebac65cf5d7afd2c4775f1138ebc87bc5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "8eecb6c89b412a63980dfc46325851be7bd091dc9e6a221dab92e857da11e28b",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-12T10:12:49",
"not_before": "2025-08-12T10:12:49"
},
"version": 2
},
"fingerprint_sha256": "D5F2F871222C1EB66E6FEE6D4B2AB89C4288C72B9F23C26792410FF879DF916F",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:9092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T07:50:35.642Z"
},
{
"port": 9093,
"protocol": "tcp",
"name": "http",
"version": "v4.30.1161 (release)",
"product": "Tracer SC",
"extra_info": "Python 2.7.17",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:python:python:2.7.17",
"part": "a",
"vendor": "python",
"product": "python",
"version": "2\\.7\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 1884053225,
"body_sha256": "25fb917ce11f920d3564ee961b535528929589224bc227c1b1c3cca4a5f95559",
"component": [
"MySQL",
"Roadiz CMS:1.2.36",
"Hypercorn",
"Adobe ColdFusion",
"BEM",
"Perl",
"Symfony",
"SPIP:4.1.11",
"Liveinternet",
"WordPress",
"PHP",
"Ruby on Rails",
"Python",
"Django",
"Bugzilla:5.0.1",
"Ruby",
"CFML",
"Microsoft ASP.NET"
],
"content_length": 126486,
"headers": {
"content_length": [
"126486"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 05 Sep 2025 10:46:05 GMT"
],
"server": [
"hypercorn-h11"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ruianzhu-高恪"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2007-4559",
"severity": "medium"
},
{
"id": "CVE-2015-5652",
"severity": "high"
},
{
"id": "CVE-2017-17522",
"severity": "high"
}
],
"url": "https://66.228.62.242:9093/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T10:46:27.107Z"
},
{
"port": 9200,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"elasticsearch": {
"index": [
{
"count": "16051803",
"name": "logs-2024",
"size": "4.9gb"
},
{
"count": "10248228",
"name": "logs-2023",
"size": "3.2gb"
},
{
"count": "4629250332",
"name": "data-2024",
"size": "6.4tb"
}
],
"info": {
"cluster_name": "elasticsearch",
"cluster_uuid": "",
"name": "Blob",
"tagline": "You Know, for Search",
"version": {
"build_hash": "05d4530971ef0ea46d0f4fa6ee64dbc8df659682",
"lucene_version": "4.10.4",
"number": "1.7.3"
}
}
},
"http": {
"body_murmur": 1589257397,
"body_sha256": "3db479be0c09198605e2f8c1cc34676a4954f80aacfd0c0a21aea11ef115e847",
"content_length": 316,
"headers": {
"accept_ranges": [
"bytes"
],
"content_disposition": [
"Content-Disposition"
],
"content_length": [
"316"
],
"content_type": [
"application/json"
],
"date": [
"Fri, 05 Sep 2025 15:09:49 GMT"
],
"pragma": [
"private"
],
"server": [
"Web/0.02.07"
],
"set_cookie": [
"SESSID=da122263a2bd; webvpnLang=webvpnLang"
],
"unknown": [
{
"key": "x_cache",
"value": [
"MISS from Hello"
]
},
{
"key": "x_drupal_cache",
"value": [
"xHIT"
]
},
{
"key": "x_drupal_dynamic_cache",
"value": [
"MISS"
]
},
{
"key": "x_jenkins",
"value": [
"2.121.3"
]
},
{
"key": "x_jenkins_session",
"value": [
"f72d6619"
]
},
{
"key": "x_cache_lookup",
"value": [
"MISS from Hello:8080"
]
},
{
"key": "x_content_powered_by",
"value": [
"K2 v2.8.0 (by JoomlaWor"
]
},
{
"key": "x_generator",
"value": [
"Drupal 8 (https://www.drupal.org)"
]
}
],
"x_powered_by": [
"PHP/4.6.0"
]
},
"protocol": "HTTP/1.1",
"status_code": 200
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:9200/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T00:21:28.369Z"
},
{
"port": 10250,
"protocol": "tcp",
"name": "http-proxy",
"version": "3.5.25",
"product": "Squid http proxy",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:squid-cache:squid:3.5.25",
"part": "a",
"vendor": "squid\\-cache",
"product": "squid",
"version": "3\\.5\\.25",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 1248805424,
"body_sha256": "af0da4b638dbdff1d7f39681f0fb452005c4faba1f518b0760838f8688d4d7c5",
"component": [
"Django",
"MySQL",
"PHP",
"Microsoft ASP.NET",
"Ruby on Rails",
"Liveinternet",
"Roadiz CMS:1.2.36",
"WordPress",
"Python",
"Adobe ColdFusion",
"CFML",
"Symfony",
"SPIP:4.1.11",
"Bugzilla:5.0.1",
"Perl",
"BEM",
"Ruby"
],
"content_length": 126514,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://66.228.62.242:10250/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"126514"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 06 Sep 2025 18:34:57 GMT"
],
"server": [
"Stoneoim"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "KSM-Stoker"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-1000024",
"severity": "high"
},
{
"id": "CVE-2018-1000027",
"severity": "high"
},
{
"id": "CVE-2018-19131",
"severity": "medium"
}
],
"url": "https://66.228.62.242:10250/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-06T18:47:15.334Z"
},
{
"port": 11211,
"protocol": "tcp",
"name": "http",
"version": "19.4.5",
"product": "Gunicorn",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:gunicorn:gunicorn:19.4.5",
"part": "a",
"vendor": "gunicorn",
"product": "gunicorn",
"version": "19\\.4\\.5",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -2030903992,
"body_sha256": "b2ca3985a1a43be7aebed6b7d1d394dd3a9515042e3da5e380012f589ccda5ff",
"component": [
"CFML",
"Bugzilla:5.0.1",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"CherryPy:3.2.2",
"Adobe ColdFusion",
"MySQL",
"Perl",
"Ruby",
"PHP",
"Liveinternet",
"Microsoft ASP.NET",
"Django",
"Python",
"BEM",
"WordPress",
"Symfony",
"SPIP:4.1.11"
],
"content_length": 126387,
"favicon": {
"md5_hash": "b5c66b07a742597376263bb23fc11b15",
"murmur_hash": 444712798,
"path": "http://66.228.62.242:11211/favicon.ico",
"size": 5506
},
"headers": {
"content_length": [
"126387"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 05 Sep 2025 04:54:07 GMT"
],
"server": [
"CherryPy/3.2.2"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ALT-FD504GW-X-Z410"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"memcached": {
"settings": {
"accepting_conns": "1",
"auth_cmds": "0",
"auth_errors": "0",
"bytes": "29828",
"bytes_read": "286857265",
"bytes_written": "129670828957",
"cas_badval": "0",
"cas_hits": "0",
"cas_misses": "0",
"cmd_flush": "3",
"cmd_get": "22076096",
"cmd_set": "21",
"cmd_touch": "0",
"conn_yields": "0",
"connection_structures": "55",
"curr_connections": "8",
"curr_items": "5",
"decr_hits": "0",
"decr_misses": "0",
"delete_hits": "0",
"delete_misses": "0",
"evicted_unfetched": "0",
"evictions": "0",
"expired_unfetched": "0",
"get_hits": "22076066",
"get_misses": "30",
"hash_bytes": "524288",
"hash_power_level": "16",
"incr_hits": "0",
"incr_misses": "0",
"libevent": "2.0.16-stable",
"limit_maxbytes": "67108864",
"listen_disabled_num": "0",
"pid": "2080",
"pointer_size": "64",
"reclaimed": "3",
"reserved_fds": "20",
"rusage_system": "1839.982991",
"rusage_user": "371.247201",
"threads": "4",
"time": "1520550684",
"total_connections": "5547233",
"total_items": "21",
"touch_hits": "0",
"touch_misses": "0",
"uptime": "3151236",
"version": "1.4.13"
},
"stats": {
"accepting_conns": "1",
"auth_cmds": "0",
"auth_errors": "0",
"bytes": "29828",
"bytes_read": "286857265",
"bytes_written": "129670828957",
"cas_badval": "0",
"cas_hits": "0",
"cas_misses": "0",
"cmd_flush": "3",
"cmd_get": "22076096",
"cmd_set": "21",
"cmd_touch": "0",
"conn_yields": "0",
"connection_structures": "55",
"curr_connections": "8",
"curr_items": "5",
"decr_hits": "0",
"decr_misses": "0",
"delete_hits": "0",
"delete_misses": "0",
"evicted_unfetched": "0",
"evictions": "0",
"expired_unfetched": "0",
"get_hits": "22076066",
"get_misses": "30",
"hash_bytes": "524288",
"hash_power_level": "16",
"incr_hits": "0",
"incr_misses": "0",
"libevent": "2.0.16-stable",
"limit_maxbytes": "67108864",
"listen_disabled_num": "0",
"pid": "2080",
"pointer_size": "64",
"reclaimed": "3",
"reserved_fds": "20",
"rusage_system": "1839.982991",
"rusage_user": "371.247201",
"threads": "4",
"time": "1520550684",
"total_connections": "5547233",
"total_items": "21",
"touch_hits": "0",
"touch_misses": "0",
"uptime": "3151236",
"version": "1.4.13"
}
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-1000164",
"severity": "high"
}
],
"url": "https://66.228.62.242:11211/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T04:54:29.429Z"
},
{
"port": 15671,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -616220982,
"body_sha256": "3902e0fb2e351c878d8b210b2931ea28a3cd919f73ce60751ead2def50287af4",
"component": [
"Adobe ColdFusion",
"Bugzilla:5.0.1",
"Django",
"Ruby on Rails",
"Ruby",
"Roadiz CMS:1.2.36",
"Symfony",
"Python",
"PHP",
"Apache Traffic Server:.",
"CFML",
"Perl",
"Microsoft ASP.NET",
"SPIP:4.1.11",
"BEM",
"Liveinternet",
"WordPress",
"MySQL"
],
"content_length": 125325,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://66.228.62.242:15671/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"125325"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 29 Aug 2025 16:07:44 GMT"
],
"server": [
"728/09824HTTPServerversion2.0-TELDATS.A."
