Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

72.240.67.226

SummaryCVE DetailsRaw Data
09 Jan 2026, 01:36:59 UTC
{
  "scan_id": 1767797164,
  "ip": "72.240.67.226",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "72.240.66.0/23",
    "postal_code": "43528",
    "coordinates": {
      "latitude": "41.6197",
      "longitude": "-83.7282"
    },
    "geo_point": "41.6197, -83.7282",
    "locale_code": "en",
    "continent": "North America",
    "country_code": "US",
    "country_name": "United States",
    "city": "Holland"
  },
  "location_updated_at": "2026-01-06T12:36:03Z",
  "asn": {
    "number": "AS13490",
    "organization": "BUCKEYECABLEVISION",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "72.240.0.0/15",
    "organization": "Buckeye Cablevision, Inc.",
    "descr": "Buckeye Cablevision, Inc.",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2025-02-04T15:07:07Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-01-06T12:36:03Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-01-06T12:51:43Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-01-06T12:36:03Z"
    }
  ],
  "hostnames": [
    {
      "name": "cm-72-240-67-226.buckeyecom.net",
      "last_updated_at": "2026-01-06T12:51:43Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Versa Director",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "\n<HEAD>\n<meta HTTP-EQUIV=\"REFRESH\" content=\"0; url=/versa/\">\n</HEAD>\n",
          "body_murmur": 1031638075,
          "body_sha256": "4bed30cc3ea94e0c2e2bff2f56b1a8d02f0d4c59d99207da058170b54bd245e3",
          "content_length": 69,
          "favicon": {
            "md5_hash": "4644f2d45601037b8423d45e13194c93",
            "murmur_hash": -297069493,
            "path": "http://72.240.67.226:80/favicon.ico",
            "size": 21630
          },
          "headers": {
            "cache_control": [
              "no-cache, no-store, must-revalidate"
            ],
            "content_length": [
              "69"
            ],
            "content_security_policy": [
              "default-src 'self';font-src 'self' data: https://fonts.googleapis.com/ https://fonts.gstatic.com; script-src 'self' 'unsafe-eval' https://maps.google    apis.com/maps/api/geocode/json https://maps.googleapis.com/* https://*.tile.openstreetmap.org/*;img-src 'self' data: https://maps.googleapis.com/maps/api/geocode/json https://maps.gstatic.com/ https:/    /maps.googleapis.com/ https://*.tile.openstreetmap.org https://chart.apis.google.com/; style-src 'self' 'unsafe-inline' data: https://maps.googleapis.com/maps/api/geocode/json https://*.tile.openstree    tmap.org https://fonts.googleapis.com/;form-action 'self'; connect-src 'self' data: https://maps.googleapis.com https://*.tile.openstreetmap.org/ https://ipapi.co;"
            ],
            "content_type": [
              "text/html;charset=ISO-8859-1"
            ],
            "date": [
              "Thu, 08 Jan 2026 09:35:38 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "server": [
              "Versa Director"
            ],
            "set_cookie": [
              "JSESSIONID=C3833C84D817F431F123B94A3E5B0475; Path=/; Secure; HttpOnly"
            ],
            "strict_transport_security": [
              "max-age=31536000; includeSubdomains; preload"
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "DENY"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "72.240.67.226",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200
        }
      },
      "url": "http://72.240.67.226/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-08T09:35:39.342Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache Tomcat",
      "extra_info": "language: en",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:tomcat",
          "part": "a",
          "vendor": "apache",
          "product": "tomcat",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "\n<HEAD>\n<meta HTTP-EQUIV=\"REFRESH\" content=\"0; url=/versa/\">\n</HEAD>\n",
          "body_murmur": 1031638075,
          "body_sha256": "4bed30cc3ea94e0c2e2bff2f56b1a8d02f0d4c59d99207da058170b54bd245e3",
          "content_length": 69,
          "favicon": {
            "md5_hash": "4644f2d45601037b8423d45e13194c93",
            "murmur_hash": -297069493,
            "path": "https://72.240.67.226:443/favicon.ico",
            "size": 21630
          },
          "headers": {
            "cache_control": [
              "no-cache, no-store, must-revalidate"
            ],
            "content_length": [
              "69"
            ],
            "content_security_policy": [
