8.215.15.163
{
  "scan_id": 1761853147,
  "ip": "8.215.15.163",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "8.215.8.0/21",
    "postal_code": "12850",
    "coordinates": {
      "latitude": "-6.2208",
      "longitude": "106.8403"
    },
    "geo_point": "-6.2208, 106.8403",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "ID",
    "country_name": "Indonesia",
    "city": "Jakarta"
  },
  "location_updated_at": "2025-10-31T18:15:27Z",
  "asn": {
    "number": "AS45102",
    "organization": "Alibaba US Technology Co., Ltd.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "",
    "organization": "",
    "descr": "",
    "_encoding": {
      "raw": ""
    }
  },
  "whois_updated_at": "0001-01-01T00:00:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-10-31T18:15:27Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-10-31T21:12:26Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-10-31T18:15:27Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "ftp",
      "version": "2.3.4",
      "product": "vsftpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:vsftpd:vsftpd:2.3.4",
          "part": "a",
          "vendor": "vsftpd",
          "product": "vsftpd",
          "version": "2\\.3\\.4",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ftp": {
          "banner": "220 Xlight FTP Server 3.6.5 ready\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T04:43:16.751Z"
    },
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "7.6p1 Ubuntu 4ubuntu0.3",
      "product": "OpenSSH",
      "extra_info": "Ubuntu Linux; protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:openbsd:openssh:7.6p1",
          "part": "a",
          "vendor": "openbsd",
          "product": "openssh",
          "version": "7\\.6p1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-HUAWEVRPV8.0",
          "client_to_server_ciphers": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr"
          ],
          "client_to_server_compression": [
            "none"
          ],
          "client_to_server_macs": [
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "host_key_algorithms": [
            "rsa-sha2-256",
            "rsa-sha2-512",
            "ssh-rsa"
          ],
          "kex_algorithms": [
            "curve25519-sha256",
            "[email protected]",
            "ecdh-sha2-nistp256",
            "ecdh-sha2-nistp384",
            "ecdh-sha2-nistp521",
            "diffie-hellman-group14-sha256",
            "diffie-hellman-group14-sha1",
            "[email protected]"
          ],
          "key": {
            "algorithm": "ssh-rsa",
            "fingerprint_sha256": "9c74b8803a57b36890b83bed29667413fd5d8b85d4e6c83e9255f6015d0c3d28"
          },
          "server_to_client_ciphers": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr"
          ],
          "server_to_client_compression": [
            "none"
          ],
          "server_to_client_macs": [
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "software": "HUAWEVRPV8.0",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-2768",
          "severity": "medium"
        },
        {
          "id": "CVE-2008-3844",
          "severity": "high"
        },
        {
          "id": "CVE-2016-20012",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T10:50:24.081Z"
    },
    {
      "port": 23,
      "protocol": "tcp",
      "name": "telnet",
      "version": "",
      "product": "Cowrie Honeypot telnetd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "telnet": {
          "banner": "aigoWiFi login: "
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T11:27:19.346Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "8.14.7/8.14.7",
      "product": "Sendmail",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
          "part": "a",
          "vendor": "sendmail",
          "product": "sendmail",
          "version": "8\\.14\\.7\\/8\\.14\\.7",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 www.oowoo.cc ESMTP Barracuda; 1761879025476@78ce233a199ff42c87a1db5f7c218a65-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4c979c63fb49be4ffdd240e2605== xsm\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T02:50:25.657Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -779024405,
          "body_sha256": "3254b4a3f5b088aecda7649e9cee8888f007662a9e890b392ac81e2325126525",
          "component": [
            "Adobe ColdFusion",
            "Bugzilla:5.0.1",
            "Django",
            "BEM",
            "Perl",
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "WordPress",
            "Microsoft ASP.NET",
            "MySQL",
            "Ruby on Rails",
            "CFML",
            "PHP",
            "Liveinternet",
            "Ruby",
            "Symfony",
            "Tengine",
            "Python"
          ],
          "content_length": 129522,
          "favicon": {
            "md5_hash": "44071663a97aa46640d124dd31fe7521",
            "murmur_hash": 2091717113,
            "path": "http://8.215.15.163:80/favicon.ico",
            "size": 7659
          },
          "headers": {
            "content_length": [
              "129522"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 30 Oct 2025 09:46:50 GMT"
            ],
            "server": [