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Login - VMware ESXi"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:15671/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T00:17:39.954Z"
},
{
"port": 15672,
"protocol": "tcp",
"name": "http",
"version": "7.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:7.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "7\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 2146290938,
"body_sha256": "6e9d71ac1d1a0d10f00b66acb009c72f9f43110b8af9c5a5d0f64e086e8f83aa",
"component": [
"Python",
"SPIP:4.1.11",
"Ruby",
"Adobe ColdFusion",
"Bugzilla:5.0.1",
"Perl",
"Microsoft ASP.NET",
"Roadiz CMS:1.2.36",
"BEM",
"CFML",
"MySQL",
"PHP",
"Liveinternet",
"Ruby on Rails",
"Symfony",
"Django",
"WordPress"
],
"content_length": 126396,
"headers": {
"content_length": [
"126396"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 05 Sep 2025 03:12:01 GMT"
],
"server": [
"CVM"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "NETCORE NW735,NETCORE NW735"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2008-1446",
"severity": "high"
},
{
"id": "CVE-2009-2521",
"severity": "medium"
}
],
"url": "https://66.228.62.242:15672/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T03:12:23.09Z"
},
{
"port": 20000,
"protocol": "tcp",
"name": "echo",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"dnp3": {
"raw": "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"
},
"http": {
"body_murmur": -1596173942,
"body_sha256": "0bc2456beac3ff56919fc005bf8b8fa6c217211bcb51ffb238ddbe807a8a2aa2",
"component": [
"Ruby",
"SPIP:4.1.11",
"Django",
"Python",
"MySQL",
"BEM",
"CFML",
"Ruby on Rails",
"Adobe ColdFusion",
"Microsoft ASP.NET",
"Perl",
"WordPress",
"Symfony",
"PHP",
"Liveinternet",
"Bugzilla:5.0.1",
"Roadiz CMS:1.2.36"
],
"content_length": 125324,
"favicon": {
"md5_hash": "44071663a97aa46640d124dd31fe7521",
"murmur_hash": 2091717113,
"path": "http://66.228.62.242:20000/favicon.ico",
"size": 7659
},
"headers": {
"content_length": [
"125324"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 01 Sep 2025 13:10:41 GMT"
],
"server": [
"mod_qos"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Vitogate 300"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://66.228.62.242:20000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T21:31:10.477Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -499715535,
"body_sha256": "ef271aa4fba1752533f261478133280fc152ef7c5509566a83fea4597917061a",
"component": [
"Liveinternet",
"MySQL",
"PHP",
"BEM",
"Bugzilla:5.0.1",
"Adobe ColdFusion",
"CFML",
"WordPress",
"Ruby on Rails",
"Ruby",
"Roadiz CMS:1.2.36",
"Python",
"SPIP:4.1.11",
"Perl",
"Microsoft ASP.NET",
"Django",
"Symfony"
],
"content_length": 125334,
"favicon": {
"md5_hash": "49a709193b56e4b0e4e8d0fabfc6311e",
"murmur_hash": -299287097,
"path": "http://66.228.62.242:27017/favicon.ico",
"size": 238
},
"headers": {
"content_length": [
"125334"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 31 Aug 2025 05:08:14 GMT"
],
"server": [
"huohuo"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "DIVA Web Configuration"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"mongodb": {
"allocator": "tcmalloc",
"bits": 64,
"databases": [
{
"empty": false,
"name": "admin",
"size_on_disk": 1201002
},
{
"empty": false,
"name": "local",
"size_on_disk": 2201002
},
{
"empty": false,
"name": "xdatnlab",
"size_on_disk": 22900002
}
],
"dist_arch": "x86_64",
"dist_mod": "",
"git_version": "a2d97db8fe449d15eb8e275bbf318491781472bf",
"is_master": true,
"javascript_engine": "mozjs",
"logical_session_timeout_minutes": 0,
"max_bson_object_size": 16777216,
"max_message_size_bytes": 48000000,
"max_wire_version": 5,
"max_write_batch_size": 1000,
"read_only": false,
"storage_engines": [
"devnull",
"ephemeralForTest",
"mmapv1",
"wiredTiger"
],
"sys_info": "deprecated",
"target_arch": "x86_64",
"target_os": "linux",
"total_size": 26302006,
"version": "2.2.3"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:27017/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-04T18:22:54.104Z"
},
{
"port": 27018,
"protocol": "tcp",
"name": "http",
"version": "6.1.11",
"product": "Jetty",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mortbay:jetty:6.1.11",
"part": "a",
"vendor": "mortbay",
"product": "jetty",
"version": "6\\.1\\.11",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -936907158,
"body_sha256": "786150344407ddb1e2b0def3e405bb8f5ecf05ef1056a3950bebce51ef7f2562",
"component": [
"Roadiz CMS:1.2.36",
"Symfony",
"thttpd:2.25",
"Perl",
"Adobe ColdFusion",
"CFML",
"BEM",
"Ruby on Rails",
"WordPress",
"PHP",
"Python",
"MySQL",
"Bugzilla:5.0.1",
"Ruby",
"SPIP:4.1.11",
"Django",
"Liveinternet",
"Microsoft ASP.NET"
],
"content_length": 126534,
"favicon": {
"md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
"murmur_hash": 899457975,
"path": "http://66.228.62.242:27018/favicon.ico",
"size": 1406
},
"headers": {
"content_length": [
"126534"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 07 Sep 2025 09:35:40 GMT"
],
"server": [
"thttpd/2.25b 29dec2003"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "GR3200系统管理"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2009-1523",
"severity": "medium"
},
{
"id": "CVE-2009-1524",
"severity": "medium"
},
{
"id": "CVE-2009-4609",
"severity": "medium"
}
],
"url": "https://66.228.62.242:27018/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T09:36:02.345Z"
},
{
"port": 27019,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -1877508642,
"body_sha256": "7e18c9d05d2e0a80abbddefc6aab1e822ac1dad7fb955890fef953b1884664b7",
"component": [
"MySQL",
"Perl",
"Symfony",
"SPIP:4.1.11",
"Django",
"Adobe ColdFusion",
"Ruby",
"Microsoft ASP.NET",
"CFML",
"Ruby on Rails",
"Roadiz CMS:1.2.36",
"WordPress",
"PHP",
"Bugzilla:5.0.1",
"Python",
"BEM",
"Liveinternet"
],
"content_length": 125362,
"favicon": {
"md5_hash": "83ad768167a370db201db71c482fc9e8",
"murmur_hash": 2089307605,
"path": "http://66.228.62.242:27019/favicon.ico",
"size": 6114
},
"headers": {
"content_length": [
"125362"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 29 Aug 2025 19:01:09 GMT"
],
"server": [
"WebServer/1.0.0"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "VMI-DVR-3108-SL 192.168.1.5,Digital Video Recorder"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "EDC84F17B0BD18ADFA5B27432567B3B9",
"fingerprint_sha1": "B7E0CCBE69D33F5918A831715B0301195F657F6F",
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2579590540612619320",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"AF"
],
"domain_component": [
"YBSP",
"local"
],
"organization": [
"LGAVATFP"
],
"organizational_unit": [
"SNOIQRU"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "c5c0be6660993fcdb0f56974b34f3ece130b672b7c7718bd11cd129deb4d6088",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "4bee6486bf681ec4976fe1f8ef6e4d1d8e9beed80c5b2cf000e1fac5c5204c30",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-08-20T06:10:02",
"not_before": "2025-08-20T06:10:02"
},
"version": 2
},
"fingerprint_sha256": "B751B09CA605BD9F8561E4C1708081F28D11986E3BABD06570BB382550B22DD0",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:27019/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-07T04:37:41.057Z"
},
{
"port": 29092,
"protocol": "tcp",
"name": "sip-proxy",
"version": "14.0.17",
"product": "FreePBX",
"extra_info": "Asterisk 15.7.4",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:sangoma:freepbx:14.0.17",
"part": "a",
"vendor": "sangoma",
"product": "freepbx",
"version": "14\\.0\\.17",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 1229923229,
"body_sha256": "959d1ac7a494b4927c7e107e7e8f6b596302828a3a447882aaa8e068a9130054",
"component": [
"PHP",
"Adobe ColdFusion",
"CFML",
"Symfony",
"SPIP:4.1.11",
"TwistedWeb:16.2.0",
"WordPress",
"Microsoft ASP.NET",
"Ruby on Rails",
"Django",
"Python",
"Bugzilla:5.0.1",
"Perl",
"BEM",
"MySQL",
"Liveinternet",
"Ruby",
"Roadiz CMS:1.2.36"
],
"content_length": 126244,
"favicon": {
"md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
"murmur_hash": -1033644073,
"path": "http://66.228.62.242:29092/favicon.ico",
"size": 3774
},
"headers": {
"content_length": [
"126244"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 03 Sep 2025 10:12:34 GMT"
],
"server": [
"TwistedWeb/16.2.0"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "ipTIME N604 Black"
},
"influxdb": {
"bind_address": "0.0.0.0:8088",
"build_commit": "489de31b961831defa9f4173173337d4a6293909",
"config": {
"access_log_path": "/var/log/influxdb.access.log",
"data_dir": "/usr/local/var/influxdb/data",
"meta_dir": "/usr/local/var/influxdb/meta",
"wal_dir": "/usr/local/var/influxdb/wal"
},
"databases": [
"_internal",
"web_database"
],
"go": {
"arch": "amd64",
"max_process": 8,
"os": "darwin",
"version": "1.8.3"
},
"https_enabled": false,
"network": {
"host": "influxdb-2.local"
},
"version": "v2.1.1"
},
"qnap": {
"config": {
"firmware_build": "20190531",
"firmware_version": "4.3.6",
"force_ssl": "0",
"msv2_supported": "0",
"msv2web_enabled": "1",
"nvr_enabled": "0",
"qdownload_enabled": "2",
"qmultimedia_enabled": "2",
"qmusic_enabled": "0",
"qphotos_enabled": "0",
"qvideos_enabled": "0",
"qweb_enabled": "1",
"qweb_ssl_enabled": "1",
"webfs_enabled": "1",
"wfm2": "1"
},
"internal_model_name": "TS-X41",
"qweb_port": 80,
"qweb_ssl_port": 8081,
"ssl_port": 443
},
"solrdb": {
"directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
"index": [
"Products"
],
"jvm": {
"stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
"version": "1.8.0_361 25.361-b09"
},
"lucene": {
"impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