              "default-src 'self';font-src 'self' data: https://fonts.googleapis.com/ https://fonts.gstatic.com; script-src 'self' 'unsafe-eval' https://maps.google    apis.com/maps/api/geocode/json https://maps.googleapis.com/* https://*.tile.openstreetmap.org/*;img-src 'self' data: https://maps.googleapis.com/maps/api/geocode/json https://maps.gstatic.com/ https:/    /maps.googleapis.com/ https://*.tile.openstreetmap.org https://chart.apis.google.com/; style-src 'self' 'unsafe-inline' data: https://maps.googleapis.com/maps/api/geocode/json https://*.tile.openstree    tmap.org https://fonts.googleapis.com/;form-action 'self'; connect-src 'self' data: https://maps.googleapis.com https://*.tile.openstreetmap.org/ https://ipapi.co;"
            ],
            "content_type": [
              "text/html;charset=ISO-8859-1"
            ],
            "date": [
              "Thu, 08 Jan 2026 01:45:18 GMT"
            ],
            "pragma": [
              "no-cache"
            ],
            "set_cookie": [
              "JSESSIONID=2E0D07A5B1380F2E3B9D8294ABD57067; Path=/; Secure; HttpOnly"
            ],
            "strict_transport_security": [
              "max-age=31536000; includeSubdomains; preload"
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "DENY"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "72.240.67.226",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt"
                ],
                "ocsp_urls": [
                  "http://ocsp.sectigo.com"
                ]
              },
              "authority_key_id": "8d8c5ec454ad8ae177e99bf99b05e1b8018d61e1",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "cps": [
                    "https://sectigo.com/CPS"
                  ],
                  "id": "1.3.6.1.4.1.6449.1.2.2.7"
                },
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n                E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n    Timestamp : Mar  5 16:17:03.914 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:A6:DC:0B:8D:98:2B:5C:D6:BC:EB:12:\n                1E:36:84:05:00:B6:A0:17:A0:EA:2D:9A:53:B9:DD:1A:\n                9C:33:85:39:D1:02:20:44:1D:45:BB:AC:51:0F:38:F7:\n                DE:E3:2F:71:37:31:37:0E:8E:FE:74:1F:E7:6D:BC:00:\n                DA:C2:B7:1E:A4:68:66\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:\n                AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4\n    Timestamp : Mar  5 16:17:03.809 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:FB:88:0D:C6:4D:33:26:AA:73:9A:10:\n                32:75:A6:5A:9F:E8:BF:E1:AC:1B:40:BB:EC:AE:F3:16:\n                AB:BD:51:87:8F:02:21:00:CF:CC:10:EE:EB:E6:9B:FF:\n                CF:1D:86:D7:62:66:52:B3:7D:42:5B:82:00:61:62:A4:\n                D4:26:6D:48:FC:DB:B5:99\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:\n                F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7\n    Timestamp : Mar  5 16:17:03.849 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:66:0B:B7:47:8C:85:5F:F0:B9:BA:D7:55:\n                95:B7:76:58:CB:72:8C:1C:B3:B2:39:09:52:B9:18:A2:\n                02:54:C3:06:02:21:00:F3:91:CC:1F:D1:B3:91:69:CE:\n                BA:AF:70:61:A0:91:99:C9:31:97:73:50:5B:93:19:66:\n                31:8A:67:75:7E:29:01",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "managedservices.telesystem.us",
                  "www.managedservices.telesystem.us"
                ]
              },
              "subject_key_id": "016883169652dbfbefc57055008403d63155130e"
            },
            "fingerprint_md5": "B125836900B6F04415BD82DB98E749AF",
            "fingerprint_sha1": "1F9597F19B969C3B228541D72CF8F1C95D20BFFF",
            "fingerprint_sha256": "BF84840003CBE18B373EFC90EED3075C5723305E4CE3C1FA9BCD7E403528855F",
            "issuer": {
              "common_name": [
                "Sectigo RSA Domain Validation Secure Server CA"
              ],
              "country": [
                "GB"
              ],
              "locality": [
                "Salford"
              ],
              "organization": [
                "Sectigo Limited"
              ],
              "province": [
                "Greater Manchester"
              ]
            },
            "issuer_dn": "/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA",
            "jarm": "15d3fd16d29d29d00042d43d00041d596dbf6b69dea2f10bfbf38593c6bb6c",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "next_update": "2026-01-14T04:59:47",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "159068779498408974522869401661725420162",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100a6dc0b8d982b5cd6bceb121e36840500b6a017a0ea2d9a53b9dd1a9c338539d10220441d45bbac510f38f7dee32f713731370e8efe741fe76dbc00dac2b71ea46866"
                },