              "Tengine/2.2.3"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Welcome to JBoss AS"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:80/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T13:09:05.126Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "pop3": {
          "banner": "+OK Postfix smtpd ready. <1761921194146@78ce233a199ff42c87a1db5f7c218a65-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc74c633bf9be4fad4240b24==>\r\n"
        }
      },
      "url": "http://8.215.15.163:110/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T14:33:14.41Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1860820210,
          "body_sha256": "8037ea8ed6125f8c739ed217724f53aef8e4876104bb3fd6adf5156f5190d384",
          "component": [
            "Django",
            "Bugzilla:5.0.1",
            "SPIP:4.1.11",
            "Python",
            "CFML",
            "Roadiz CMS:1.2.36",
            "Liveinternet",
            "Microsoft ASP.NET",
            "BEM",
            "MySQL",
            "PHP",
            "Perl",
            "Symfony",
            "Adobe ColdFusion",
            "WordPress",
            "Ruby on Rails",
            "Ruby"
          ],
          "content_length": 127390,
          "favicon": {
            "md5_hash": "b5c66b07a742597376263bb23fc11b15",
            "murmur_hash": 444712798,
            "path": "http://8.215.15.163:143/favicon.ico",
            "size": 5506
          },
          "headers": {
            "content_length": [
              "127390"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 16 Oct 2025 13:42:28 GMT"
            ],
            "server": [
              "MQCache/2.1.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Vitogate 300"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "24699EF1C373610412F6017731874C3F",
            "fingerprint_sha1": "EF5C07DE0AF849D6F9F230E061696DD083BE4933",
            "fingerprint_sha256": "2F00148A717BFDFE501DE99087DD54B28076ED16F3F92E46C3F20A9D57FCDCE4",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "QA"
              ],
              "domain_component": [
                "JF",
                "local"
              ],
              "organization": [
                "ZVHTCXLN"
              ],
              "organizational_unit": [
                "OTMOQPD"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "6275922371139966208",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "QA"
              ],
              "domain_component": [
                "JF",
                "local"
              ],
              "organization": [
                "ZVHTCXLN"
              ],
              "organizational_unit": [
                "OTMOQPD"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "f9454828649386b8e4bc71ef15c6818ba4f330187b112dca6edf5307ab1895fe",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "de6f7d585a5fbda6e488e5abf9f8dd31530f31700b4b40580a04ef3be422b3ac",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-16T20:17:33",
              "not_before": "2025-10-16T20:17:33"
            },
            "version": 2
          },
          "fingerprint_sha256": "2F00148A717BFDFE501DE99087DD54B28076ED16F3F92E46C3F20A9D57FCDCE4",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:143/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T15:01:42.703Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1517829100,
          "body_sha256": "ea69c8f2a3eed7afead7fed412c3ad0fcfd74670fe7e22d0fd2346d3e986d571",
          "component": [
            "Roadiz CMS:1.2.36",
            "Microsoft ASP.NET",
            "CFML",
            "BEM",
            "WordPress",
            "Bugzilla:5.0.1",
            "SPIP:4.1.11",
            "Django",
            "Python",
            "PHP",
            "Liveinternet",
            "Perl",
            "GoAhead",
            "Ruby on Rails",
            "Ruby",
            "Symfony",
            "Adobe ColdFusion",
            "MySQL"
          ],
          "content_length": 128524,
          "favicon": {
            "md5_hash": "c3ee66d45636052a69bab53600f2f878",
            "murmur_hash": 362091310,
            "path": "http://8.215.15.163:443/favicon.ico",
            "size": 2086
          },
          "headers": {
            "content_length": [
              "128524"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Wed, 29 Oct 2025 23:06:21 GMT"
            ],
            "server": [
              "GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "HDS-7204TVI-HDMI/K 192.168.100.89,Digital Video Recorder"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T09:34:53.29Z"
    },
    {
      "port": 445,
      "protocol": "tcp",
      "name": "http-proxy",
      "version": "7.0.0",
      "product": "Apache Traffic Server",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:traffic_server:7.0.0",
          "part": "a",
          "vendor": "apache",
          "product": "traffic_server",
          "version": "7\\.0\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -630409138,
          "body_sha256": "b571a52ea571e2291ac440fff98a488f66336c4dab9e046716ddf46d9df5d185",
          "component": [
            "Microsoft ASP.NET",
            "Python",
            "Liveinternet",
            "Ruby",