"spec_version": "7.6.0"
},
"system": {
"arch": "amd64",
"name": "Windows Server 2022",
"uname": "admin",
"version": "8.12"
},
"version": "7.6.0",
"vm": {
"name": "Java HotSpot(TM) 64-Bit Server VM",
"vendor": "Oracle Corporation",
"version": "25.361-b09"
}
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": true,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
}
},
"fingerprint_md5": "9A18CBA9B181DC3AB0278F19F548222A",
"fingerprint_sha1": "5BB284B52F4BCBACDFBB61FC04D50D9AC0B008A9",
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"issuer": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "4922396977209660492",
"signature": {
"algorithm": {
"name": "SHA512-RSA",
"oid": "1.2.840.113549.1.1.13"
},
"self_signed": true
},
"subject": {
"common_name": [
"localhost"
],
"country": [
"EC"
],
"domain_component": [
"EU",
"local"
],
"organization": [
"NKCUXKJJ"
],
"organizational_unit": [
"JMATEKG"
]
},
"subject_alt_name": {
"dns_names": [
"localhost"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e3b10d54342c91893589d74bab66b6efb295a30b646ea619255e48cf572943cb",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096
}
},
"tbs_fingerprint": "0f67ef08b1a355e83f25d452fe8132d2a6d72890a2d41d11fcc07988615a2974",
"validation_level": "OV",
"validity": {
"length_seconds": 315532800,
"not_after": "2035-09-02T09:44:07",
"not_before": "2025-09-02T09:44:07"
},
"version": 2
},
"fingerprint_sha256": "04D990062F85B3C49BEBDC836FC9A1294FA05D49CCB9BF1A488199C23F7C1D9A",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2018-15891",
"severity": "medium"
},
{
"id": "CVE-2019-19538",
"severity": "high"
},
{
"id": "CVE-2019-19851",
"severity": "medium"
}
],
"url": "https://66.228.62.242:29092/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-05T17:13:51.945Z"
}
],
"services_hash": "2e6979ae2dcfcbf9f6b033920cc6b85d00ad8eed7f10b6a93b77ffae44f361f6",
"last_updated_at": "2025-09-08T12:44:47.713Z",
"banner": [
"http",
"influxdb",
"qnap",
"solrdb",
"tls",
"couchdb",
"redis",
"elasticsearch",
"ftp",
"ssh",
"smtp",
"consul",
"dnp3",
"mysql",
"memcached",
"mongodb",
"telnet",
"pop3",
"ipp",
"mssql"
],
"is_vuln": true,
"cveDetails": {
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2007-4559": {
"id": "CVE-2007-4559",
"references": [
"http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
"http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
"http://secunia.com/advisories/26623",
"http://www.vupen.com/english/advisories/2007/3022",
"https://bugzilla.redhat.com/show_bug.cgi?id=263261",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
"https://security.gentoo.org/glsa/202309-06",
"http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
"http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
"http://secunia.com/advisories/26623",
"http://www.vupen.com/english/advisories/2007/3022",
"https://bugzilla.redhat.com/show_bug.cgi?id=263261",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
"https://security.gentoo.org/glsa/202309-06"
],
"score": 9.8,
"services": [
"9093/http"
],
"severity": "critical",
"summary": "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-22"
},
"CVE-2008-1446": {
"id": "CVE-2008-1446",
"references": [
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://secunia.com/advisories/32248",
"http://www.kb.cert.org/vuls/id/793233",
"http://www.securityfocus.com/bid/31682",
"http://www.securitytracker.com/id?1021048",
"http://www.us-cert.gov/cas/techalerts/TA08-288A.html",
"http://www.vupen.com/english/advisories/2008/2813",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45545",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45548",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"http://secunia.com/advisories/32248",
"http://www.kb.cert.org/vuls/id/793233",
"http://www.securityfocus.com/bid/31682",
"http://www.securitytracker.com/id?1021048",
"http://www.us-cert.gov/cas/techalerts/TA08-288A.html",
"http://www.vupen.com/english/advisories/2008/2813",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45545",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/45548",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764"
],
"score": 9,
"services": [
"15672/http"
],
"severity": "high",
"summary": "Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka \"Integer Overflow in IPP Service Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"weakness": "CWE-190"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2009-1523": {
"id": "CVE-2009-1523",
"references": [
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388",
"http://jira.codehaus.org/browse/JETTY-1004",
"http://secunia.com/advisories/34975",
"http://secunia.com/advisories/35143",
"http://secunia.com/advisories/35225",
"http://secunia.com/advisories/35776",
"http://secunia.com/advisories/40553",
"http://www.kb.cert.org/vuls/id/402580",
"http://www.kb.cert.org/vuls/id/CRDY-7RKQCY",
"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"http://www.securityfocus.com/bid/34800",
"http://www.securityfocus.com/bid/35675",
"http://www.securitytracker.com/id?1022563",
"http://www.vupen.com/english/advisories/2009/1900",
"http://www.vupen.com/english/advisories/2010/1792",
"https://bugzilla.redhat.com/show_bug.cgi?id=499867",
"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01257.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01259.html",
"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01262.html"
],
"score": 5,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-22"
},
"CVE-2009-1524": {
"id": "CVE-2009-1524",
"references": [
"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388",
"http://jira.codehaus.org/browse/JETTY-980",
"http://secunia.com/advisories/34975",
"http://secunia.com/advisories/40553",
"http://www.securityfocus.com/bid/34800",
"http://www.vupen.com/english/advisories/2010/1792",
"https://bugzilla.redhat.com/show_bug.cgi?id=499867"
],
"score": 4.3,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2009-2521": {
"id": "CVE-2009-2521",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0040.html",
"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ975191",
"http://www.us-cert.gov/cas/techalerts/TA09-286A.html",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-053",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6508",
"http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0040.html",
"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ975191",
"http://www.us-cert.gov/cas/techalerts/TA09-286A.html",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-053",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6508"
],
"score": 5,
"services": [
"15672/http"
],
"severity": "medium",
"summary": "Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka \"IIS FTP Service DoS Vulnerability.\"",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-400"
},
"CVE-2009-4609": {
"id": "CVE-2009-4609",
"references": [
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
],
"score": 5,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2009-4610": {
"id": "CVE-2009-4610",
"references": [
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
],
"score": 4.3,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2009-4611": {
"id": "CVE-2009-4611",
"references": [
"http://www.securityfocus.com/archive/1/508830/100/0/threaded",
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
"http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
],
"score": 7.5,
"services": [
"27018/http"
],
"severity": "high",
"summary": "Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-20"
},
"CVE-2009-4612": {
"id": "CVE-2009-4612",
"references": [
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
],
"score": 4.3,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.x through 6.1.21 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "CWE-79"
},
"CVE-2009-5048": {
"id": "CVE-2009-5048",
"references": [
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
"https://security-tracker.debian.org/tracker/CVE-2009-5048",
"https://www.openwall.com/lists/oss-security/2011/01/14/2"
],
"score": 6.1,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Cookie Dump Servlet stored XSS vulnerability in jetty though 6.1.20.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2009-5049": {
"id": "CVE-2009-5049",
"references": [
"http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
"https://security-tracker.debian.org/tracker/CVE-2009-5049",
"https://www.openwall.com/lists/oss-security/2011/01/14/2"
],
"score": 6.1,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "WebApp JSP Snoop page XSS in jetty though 6.1.21.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2011-4461": {
"id": "CVE-2011-4461",
"references": [
"http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html",
"http://marc.info/?l=bugtraq&m=143387688830075&w=2",
"http://secunia.com/advisories/47408",
"http://secunia.com/advisories/48981",
"http://www.kb.cert.org/vuls/id/903934",
"http://www.nruns.com/_downloads/advisory28122011.pdf",
"http://www.ocert.org/advisories/ocert-2011-003.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securitytracker.com/id?1026475",
"http://www.ubuntu.com/usn/USN-1429-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/72017",
"https://security.netapp.com/advisory/ntap-20190307-0004/"
],
"score": 5.3,
"services": [
"27018/http"
],
"severity": "medium",
"summary": "Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"weakness": "CWE-310"
},
"CVE-2015-5652": {
"id": "CVE-2015-5652",
"references": [
"http://jvn.jp/en/jp/JVN49503705/995204/index.html",
"http://jvn.jp/en/jp/JVN49503705/index.html",
"http://jvndb.jvn.jp/jvndb/JVNDB-2015-000141",