                "timestamp": "2025-03-05T16:17:03.914000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100fb880dc64d3326aa739a103275a65a9fe8bfe1ac1b40bbecaef316abbd51878f022100cfcc10eeebe69bffcf1d86d7626652b37d425b82006162a4d4266d48fcdbb599"
                },
                "timestamp": "2025-03-05T16:17:03.809000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "cb38f715897c84a1445f5bc1ddfbc96ef29a59cd470a690585b0cb14c31458e7",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "30450220660bb7478c855ff0b9bad75595b77658cb728c1cb3b2390952b918a20254c306022100f391cc1fd1b39169cebaaf7061a09199c9319773505b931966318a67757e2901"
                },
                "timestamp": "2025-03-05T16:17:03.849000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "managedservices.telesystem.us"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "managedservices.telesystem.us",
                "www.managedservices.telesystem.us"
              ],
              "extended_dns_names": [
                {
                  "domain": "telesystem",
                  "fld": "telesystem.us",
                  "subdomain": "managedservices",
                  "tld": "us"
                },
                {
                  "domain": "telesystem",
                  "fld": "telesystem.us",
                  "subdomain": "www.managedservices",
                  "tld": "us"
                }
              ]
            },
            "subject_dn": "/CN=managedservices.telesystem.us",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "22b3a9cab1959046ed9fbf370941614ef2baf023fe86db801f57ffc7265a5552",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "567d716aaf4eb772fbdde7976b15032fbcd3a3c9c56a9ff9a9d7806b3891bd8d",
            "tbs_noct_fingerprint": "27b947129813034a06c63a6ebabee64eb3119c0f4b2be099a6508c0f67d81dd1",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 34300800,
              "not_after": "2026-04-05T23:59:59",
              "not_before": "2025-03-05T00:00:00"
            },
            "version": 2
          },
          "fingerprint_sha256": "BF84840003CBE18B373EFC90EED3075C5723305E4CE3C1FA9BCD7E403528855F",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://72.240.67.226/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-08T04:25:41.294Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "postgresql",
      "version": "11.19 - 11.22",
      "product": "PostgreSQL DB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postgresql:postgresql:11",
          "part": "a",
          "vendor": "postgresql",
          "product": "postgresql",
          "version": "11",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "postgres": {
          "errors": [
            {
              "code": "0A000",
              "file": "postmaster.c",
              "line": "2057",
              "message": "unsupported frontend protocol 255.255: server supports 2.0 to 3.0",
              "routine": "ProcessStartupPacket",
              "severity": "FATAL"
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            }
          ],
          "is_ssl": false,
          "supported_versions": "FATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2019-9193",
          "score": 7.2,
          "severity": "high"
        },
        {
          "id": "CVE-2021-3393",
          "score": 4.3,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-09T01:36:59.013Z"
    }
  ],
  "services_hash": "cbe94ccb66addf8c6ef33eb44faded8c5d96e5acae55181511a27cedeb93272c",
  "last_updated_at": "2026-01-09T01:36:59.013Z",
  "banner": [
    "postgres",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2019-9193": {
      "id": "CVE-2019-9193",
      "references": [
        "http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html",
        "http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html",
        "http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html",
        "https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/",
        "https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5",
        "https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/",
        "https://security.netapp.com/advisory/ntap-20190502-0003/",
        "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/"
      ],
      "score": 7.2,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "In PostgreSQL 9.3 through 11.2, the \"COPY TO/FROM PROGRAM\" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2021-3393": {
      "id": "CVE-2021-3393",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
        "https://security.gentoo.org/glsa/202105-32",
        "https://security.netapp.com/advisory/ntap-20210507-0006/"
      ],
      "score": 4.3,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-209"
    }
  }
}