            "CFML",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "Django",
            "MySQL",
            "PHP",
            "Bugzilla:5.0.1",
            "Perl",
            "BEM",
            "Adobe ColdFusion",
            "Symfony",
            "WordPress"
          ],
          "content_length": 128501,
          "favicon": {
            "md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
            "murmur_hash": -1033644073,
            "path": "http://8.215.15.163:445/favicon.ico",
            "size": 3774
          },
          "headers": {
            "content_length": [
              "128501"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 25 Oct 2025 14:44:58 GMT"
            ],
            "server": [
              "firefox"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "This network runs a TOR Exit Node"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2017-5660",
          "severity": "high"
        },
        {
          "id": "CVE-2017-7671",
          "severity": "high"
        },
        {
          "id": "CVE-2018-11783",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:445/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-25T23:22:45.189Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-26T20:24:47.533Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "8.14.7/8.14.7",
      "product": "Sendmail",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sendmail:sendmail:8.14.7%2F8.14.7",
          "part": "a",
          "vendor": "sendmail",
          "product": "sendmail",
          "version": "8\\.14\\.7\\/8\\.14\\.7",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 www.oowoo.cc ESMTP Exim smtpd/4.94.2; 1759625374157@78ce233a199ff42c87a1db5f7c218a65-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc74c633bf9be4fbdf240e230b== xsm\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "8F243743F610A9230727909492E85CC8",
            "fingerprint_sha1": "269DE756D5F337BF580F0ACC8DF1AD5F6ECB9BE0",
            "fingerprint_sha256": "8ABBDA434A25330039D52F4FF1FADAFA1F22F252F14010F35278E5CABA28868D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "VU"
              ],
              "domain_component": [
                "ZBR",
                "local"
              ],
              "organization": [
                "LSLSAXHG"
              ],
              "organizational_unit": [
                "ZMXMHQI"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1197434711484041788",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "VU"
              ],
              "domain_component": [
                "ZBR",
                "local"
              ],
              "organization": [
                "LSLSAXHG"
              ],
              "organizational_unit": [
                "ZMXMHQI"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "475bc0f4a4f783ed5bbfdf333537795c241d3a7ae126e7ac14e191dd6e6d319b",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "519f102b60158aa711e13f669728ac0daf2ffbcec12e4a4920812f948cdd507c",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-09-29T21:19:22",
              "not_before": "2025-09-29T21:19:22"
            },
            "version": 2
          },
          "fingerprint_sha256": "8ABBDA434A25330039D52F4FF1FADAFA1F22F252F14010F35278E5CABA28868D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-05T00:49:40.403Z"
    },
    {
      "port": 631,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -107585924,
          "body_sha256": "bc75c34759d0e8dbd9dfc6d72c4f721b2c1d0936aa335ed2cce1f2427cea1726",
          "component": [
            "Django",
            "Adobe ColdFusion",
            "MySQL",
            "Bugzilla:5.0.1",
            "Perl",
            "Liveinternet",
            "Ruby on Rails",
            "PHP",
            "Ruby",
            "SPIP:4.1.11",
            "Python",
            "CFML",
            "Microsoft ASP.NET",
            "Roadiz CMS:1.2.36",
            "Symfony",
            "WordPress",
            "BEM"
          ],
          "content_length": 127325,
          "headers": {
            "content_length": [
              "127325"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 09 Oct 2025 00:23:59 GMT"
            ],
            "server": [
              "BlueServer/4.8.6.3"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "GoAnywhere 7.4.1 - Production"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "ipp": {
          "printer_uris": null,
          "versions": null
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:631/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-25T08:40:25.076Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1249235254,
          "body_sha256": "2ab123c5ea8f6d615ecf2ba702a35a8db7fec21201e26aa013ca8cd17f1aa495",
          "component": [
            "Django",
            "Python",
            "Ruby",
            "PHP",
            "Bugzilla:5.0.1",
            "BEM",
            "Microsoft ASP.NET",
            "WordPress",
            "MySQL",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "CFML",
            "Liveinternet",
            "Adobe ColdFusion",
            "Perl",
            "Symfony",
            "Akka HTTP",
            "SPIP:4.1.11"
          ],
          "content_length": 128198,
          "favicon": {