"http://www.securityfocus.com/bid/76929",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"http://jvn.jp/en/jp/JVN49503705/995204/index.html",
"http://jvn.jp/en/jp/JVN49503705/index.html",
"http://jvndb.jvn.jp/jvndb/JVNDB-2015-000141",
"http://www.securityfocus.com/bid/76929",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
],
"score": 7.2,
"services": [
"9093/http"
],
"severity": "high",
"summary": "Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says \"It was determined that this is a longtime behavior of Python that cannot really be altered at this point.\"",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2016-9589": {
"id": "CVE-2016-9589",
"references": [
"http://rhn.redhat.com/errata/RHSA-2017-0830.html",
"http://rhn.redhat.com/errata/RHSA-2017-0831.html",
"http://rhn.redhat.com/errata/RHSA-2017-0832.html",
"http://rhn.redhat.com/errata/RHSA-2017-0834.html",
"http://rhn.redhat.com/errata/RHSA-2017-0876.html",
"http://www.securityfocus.com/bid/97060",
"https://access.redhat.com/errata/RHSA-2017:0872",
"https://access.redhat.com/errata/RHSA-2017:0873",
"https://access.redhat.com/errata/RHSA-2017:3454",
"https://access.redhat.com/errata/RHSA-2017:3455",
"https://access.redhat.com/errata/RHSA-2017:3456",
"https://access.redhat.com/errata/RHSA-2017:3458",
"https://bugzilla.redhat.com/show_bug.cgi?id=1404782"
],
"score": 7.5,
"services": [
"5984/http"
],
"severity": "high",
"summary": "Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to \"max-headers\" (default 200) * \"max-header-size\" (default 1MB) per active TCP connection.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2017-17522": {
"id": "CVE-2017-17522",
"references": [
"http://www.securityfocus.com/bid/102207",
"https://bugs.python.org/issue32367",
"https://security-tracker.debian.org/tracker/CVE-2017-17522",
"http://www.securityfocus.com/bid/102207",
"https://bugs.python.org/issue32367",
"https://security-tracker.debian.org/tracker/CVE-2017-17522"
],
"score": 8.8,
"services": [
"9093/http"
],
"severity": "high",
"summary": "Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-74"
},
"CVE-2017-18207": {
"id": "CVE-2017-18207",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
"https://bugs.python.org/issue32056",
"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
"https://bugs.python.org/issue32056"
],
"score": 6.5,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"weakness": "CWE-369"
},
"CVE-2018-1000024": {
"id": "CVE-2018-1000024",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_1.txt",
"http://www.squid-cache.org/Versions/",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122",
"http://www.squid-cache.org/Advisories/SQUID-2018_1.txt",
"http://www.squid-cache.org/Versions/",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-1000027": {
"id": "CVE-2018-1000027",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_2.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch",
"https://github.com/squid-cache/squid/pull/129/files",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122",
"http://www.squid-cache.org/Advisories/SQUID-2018_2.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch",
"https://github.com/squid-cache/squid/pull/129/files",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html",
"https://usn.ubuntu.com/3557-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2018/dsa-4122"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2018-1000164": {
"id": "CVE-2018-1000164",
"references": [
"https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5",
"https://github.com/benoitc/gunicorn/issues/1227",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html",
"https://usn.ubuntu.com/4022-1/",
"https://www.debian.org/security/2018/dsa-4186"
],
"score": 7.5,
"services": [
"11211/http"
],
"severity": "high",
"summary": "gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in \"process_headers\" function in \"gunicorn/http/wsgi.py\" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-93"
},
"CVE-2018-15891": {
"id": "CVE-2018-15891",
"references": [
"https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
"https://www.freepbx.org/",
"https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
"https://www.freepbx.org/"
],
"score": 4.8,
"services": [
"1434/sip-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2018-19131": {
"id": "CVE-2018-19131",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_4.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch",
"https://github.com/squid-cache/squid/pull/306",
"http://www.squid-cache.org/Advisories/SQUID-2018_4.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch",
"https://github.com/squid-cache/squid/pull/306"
],
"score": 6.1,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2018-19132": {
"id": "CVE-2018-19132",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2018_5.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-644131ff1e00c1895d77561f561d29c104ba6b11.patch",
"https://github.com/squid-cache/squid/pull/313",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4059-1/",
"http://www.squid-cache.org/Advisories/SQUID-2018_5.txt",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-644131ff1e00c1895d77561f561d29c104ba6b11.patch",
"https://github.com/squid-cache/squid/pull/313",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4059-1/"
],
"score": 5.9,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.",
"vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-772"
},
"CVE-2019-12519": {
"id": "CVE-2019-12519",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12519.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2019-12520": {
"id": "CVE-2019-12520",
"references": [
"http://www.squid-cache.org/Versions/v4/",
"http://www.squid-cache.org/Versions/v4/changesets/",
"https://github.com/squid-cache/squid/commits/v4",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12520.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Versions/v4/",
"http://www.squid-cache.org/Versions/v4/changesets/",
"https://github.com/squid-cache/squid/commits/v4",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12520.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-20"
},
"CVE-2019-12521": {
"id": "CVE-2019-12521",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.openwall.com/lists/oss-security/2020/04/23/1",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12521.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 5.9,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-193"
},
"CVE-2019-12522": {
"id": "CVE-2019-12522",
"references": [
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12522.txt",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12522.txt",
"https://security.netapp.com/advisory/ntap-20210205-0006/"
],
"score": 4.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"weakness": "CWE-269"
},
"CVE-2019-12523": {
"id": "CVE-2019-12523",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.1,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-12524": {
"id": "CVE-2019-12524",
"references": [
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12524.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682",
"https://gitlab.com/jeriko.one/security/-/blob/master/squid/CVEs/CVE-2019-12524.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://security.netapp.com/advisory/ntap-20210205-0006/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-306"
},
"CVE-2019-12525": {
"id": "CVE-2019-12525",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Versions/v4/changesets/",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch",
"https://github.com/squid-cache/squid/commits/v4",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4065-1/",
"https://usn.ubuntu.com/4065-2/",
"https://www.debian.org/security/2019/dsa-4507"
],
"score": 9.8,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2019-12526": {
"id": "CVE-2019-12526",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_7.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156326",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Advisories/SQUID-2019_7.txt",
"https://bugzilla.suse.com/show_bug.cgi?id=1156326",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2019-12528": {
"id": "CVE-2019-12528",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_2.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_2.txt",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-12529": {
"id": "CVE-2019-12529",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Versions/v4/changesets/",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch",
"https://github.com/squid-cache/squid/commits/v4",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4065-1/",
"https://usn.ubuntu.com/4065-2/",
"https://www.debian.org/security/2019/dsa-4507",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.squid-cache.org/Versions/v4/changesets/",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch",
"https://github.com/squid-cache/squid/commits/v4",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00018.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4065-1/",
"https://usn.ubuntu.com/4065-2/",
"https://www.debian.org/security/2019/dsa-4507"
],
"score": 5.9,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2019-13345": {
"id": "CVE-2019-13345",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.securityfocus.com/bid/109095",
"https://access.redhat.com/errata/RHSA-2019:3476",
"https://bugs.squid-cache.org/show_bug.cgi?id=4957",
"https://github.com/squid-cache/squid/pull/429",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00006.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2ERPHSPUGOYVVRPQRASQBFGS2EJISFC/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4059-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2019/dsa-4507",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html",