            "md5_hash": "b89adb697c786ef4c9553d2caf9fc409",
            "murmur_hash": -17306567,
            "path": "http://8.215.15.163:993/favicon.ico",
            "size": 827
          },
          "headers": {
            "content_length": [
              "128198"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 13 Oct 2025 19:18:01 GMT"
            ],
            "server": [
              "akka-http"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "YONYOU UAP"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:993/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-22T04:48:51.748Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "http",
      "version": "10.0",
      "product": "Microsoft IIS httpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:internet_information_services:10.0",
          "part": "a",
          "vendor": "microsoft",
          "product": "internet_information_services",
          "version": "10\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 20579682,
          "body_sha256": "be1c9d5d59df4fc9b1adc51f4dd188069ae1fad1d7761d73cc6275988ff3885d",
          "component": [
            "Python",
            "MySQL",
            "PHP",
            "CFML",
            "Symfony",
            "Roadiz CMS:1.2.36",
            "lighttpd:1.4.32",
            "BEM",
            "Django",
            "Ruby on Rails",
            "Ruby",
            "Bugzilla:5.0.1",
            "SPIP:4.1.11",
            "Microsoft ASP.NET",
            "WordPress",
            "Liveinternet",
            "Adobe ColdFusion",
            "Perl"
          ],
          "content_length": 129530,
          "headers": {
            "content_length": [
              "129530"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 30 Oct 2025 10:03:26 GMT"
            ],
            "server": [
              "lighttpd/1.4.32"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Wazo - [phonesystem-master]"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:995/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T21:13:36.74Z"
    },
    {
      "port": 1234,
      "protocol": "tcp",
      "name": "java-rmi",
      "version": "",
      "product": "Java RMI",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T01:36:34.347Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_NOT_SUP",
          "instance_name": "",
          "version": "15.0.4153"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T21:00:59.288Z"
    },
    {
      "port": 1434,
      "protocol": "tcp",
      "name": "http",
      "version": "8.2.0",
      "product": "TwistedWeb httpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:twistedmatrix:twistedweb:8.2.0",
          "part": "a",
          "vendor": "twistedmatrix",
          "product": "twistedweb",
          "version": "8\\.2\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 714627828,
          "body_sha256": "f09b62765b00577702af0f93ffae6b1abd0d8f5d6542437b93e75bc77d85091f",
          "component": [
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "WordPress",
            "Django",
            "Python",
            "Ruby",
            "Ruby on Rails",
            "PHP",
            "Bugzilla:5.0.1",
            "Adobe ColdFusion",
            "Microsoft ASP.NET",
            "CFML",
            "Symfony",
            "Liveinternet",
            "MySQL",
            "BEM",
            "Perl"
          ],
          "content_length": 129510,
          "favicon": {
            "md5_hash": "af13b379bdb4ae7a5e68d9aa4419b2e4",
            "murmur_hash": 899457975,
            "path": "http://8.215.15.163:1434/favicon.ico",
            "size": 1406
          },
          "headers": {
            "content_length": [
              "129510"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 03:41:00 GMT"
            ],
            "server": [
              "Keil-EWEB/2.1"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "AnyLink"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:1434/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T03:41:29.731Z"
    },
    {
      "port": 1883,
      "protocol": "tcp",
      "name": "mqtt",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T05:04:40.032Z"
    },
    {
      "port": 1911,
      "protocol": "tcp",
      "name": "http",
      "version": "1.12.2",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.12.2",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.12\\.2",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -708989921,
          "body_sha256": "bf8939a0ee38d2423478e3a656189b013bd552772c857444ba712bd9c154aea5",
          "component": [
            "CFML",
            "Ruby",
            "Symfony",
            "PHP",
            "Microsoft ASP.NET",
            "Adobe ColdFusion",
            "Django",
            "Python",
            "Perl",
            "Ruby on Rails",
            "WordPress",
            "BEM",
            "MySQL",
            "Bugzilla:5.0.1",
            "Liveinternet",
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "TwistedWeb:12.1.0"
          ],
          "content_length": 128475,
          "headers": {
            "content_length": [
              "128475"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 27 Oct 2025 07:23:22 GMT"
            ],
            "server": [
              "TwistedWeb/12.1.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "LenelS2 Login"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "index": [
            "Products"
          ],
          "jvm": [],
          "lucene": [],
          "system": [],
          "vm": []
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:1911/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T08:46:17.841Z"
    },
    {
      "port": 2181,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1383411852,
          "body_sha256": "3472c2282e86dfdc1a87e1f8a1ce67f2a479eb38012c62855cccd5e09d63200d",
          "component": [
            "MySQL",
            "Perl",
            "Ruby",
            "PHP",
            "Bugzilla:5.0.1",
            "Ruby on Rails",
            "Liveinternet",
            "Microsoft ASP.NET",
            "Django",
            "Python",
            "BEM",
            "Roadiz CMS:1.2.36",
            "WordPress",
            "Adobe ColdFusion",
            "CFML",
            "Symfony",
            "SPIP:4.1.11"
          ],
          "content_length": 129534,
          "favicon": {
            "md5_hash": "49a709193b56e4b0e4e8d0fabfc6311e",
            "murmur_hash": -299287097,
            "path": "http://8.215.15.163:2181/favicon.ico",
            "size": 238
          },
          "headers": {
            "content_length": [
              "129534"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 30 Oct 2025 18:41:14 GMT"
            ],
            "server": [
              "CDNFly"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "RT-212,AirTies Wireless Networks Router"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:2181/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T05:53:28.569Z"
    },
    {
      "port": 2525,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "smtp": {
          "banner": "220 www.oowoo.cc ESMTP roundcube; 1761580278747@78ce233a199ff42c87a1db5f7c218a65-8dcb74a64dc984fb9abe3e7c201f810d9ec90ed8e4cc77c63dbc9be2f6c23b0821== xsm\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T19:10:04.767Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.7.31",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.7.31",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.7\\.31",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.7.31"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T20:26:39.982Z"
    },
    {
      "port": 4891,
      "protocol": "tcp",
      "name": "http",
      "version": "10",
      "product": "JBoss WildFly Application Server",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:redhat:jboss_wildfly_application_server:10",
          "part": "a",
          "vendor": "redhat",
          "product": "jboss_wildfly_application_server",
          "version": "10",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1611462347,
          "body_sha256": "838fec1e66bea5164a8d678450fe4abb4db703895731f06f08ce5fccfac37693",
          "component": [
            "PHP",
            "OpenSSL:0.9.8d",
            "Apache HTTP Server:1.3.28",
            "Microsoft ASP.NET",
            "Liveinternet",
            "Python",
            "MySQL",
            "UNIX",
            "CFML",
            "Django",
            "Ruby",
            "SPIP:4.1.11",
            "mod_ssl:2.8.15",
            "Adobe ColdFusion",
            "Perl",
            "BEM",
            "Roadiz CMS:1.2.36",
            "WordPress",
            "Bugzilla:5.0.1",
            "Ruby on Rails",
            "Symfony"
          ],
          "content_length": 129514,
          "favicon": {
            "md5_hash": "c3ee66d45636052a69bab53600f2f878",
            "murmur_hash": 362091310,
            "path": "http://8.215.15.163:4891/favicon.ico",
            "size": 2086
          },
          "headers": {
            "content_length": [
              "129514"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 20:44:54 GMT"
            ],
            "server": [
              "Apache/1.3.28 (Unix) mod_ssl/2.8.15 OpenSSL/0.9.8d"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Network Dome Camera"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "AFC0EAFE4CD7F1065CCB3062EF1D77BE",
            "fingerprint_sha1": "44CFF0BB9B27EAF2F2C10D5C126D150171C7C5C3",
            "fingerprint_sha256": "9EE614AEBD7054B0A12348108CDCF5FB81A1AFE67B98E2D99E7E1053BB3843E9",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "TF"
              ],
              "domain_component": [
                "TWMR",
                "local"
              ],
              "organization": [
                "QLQHYAHY"
              ],
              "organizational_unit": [
                "BDJZUKN"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "947095538586391600",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "TF"
              ],
              "domain_component": [
                "TWMR",
                "local"
              ],
              "organization": [
                "QLQHYAHY"
              ],
              "organizational_unit": [
                "BDJZUKN"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e6d652e5013027b8510ecf006da450d691b135e6d12b43fcd933442c6793a7c6",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "a0428a75bebb43cecc1345af171a5fd084928bf2ab06b0caed530ee62e6595fd",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-21T15:57:23",