"http://www.securityfocus.com/bid/109095",
"https://access.redhat.com/errata/RHSA-2019:3476",
"https://bugs.squid-cache.org/show_bug.cgi?id=4957",
"https://github.com/squid-cache/squid/pull/429",
"https://lists.debian.org/debian-lts-announce/2019/07/msg00006.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2ERPHSPUGOYVVRPQRASQBFGS2EJISFC/",
"https://seclists.org/bugtraq/2019/Aug/42",
"https://usn.ubuntu.com/4059-1/",
"https://usn.ubuntu.com/4059-2/",
"https://www.debian.org/security/2019/dsa-4507"
],
"score": 6.1,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2019-18348": {
"id": "CVE-2019-18348",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
"https://bugs.python.org/issue30458#msg347282",
"https://bugzilla.redhat.com/show_bug.cgi?id=1727276",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
"https://security.netapp.com/advisory/ntap-20191107-0004/",
"https://usn.ubuntu.com/4333-1/",
"https://usn.ubuntu.com/4333-2/",
"https://www.oracle.com/security-alerts/cpuoct2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
"https://bugs.python.org/issue30458#msg347282",
"https://bugzilla.redhat.com/show_bug.cgi?id=1727276",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
"https://security.netapp.com/advisory/ntap-20191107-0004/",
"https://usn.ubuntu.com/4333-1/",
"https://usn.ubuntu.com/4333-2/",
"https://www.oracle.com/security-alerts/cpuoct2020.html"
],
"score": 6.1,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-74"
},
"CVE-2019-18676": {
"id": "CVE-2019-18676",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://github.com/squid-cache/squid/pull/275",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Advisories/SQUID-2019_8.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156329",
"https://github.com/squid-cache/squid/pull/275",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://usn.ubuntu.com/4446-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2019-18677": {
"id": "CVE-2019-18677",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_9.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156328",
"https://github.com/squid-cache/squid/pull/427",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Advisories/SQUID-2019_9.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156328",
"https://github.com/squid-cache/squid/pull/427",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 6.1,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-352"
},
"CVE-2019-18678": {
"id": "CVE-2019-18678",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_10.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156323",
"https://github.com/squid-cache/squid/pull/445",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Advisories/SQUID-2019_10.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156323",
"https://github.com/squid-cache/squid/pull/445",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 5.3,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-444"
},
"CVE-2019-18679": {
"id": "CVE-2019-18679",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2019_11.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156324",
"https://github.com/squid-cache/squid/pull/491",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://www.squid-cache.org/Advisories/SQUID-2019_11.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1156324",
"https://github.com/squid-cache/squid/pull/491",
"https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/",
"https://security.gentoo.org/glsa/202003-34",
"https://usn.ubuntu.com/4213-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2019-18860": {
"id": "CVE-2019-18860",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"https://github.com/squid-cache/squid/pull/504",
"https://github.com/squid-cache/squid/pull/505",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4732",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"https://github.com/squid-cache/squid/pull/504",
"https://github.com/squid-cache/squid/pull/505",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4732"
],
"score": 6.1,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-74"
},
"CVE-2019-19538": {
"id": "CVE-2019-19538",
"references": [
"https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
"https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution",
"https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
"https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution"
],
"score": 7.2,
"services": [
"1434/sip-proxy"
],
"severity": "high",
"summary": "In Sangoma FreePBX 13 through 15 and sysadmin (aka System Admin) 13.0.92 through 15.0.13.6 modules have a Remote Command Execution vulnerability that results in Privilege Escalation.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-19851": {
"id": "CVE-2019-19851",
"references": [
"https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
"https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities",
"https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
"https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities"
],
"score": 4.8,
"services": [
"1434/sip-proxy"
],
"severity": "medium",
"summary": "An XSS Injection vulnerability exists in Sangoma FreePBX and PBXact 13, 14, and 15 within the Debug/Test page of the Superfecta module at the admin/config.php?display=superfecta URI. This affects Superfecta through 13.0.4.7, 14.x through 14.0.24, and 15.x through 15.0.2.20.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2019-9674": {
"id": "CVE-2019-9674",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
"https://bugs.python.org/issue36260",
"https://bugs.python.org/issue36462",
"https://github.com/python/cpython/blob/master/Lib/zipfile.py",
"https://python-security.readthedocs.io/security.html#archives-and-zip-bomb",
"https://security.netapp.com/advisory/ntap-20200221-0003/",
"https://usn.ubuntu.com/4428-1/",
"https://www.python.org/news/security/",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
"https://bugs.python.org/issue36260",
"https://bugs.python.org/issue36462",
"https://github.com/python/cpython/blob/master/Lib/zipfile.py",
"https://python-security.readthedocs.io/security.html#archives-and-zip-bomb",
"https://security.netapp.com/advisory/ntap-20200221-0003/",
"https://usn.ubuntu.com/4428-1/",
"https://www.python.org/news/security/"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2020-11945": {
"id": "CVE-2020-11945",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"http://www.openwall.com/lists/oss-security/2020/04/23/2",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1170313",
"https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811",
"https://github.com/squid-cache/squid/pull/585",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FWQRYZJPHAZBLXJ56FPCHJN5X2FP3VA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4MWXEZAJSOGRJSS2JCJK4WBSND4IV46/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RV2VZWFJNO3B56IVN56HHKJASG5DYUIX/",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210304-0004/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://master.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"http://www.openwall.com/lists/oss-security/2020/04/23/2",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-eeebf0f37a72a2de08348e85ae34b02c34e9a811.patch",
"https://bugzilla.suse.com/show_bug.cgi?id=1170313",
"https://github.com/squid-cache/squid/commit/eeebf0f37a72a2de08348e85ae34b02c34e9a811",
"https://github.com/squid-cache/squid/pull/585",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FWQRYZJPHAZBLXJ56FPCHJN5X2FP3VA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4MWXEZAJSOGRJSS2JCJK4WBSND4IV46/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RV2VZWFJNO3B56IVN56HHKJASG5DYUIX/",
"https://security.gentoo.org/glsa/202005-05",
"https://security.netapp.com/advisory/ntap-20210304-0004/",
"https://usn.ubuntu.com/4356-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 9.8,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-14058": {
"id": "CVE-2020-14058",
"references": [
"http://www.squid-cache.org/Advisories/SQUID-2020_6.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-93f5fda134a2a010b84ffedbe833d670e63ba4be.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-c6d1a4f6a2cbebceebc8a3fcd8f539ceb7b7f723.patch",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/",
"http://www.squid-cache.org/Advisories/SQUID-2020_6.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-93f5fda134a2a010b84ffedbe833d670e63ba4be.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-c6d1a4f6a2cbebceebc8a3fcd8f539ceb7b7f723.patch",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-15049": {
"id": "CVE-2020-15049",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4732",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/",
"https://security.netapp.com/advisory/ntap-20210312-0001/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4732"
],
"score": 9.9,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing \"+\\ \"-\" or an uncommon shell whitespace character prefix to the length field-value.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2020-15810": {
"id": "CVE-2020-15810",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2020-15811": {
"id": "CVE-2020-15811",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-697"
},
"CVE-2020-24606": {
"id": "CVE-2020-24606",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg",
"https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"https://security.netapp.com/advisory/ntap-20210219-0007/",
"https://security.netapp.com/advisory/ntap-20210226-0006/",
"https://security.netapp.com/advisory/ntap-20210226-0007/",
"https://usn.ubuntu.com/4477-1/",
"https://usn.ubuntu.com/4551-1/",
"https://www.debian.org/security/2020/dsa-4751"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2020-25097": {
"id": "CVE-2020-25097",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJMDRVV677AJL4BZAOLCT5LMFCGBZTC2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBXFWKIGXPERDVQXG556LLPUOCMQGERC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RYBDMJCPYGOSURWDR3WJTE474UFT77/",
"https://security.gentoo.org/glsa/202105-14",
"https://security.netapp.com/advisory/ntap-20210727-0010/",
"https://www.debian.org/security/2021/dsa-4873",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_11.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2020_11.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-jvf6-h9gj-pmj6",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJMDRVV677AJL4BZAOLCT5LMFCGBZTC2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBXFWKIGXPERDVQXG556LLPUOCMQGERC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RYBDMJCPYGOSURWDR3WJTE474UFT77/",
"https://security.gentoo.org/glsa/202105-14",
"https://security.netapp.com/advisory/ntap-20210727-0010/",
"https://www.debian.org/security/2021/dsa-4873"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"weakness": "CWE-20"
},
"CVE-2020-8449": {
"id": "CVE-2020-8449",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-668"
},
"CVE-2020-8450": {
"id": "CVE-2020-8450",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_1.txt",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6W2IQ7QV2OGREFFUBNVZIDD3RJBDE4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSU6SPANL27AGK5PCGBJOKG4LUWA555J/",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"https://www.debian.org/security/2020/dsa-4682"
],
"score": 7.3,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"weakness": "CWE-131"
},
"CVE-2020-8492": {
"id": "CVE-2020-8492",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
"https://bugs.python.org/issue39503",
"https://github.com/python/cpython/pull/18284",
"https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E",
"https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
"https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html",
"https://security.gentoo.org/glsa/202005-09",
"https://security.netapp.com/advisory/ntap-20200221-0001/",
"https://usn.ubuntu.com/4333-1/",
"https://usn.ubuntu.com/4333-2/",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
"https://bugs.python.org/issue39503",
"https://github.com/python/cpython/pull/18284",
"https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E",
"https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
"https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html",
"https://security.gentoo.org/glsa/202005-09",
"https://security.netapp.com/advisory/ntap-20200221-0001/",
"https://usn.ubuntu.com/4333-1/",
"https://usn.ubuntu.com/4333-2/"
],
"score": 6.5,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2020-8517": {
"id": "CVE-2020-8517",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_3.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html",
"http://www.squid-cache.org/Advisories/SQUID-2020_3.txt",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch",
"https://security.gentoo.org/glsa/202003-34",
"https://security.netapp.com/advisory/ntap-20210304-0002/",
"https://usn.ubuntu.com/4289-1/"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2021-23336": {
"id": "CVE-2021-23336",
"references": [
"http://www.openwall.com/lists/oss-security/2021/02/19/4",
"http://www.openwall.com/lists/oss-security/2021/05/01/2",
"https://github.com/python/cpython/pull/24297",
"https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
"https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210326-0004/",
"https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
"https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"http://www.openwall.com/lists/oss-security/2021/02/19/4",
"http://www.openwall.com/lists/oss-security/2021/05/01/2",
"https://github.com/python/cpython/pull/24297",
"https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
"https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210326-0004/",
"https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
"https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
"https://www.oracle.com//security-alerts/cpujul2021.html",
"https://www.oracle.com/security-alerts/cpuApr2021.html",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 5.9,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"weakness": "CWE-444"
},
"CVE-2021-28116": {
"id": "CVE-2021-28116",
"references": [
"http://www.openwall.com/lists/oss-security/2021/10/04/1",
"http://www.squid-cache.org/Versions/",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.gentoo.org/glsa/202105-14",
"https://www.debian.org/security/2022/dsa-5171",
"https://www.zerodayinitiative.com/advisories/ZDI-21-157/",
"http://www.openwall.com/lists/oss-security/2021/10/04/1",
"http://www.squid-cache.org/Versions/",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rgf3-9v3p-qp82",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.gentoo.org/glsa/202105-14",
"https://www.debian.org/security/2022/dsa-5171",
"https://www.zerodayinitiative.com/advisories/ZDI-21-157/"
],
"score": 3.7,
"services": [
"10250/http-proxy"
],
"severity": "low",
"summary": "Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2021-28651": {
"id": "CVE-2021-28651",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5104",
"https://github.com/squid-cache/squid/security/advisories/GHSA-ch36-9jhx-phm4",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5104",
"https://github.com/squid-cache/squid/security/advisories/GHSA-ch36-9jhx-phm4",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-401"
},
"CVE-2021-28652": {
"id": "CVE-2021-28652",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5106",
"https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://www.debian.org/security/2021/dsa-4924",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"https://bugs.squid-cache.org/show_bug.cgi?id=5106",
"https://github.com/squid-cache/squid/security/advisories/GHSA-m47m-9hvw-7447",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 4.9,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-401"
},
"CVE-2021-28662": {
"id": "CVE-2021-28662",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v6/changesets/squid-6-051824924c709bd6162a378f746fb859454c674e.patch",
"https://github.com/squid-cache/squid/commit/051824924c709bd6162a378f746fb859454c674e",
"https://github.com/squid-cache/squid/security/advisories/GHSA-jjq6-mh2h-g39h",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"445/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"weakness": "CWE-116"
},
"CVE-2021-31806": {
"id": "CVE-2021-31806",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-116"
},
"CVE-2021-31807": {
"id": "CVE-2021-31807",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-31808": {
"id": "CVE-2021-31808",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-pxwq-f3qr-w2xf",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"https://security.netapp.com/advisory/ntap-20210716-0007/",
"https://www.debian.org/security/2021/dsa-4924"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-33620": {
"id": "CVE-2021-33620",
"references": [
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/",
"http://seclists.org/fulldisclosure/2023/Oct/14",
"http://www.openwall.com/lists/oss-security/2023/10/11/3",
"http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch",
"http://www.squid-cache.org/Versions/v5/changesets/squid-5-8af775ed98bfd610f9ce762fe177e01b2675588c.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-572g-rvwr-6c7f",
"https://lists.debian.org/debian-lts-announce/2021/06/msg00014.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSQ3U54ZCNXR44QRPW3AV2VCS6K3TKCF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4EPIWUZDJAXADDHVOPKRBTQHPBR6H66/"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2021-3426": {
"id": "CVE-2021-3426",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
"https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
"https://security.gentoo.org/glsa/202104-04",
"https://security.netapp.com/advisory/ntap-20210629-0003/",
"https://www.oracle.com/security-alerts/cpujan2022.html",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"score": 5.7,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2021-3733": {
"id": "CVE-2021-3733",
"references": [
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/pull/24391",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733",
"https://bugs.python.org/issue43075",
"https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
"https://github.com/python/cpython/pull/24391",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://security.netapp.com/advisory/ntap-20220407-0001/",
"https://ubuntu.com/security/CVE-2021-3733"
],
"score": 6.5,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2021-46784": {
"id": "CVE-2021-46784",
"references": [
"http://www.openwall.com/lists/oss-security/2023/10/13/1",
"http://www.openwall.com/lists/oss-security/2023/10/13/10",
"http://www.openwall.com/lists/oss-security/2023/10/21/1",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2021_7.patch",
"https://github.com/squid-cache/squid/commit/5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9",
"https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w",