              "not_before": "2025-10-21T15:57:23"
            },
            "version": 2
          },
          "fingerprint_sha256": "9EE614AEBD7054B0A12348108CDCF5FB81A1AFE67B98E2D99E7E1053BB3843E9",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2016-9589",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:4891/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T20:44:59.311Z"
    },
    {
      "port": 5000,
      "protocol": "tcp",
      "name": "http",
      "version": "0.12.2",
      "product": "Werkzeug httpd",
      "extra_info": "Python 3.6.2",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:python:python:3.6.2",
          "part": "a",
          "vendor": "python",
          "product": "python",
          "version": "3\\.6\\.2",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -550515461,
          "body_sha256": "32bf69dec47234b57b2fd5d8482c8ca3868a9e7fde6c4b89e3572617e0e39aa7",
          "component": [
            "MySQL",
            "Liveinternet",
            "Adobe ColdFusion",
            "Ruby",
            "Bugzilla:5.0.1",
            "PHP",
            "Microsoft ASP.NET",
            "WordPress",
            "CFML",
            "Symfony",
            "BEM",
            "Django",
            "Python",
            "Perl",
            "Ruby on Rails",
            "SPIP:4.1.11",
            "Roadiz CMS:1.2.36"
          ],
          "content_length": 128490,
          "headers": {
            "content_length": [
              "128490"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Tue, 28 Oct 2025 05:54:17 GMT"
            ],
            "server": [
              "WSGIServer/0.2 CPython/3.9.6"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Welcome to Steam"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2007-4559",
          "severity": "medium"
        },
        {
          "id": "CVE-2013-0340",
          "severity": "medium"
        },
        {
          "id": "CVE-2017-17522",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:5000/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T06:10:06.907Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T22:13:40.506Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T09:35:38.428Z"
    },
    {
      "port": 5671,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "lighttpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:lighttpd:lighttpd",
          "part": "a",
          "vendor": "lighttpd",
          "product": "lighttpd",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -2103571736,
          "body_sha256": "b163ac570a76e03b76731cc4b72010c68faf3a79a994c0674126b4fb25bbc065",
          "component": [
            "WordPress",
            "MySQL",
            "CFML",
            "Perl",
            "Ruby on Rails",
            "Ruby",
            "Roadiz CMS:1.2.36",
            "Bugzilla:5.0.1",
            "Liveinternet",
            "BEM",
            "PHP",
            "Microsoft ASP.NET",
            "Django",
            "Python",
            "Adobe ColdFusion",
            "Symfony",
            "SPIP:4.1.11"
          ],
          "content_length": 129528,
          "headers": {
            "content_length": [
              "129528"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 08:49:40 GMT"
            ],
            "server": [
              "squid/3.5.20"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Watson Management Console"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "index": [
            "Products"
          ],
          "jvm": [],
          "lucene": [],
          "system": [],
          "vm": []
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:5671/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T08:50:13.42Z"
    },
    {
      "port": 5984,
      "protocol": "tcp",
      "name": "http",
      "version": "2.2.2",
      "product": "Mbedthis-Appweb",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mbedthis:appweb:2.2.2",
          "part": "a",
          "vendor": "mbedthis",
          "product": "appweb",
          "version": "2\\.2\\.2",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:vmware:ESXi:6.5.0",
          "part": "o",
          "vendor": "vmware",
          "product": "esxi",
          "version": "6\\.5\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "couchdb": {
          "databases": [
            "_replicator",
            "_users",
            "admin",
            "passwords",
            "core-configuration",
            "core-locales",
            "core-photos",
            "core-tasks",
            "fml",
            "mcx",
            "mlkvljnah",
            "mllbqddlikk",
            "mzpp",
            "nsjl",
            "oqulw",
            "pmbt",
            "qys",
            "todv",
            "user00230",
            "user00400",
            "user02030",
            "user02212",
            "user03200",
            "user21212",
            "user22100",
            "user22402",
            "user23122",
            "user23213",
            "user23421",
            "user24022",
            "user31210",
            "user33212",
            "user33233",
            "user40114",
            "user40430",