"https://security-tracker.debian.org/tracker/CVE-2021-46784",
"https://security.netapp.com/advisory/ntap-20221223-0007/",
"http://www.openwall.com/lists/oss-security/2023/10/13/1",
"http://www.openwall.com/lists/oss-security/2023/10/13/10",
"http://www.openwall.com/lists/oss-security/2023/10/21/1",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2021_7.patch",
"https://github.com/squid-cache/squid/commit/5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9",
"https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w",
"https://security-tracker.debian.org/tracker/CVE-2021-46784",
"https://security.netapp.com/advisory/ntap-20221223-0007/"
],
"score": 6.5,
"services": [
"10250/http-proxy"
],
"severity": "medium",
"summary": "In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-617"
},
"CVE-2022-0391": {
"id": "CVE-2022-0391",
"references": [
"https://bugs.python.org/issue43882",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://security.gentoo.org/glsa/202305-02",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://bugs.python.org/issue43882",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
"https://security.gentoo.org/glsa/202305-02",
"https://security.netapp.com/advisory/ntap-20220225-0009/",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-74"
},
"CVE-2022-26488": {
"id": "CVE-2022-26488",
"references": [
"https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/",
"https://security.netapp.com/advisory/ntap-20220419-0005/",
"https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/",
"https://security.netapp.com/advisory/ntap-20220419-0005/"
],
"score": 7,
"services": [
"9093/http"
],
"severity": "high",
"summary": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-426"
},
"CVE-2022-31681": {
"id": "CVE-2022-31681",
"references": [
"https://www.vmware.com/security/advisories/VMSA-2022-0025.html"
],
"score": 6.5,
"services": [
"5984/http"
],
"severity": "medium",
"summary": "VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2022-41317": {
"id": "CVE-2022-41317",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_1.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_1.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq",
"https://www.openwall.com/lists/oss-security/2022/09/23/1",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_1.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_1.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rcg9-7fqm-83mq",
"https://www.openwall.com/lists/oss-security/2022/09/23/1"
],
"score": 6.5,
"services": [
"445/http-proxy"
],
"severity": "medium",
"summary": "An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-697"
},
"CVE-2022-41318": {
"id": "CVE-2022-41318",
"references": [
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_2.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-394c-rr7q-6g78",
"https://www.openwall.com/lists/oss-security/2022/09/23/2",
"http://www.squid-cache.org/Versions/v4/changesets/SQUID-2022_2.patch",
"http://www.squid-cache.org/Versions/v5/changesets/SQUID-2022_2.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-394c-rr7q-6g78",
"https://www.openwall.com/lists/oss-security/2022/09/23/2"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"weakness": "CWE-190"
},
"CVE-2022-45061": {
"id": "CVE-2022-45061",
"references": [
"https://github.com/python/cpython/issues/98433",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
"https://security.gentoo.org/glsa/202305-02",
"https://security.netapp.com/advisory/ntap-20221209-0007/",
"https://github.com/python/cpython/issues/98433",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
"https://security.gentoo.org/glsa/202305-02",
"https://security.netapp.com/advisory/ntap-20221209-0007/"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-407"
},
"CVE-2022-48560": {
"id": "CVE-2022-48560",
"references": [
"https://bugs.python.org/issue39421",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
"https://security.netapp.com/advisory/ntap-20230929-0008/",
"https://bugs.python.org/issue39421",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
"https://security.netapp.com/advisory/ntap-20230929-0008/"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2022-48564": {
"id": "CVE-2022-48564",
"references": [
"https://bugs.python.org/issue42103",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://security.netapp.com/advisory/ntap-20230929-0009/",
"https://bugs.python.org/issue42103",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://security.netapp.com/advisory/ntap-20230929-0009/"
],
"score": 6.5,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "read_ints in plistlib.py in Python through 3.9.1 is vulnerable to a potential DoS attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2022-48565": {
"id": "CVE-2022-48565",
"references": [
"https://bugs.python.org/issue42051",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/",
"https://security.netapp.com/advisory/ntap-20231006-0007/",
"https://bugs.python.org/issue42051",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/",
"https://security.netapp.com/advisory/ntap-20231006-0007/"
],
"score": 9.8,
"services": [
"9093/http"
],
"severity": "critical",
"summary": "An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-611"
},
"CVE-2022-48566": {
"id": "CVE-2022-48566",
"references": [
"https://bugs.python.org/issue40791",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://security.netapp.com/advisory/ntap-20231006-0013/",
"https://bugs.python.org/issue40791",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://security.netapp.com/advisory/ntap-20231006-0013/"
],
"score": 5.9,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-362"
},
"CVE-2023-24329": {
"id": "CVE-2023-24329",
"references": [
"https://github.com/python/cpython/issues/102153",
"https://github.com/python/cpython/pull/99421",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/",
"https://pointernull.com/security/python-url-parse-problem.html",
"https://security.netapp.com/advisory/ntap-20230324-0004/",
"https://www.kb.cert.org/vuls/id/127587",
"https://github.com/python/cpython/issues/102153",
"https://github.com/python/cpython/pull/99421",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/",
"https://pointernull.com/security/python-url-parse-problem.html",
"https://security.netapp.com/advisory/ntap-20230324-0004/",
"https://www.kb.cert.org/vuls/id/127587"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-20"
},
"CVE-2023-27043": {
"id": "CVE-2023-27043",
"references": [
"http://python.org",
"https://github.com/python/cpython/issues/102988",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
"https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html",
"https://security.netapp.com/advisory/ntap-20230601-0003/",
"http://python.org",
"https://github.com/python/cpython/issues/102988",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
"https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html",
"https://security.netapp.com/advisory/ntap-20230601-0003/"
],
"score": 5.3,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-20"
},
"CVE-2023-28531": {
"id": "CVE-2023-28531",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230413-0008/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openwall.com/lists/oss-security/2023/03/15/8",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230413-0008/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openwall.com/lists/oss-security/2023/03/15/8"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-29552": {
"id": "CVE-2023-29552",
"references": [
"https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html",
"https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html",
"https://datatracker.ietf.org/doc/html/rfc2608",
"https://github.com/curesec/slpload",
"https://security.netapp.com/advisory/ntap-20230426-0001/",
"https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp",
"https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks",
"https://www.suse.com/support/kb/doc/?id=000021051"
],
"score": 7.5,
"services": [
"5984/http"
],
"severity": "high",
"summary": "The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-36632": {
"id": "CVE-2023-36632",
"references": [
"https://docs.python.org/3/library/email.html",
"https://docs.python.org/3/library/email.utils.html",
"https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py",
"https://github.com/python/cpython/issues/103800",
"https://docs.python.org/3/library/email.html",
"https://docs.python.org/3/library/email.utils.html",
"https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py",
"https://github.com/python/cpython/issues/103800"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger \"RecursionError: maximum recursion depth exceeded while calling a Python object\" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-674"
},
"CVE-2023-38408": {
"id": "CVE-2023-38408",
"references": [
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-428"
},
"CVE-2023-40217": {
"id": "CVE-2023-40217",
"references": [
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/",
"https://security.netapp.com/advisory/ntap-20231006-0014/",
"https://www.python.org/dev/security/",
"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/",
"https://security.netapp.com/advisory/ntap-20231006-0014/",
"https://www.python.org/dev/security/"
],
"score": 5.3,
"services": [
"9093/http"
],
"severity": "medium",
"summary": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-43336": {
"id": "CVE-2023-43336",
"references": [
"http://freepbx.com",
"http://sangoma.com",
"https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826",
"http://freepbx.com",
"http://sangoma.com",