            "user42341",
            "vfl",
            "wryknmigdtx",
            "wtpl"
          ],
          "version": "1.6.1"
        },
        "http": {
          "body_murmur": 1033467107,
          "body_sha256": "84c1b0de24fe7c380a9eaf1a23043033d282cce52b3143f99ba221bf5ccc95c8",
          "component": [
            "Erlang: otp/17",
            "CouchDB:1.6.1"
          ],
          "content_length": 32,
          "favicon": {
            "md5_hash": "2981503b195488ac17d05dcf18615cd1",
            "murmur_hash": -1439222863,
            "path": "http://8.215.15.163:5984/favicon.ico",
            "size": 1150
          },
          "headers": {
            "content_length": [
              "32"
            ],
            "content_type": [
              "application/json"
            ],
            "date": [
              "Fri, 31 Oct 2025 12:35:34 GMT"
            ],
            "server": [
              "CouchDB/1.6.1 (Erlang OTP/17)"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2022-31681",
          "severity": "medium"
        },
        {
          "id": "CVE-2023-29552",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:5984/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T12:36:09.663Z"
    },
    {
      "port": 6000,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -1871824688,
          "body_sha256": "5881b8d9719b3f27691b6e46e32e5375e019b7a2bd236a979448a1b557b212a4",
          "component": [
            "PHP",
            "Django",
            "WordPress",
            "Perl",
            "BEM",
            "Ruby",
            "Symfony",
            "Liveinternet",
            "MySQL",
            "Bugzilla:5.0.1",
            "CFML",
            "Microsoft ASP.NET",
            "Adobe ColdFusion",
            "Python",
            "Ruby on Rails",
            "SPIP:4.1.11",
            "Roadiz CMS:1.2.36"
          ],
          "content_length": 127393,
          "headers": {
            "content_length": [
              "127393"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 16 Oct 2025 16:43:08 GMT"
            ],
            "server": [
              "WCY_WEBServer/1.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "TEWA-708G"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "24699EF1C373610412F6017731874C3F",
            "fingerprint_sha1": "EF5C07DE0AF849D6F9F230E061696DD083BE4933",
            "fingerprint_sha256": "2F00148A717BFDFE501DE99087DD54B28076ED16F3F92E46C3F20A9D57FCDCE4",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "QA"
              ],
              "domain_component": [
                "JF",
                "local"
              ],
              "organization": [
                "ZVHTCXLN"
              ],
              "organizational_unit": [
                "OTMOQPD"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "6275922371139966208",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "QA"
              ],
              "domain_component": [
                "JF",
                "local"
              ],
              "organization": [
                "ZVHTCXLN"
              ],
              "organizational_unit": [
                "OTMOQPD"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "f9454828649386b8e4bc71ef15c6818ba4f330187b112dca6edf5307ab1895fe",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "de6f7d585a5fbda6e488e5abf9f8dd31530f31700b4b40580a04ef3be422b3ac",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-16T20:17:33",
              "not_before": "2025-10-16T20:17:33"
            },
            "version": 2
          },
          "fingerprint_sha256": "2F00148A717BFDFE501DE99087DD54B28076ED16F3F92E46C3F20A9D57FCDCE4",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:6000/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T20:58:38.194Z"
    },
    {
      "port": 6379,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mortbay:jetty:winstone-2.9",
          "part": "a",
          "vendor": "mortbay",
          "product": "jetty",
          "version": "winstone\\-2\\.9",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 838640087,
          "body_sha256": "fa8005a46259e687ba8eca3eae1e19920466d1ccaac283d71568f86492dcd3b9",
          "component": [
            "Perl",
            "Microsoft ASP.NET",
            "MySQL",
            "PHP",
            "BEM",
            "WordPress",
            "SPIP:4.1.11",
            "Apache HTTP Server",
            "Python",
            "Adobe ColdFusion",
            "Roadiz CMS:1.2.36",
            "Liveinternet",
            "Django",
            "Bugzilla:5.0.1",
            "Symfony",
            "CFML",
            "Ruby on Rails",
            "Ruby"
          ],
          "content_length": 128501,
          "favicon": {
            "md5_hash": "1f52cc8ce9a3ab7ea704820f5f6a185e",
            "murmur_hash": -1033644073,
            "path": "http://8.215.15.163:6379/favicon.ico",
            "size": 3774
          },
          "headers": {
            "content_length": [
              "128501"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 27 Oct 2025 00:39:38 GMT"
            ],
            "server": [
              "uc-httpd/1.0.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Redirecting to OrientDB Studio..."