"https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826"
],
"score": 8.8,
"services": [
"1434/sip-proxy"
],
"severity": "high",
"summary": "Sangoma Technologies FreePBX before cdr 15.0.18, 16.0.40, 15.0.16, and 16.0.17 was discovered to contain an access control issue via a modified parameter value, e.g., changing extension=self to extension=101.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-46724": {
"id": "CVE-2023-46724",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch",
"https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810",
"https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231208-0001/",
"http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch",
"https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810",
"https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231208-0001/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-46728": {
"id": "CVE-2023-46728",
"references": [
"https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3",
"https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231214-0006/",
"https://github.com/squid-cache/squid/commit/6ea12e8fb590ac6959e9356a81aa3370576568c3",
"https://github.com/squid-cache/squid/security/advisories/GHSA-cg5h-v6vc-w33f",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20231214-0006/"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2023-46846": {
"id": "CVE-2023-46846",
"references": [
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/errata/RHSA-2024:11049",
"https://access.redhat.com/security/cve/CVE-2023-46846",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245910",
"https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh",
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/security/cve/CVE-2023-46846",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245910",
"https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00008.html",
"https://security.netapp.com/advisory/ntap-20231130-0002/"
],
"score": 9.3,
"services": [
"10250/http-proxy"
],
"severity": "critical",
"summary": "SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"weakness": "CWE-444"
},
"CVE-2023-46847": {
"id": "CVE-2023-46847",
"references": [
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6805",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:6882",
"https://access.redhat.com/errata/RHSA-2023:6884",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/errata/RHSA-2023:7576",
"https://access.redhat.com/errata/RHSA-2023:7578",
"https://access.redhat.com/security/cve/CVE-2023-46847",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245916",
"https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g",
"https://access.redhat.com/errata/RHSA-2023:6266",
"https://access.redhat.com/errata/RHSA-2023:6267",
"https://access.redhat.com/errata/RHSA-2023:6268",
"https://access.redhat.com/errata/RHSA-2023:6748",
"https://access.redhat.com/errata/RHSA-2023:6801",
"https://access.redhat.com/errata/RHSA-2023:6803",
"https://access.redhat.com/errata/RHSA-2023:6804",
"https://access.redhat.com/errata/RHSA-2023:6805",
"https://access.redhat.com/errata/RHSA-2023:6810",
"https://access.redhat.com/errata/RHSA-2023:6882",
"https://access.redhat.com/errata/RHSA-2023:6884",
"https://access.redhat.com/errata/RHSA-2023:7213",
"https://access.redhat.com/errata/RHSA-2023:7576",
"https://access.redhat.com/errata/RHSA-2023:7578",
"https://access.redhat.com/security/cve/CVE-2023-46847",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245916",
"https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://security.netapp.com/advisory/ntap-20231130-0002/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"weakness": "CWE-120"
},
"CVE-2023-48795": {
"id": "CVE-2023-48795",
"references": [
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-354"
},
"CVE-2023-49285": {
"id": "CVE-2023-49285",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch",
"https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b",
"https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470",
"https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/",
"http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch",
"https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b",
"https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470",
"https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-126"
},
"CVE-2023-49286": {
"id": "CVE-2023-49286",
"references": [
"http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch",
"https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264",
"https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch",
"https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264",
"https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0004/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-253"
},
"CVE-2023-49288": {
"id": "CVE-2023-49288",
"references": [
"https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0006/",
"https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0006/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with \"collapsed_forwarding on\" are vulnerable. Configurations with \"collapsed_forwarding off\" or without a \"collapsed_forwarding\" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2023-50269": {
"id": "CVE-2023-50269",
"references": [
"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0005/",
"http://www.squid-cache.org/Versions/v5/SQUID-2023_10.patch",
"http://www.squid-cache.org/Versions/v6/SQUID-2023_10.patch",
"https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/",
"https://security.netapp.com/advisory/ntap-20240119-0005/"
],
"score": 8.6,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"weakness": "CWE-674"
},
"CVE-2023-51384": {
"id": "CVE-2023-51384",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-51385": {
"id": "CVE-2023-51385",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"weakness": "CWE-78"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-5824": {
"id": "CVE-2023-5824",
"references": [
"https://access.redhat.com/errata/RHSA-2023:7465",
"https://access.redhat.com/errata/RHSA-2023:7668",
"https://access.redhat.com/errata/RHSA-2024:0072",
"https://access.redhat.com/errata/RHSA-2024:0397",
"https://access.redhat.com/errata/RHSA-2024:0771",
"https://access.redhat.com/errata/RHSA-2024:0772",
"https://access.redhat.com/errata/RHSA-2024:0773",
"https://access.redhat.com/errata/RHSA-2024:1153",
"https://access.redhat.com/security/cve/CVE-2023-5824",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245914",
"https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255",
"https://access.redhat.com/errata/RHSA-2023:7465",
"https://access.redhat.com/errata/RHSA-2023:7668",
"https://access.redhat.com/errata/RHSA-2024:0072",
"https://access.redhat.com/errata/RHSA-2024:0397",
"https://access.redhat.com/errata/RHSA-2024:0771",
"https://access.redhat.com/errata/RHSA-2024:0772",
"https://access.redhat.com/errata/RHSA-2024:0773",
"https://access.redhat.com/errata/RHSA-2024:1153",
"https://access.redhat.com/security/cve/CVE-2023-5824",
"https://bugzilla.redhat.com/show_bug.cgi?id=2245914",
"https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255",
"https://security.netapp.com/advisory/ntap-20231130-0003/"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-755"
},
"CVE-2024-45802": {
"id": "CVE-2024-45802",
"references": [
"https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj",
"https://security.netapp.com/advisory/ntap-20250103-0004/"
],
"score": 7.5,
"services": [
"10250/http-proxy"
],
"severity": "high",
"summary": "Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2024-6232": {
"id": "CVE-2024-6232",
"references": [
"https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4",
"https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06",
"https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4",
"https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d",
"https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877",
"https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf",
"https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373",
"https://github.com/python/cpython/issues/121285",
"https://github.com/python/cpython/pull/121286",
"https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"http://www.openwall.com/lists/oss-security/2024/09/03/5",
"https://security.netapp.com/advisory/ntap-20241018-0007/"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1333"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://packetstorm.news/files/id/190587/",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.exploit-db.com/exploits/52269",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
},
"CVE-2024-7592": {
"id": "CVE-2024-7592",
"references": [
"https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621",
"https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef",
"https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06",
"https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a",
"https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f",
"https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774",
"https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1",
"https://github.com/python/cpython/issues/123067",
"https://github.com/python/cpython/pull/123075",
"https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/",
"https://security.netapp.com/advisory/ntap-20241018-0006/"
],
"score": 7.5,
"services": [
"9093/http"
],
"severity": "high",
"summary": "There is a LOW severity vulnerability affecting CPython, specifically the\n'http.cookies' standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
}
}
}