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "redis": {
          "arch_bits": "64",
          "build_id": "fac228d1928e92e0",
          "gcc_version": "4.4.7",
          "git_sha1": "00000000",
          "major": 2,
          "mem_allocator": "jemalloc-3.6.0",
          "minor": 8,
          "mode": "standalone",
          "os": "Linux 2.6.32-220.7.1.el6.x86_64 x86_64",
          "patchlevel": 17,
          "total_commands_processed": 9248144,
          "total_connections_received": 41002,
          "uptime_in_seconds": 13212977,
          "used_memory": 125657656,
          "version": "2.8.17"
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:6379/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T00:40:05.327Z"
    },
    {
      "port": 6443,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -433999369,
          "body_sha256": "19c6cf573a1da5f07d642da0548ac49821334d499e9b28c581a3d2197891b6be",
          "component": [
            "BEM",
            "Perl",
            "MySQL",
            "CFML",
            "Bugzilla:5.0.1",
            "Microsoft ASP.NET",
            "Liveinternet",
            "Symfony",
            "WordPress",
            "Adobe ColdFusion",
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "PHP",
            "Django",
            "Python",
            "Ruby on Rails",
            "Ruby"
          ],
          "content_length": 129532,
          "headers": {
            "content_length": [
              "129532"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 06:41:38 GMT"
            ],
            "server": [
              "yawcam/0.6.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Dashboard        Ginkgo        Gingko"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "http://8.215.15.163:6443/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T08:38:18.139Z"
    },
    {
      "port": 7574,
      "protocol": "tcp",
      "name": "echo",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T07:13:49.486Z"
    },
    {
      "port": 8000,
      "protocol": "tcp",
      "name": "http",
      "version": "1.15.12",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.15.12",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.15\\.12",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 821593799,
          "body_sha256": "a2ed5f9d31ee2454f46e58f2b194f27e6b21a235b060147c77d0a92a9fd50b92",
          "component": [
            "Django",
            "PHP",
            "Adobe ColdFusion",
            "CFML",
            "Ruby on Rails",
            "Ruby",
            "Microsoft ASP.NET",
            "Liveinternet",
            "WordPress",
            "BEM",
            "Symfony",
            "SPIP:4.1.11",
            "Bugzilla:5.0.1",
            "Perl",
            "Roadiz CMS:1.2.36",
            "Python",
            "MySQL"
          ],
          "content_length": 129507,
          "favicon": {
            "md5_hash": "6220f00b190723200494ffaa4dc8c00a",
            "murmur_hash": 1592926977,
            "path": "http://8.215.15.163:8000/favicon.ico",
            "size": 7457
          },
          "headers": {
            "content_length": [
              "129507"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 02:56:06 GMT"
            ],
            "server": [
              "sw-cp-server"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "SWeb"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "2013BF7686D99FDD49FABA80B9882ACD",
            "fingerprint_sha1": "D6251415A5CA2E73868BF378966F8646F1E284EE",
            "fingerprint_sha256": "5AC96B62B09DEC2C34BE172D99C2F19EC5CA7A68FD2E4FF1FD578CDBA38D5A21",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CK"
              ],
              "domain_component": [
                "GO",
                "local"
              ],
              "organization": [
                "YARFVKQB"
              ],
              "organizational_unit": [
                "FRZRKTP"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2504068223398438255",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CK"
              ],
              "domain_component": [
                "GO",
                "local"
              ],
              "organization": [
                "YARFVKQB"
              ],
              "organizational_unit": [
                "FRZRKTP"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "23aeeaeda4abc08a1d161ed34fd3f0f4ba85dbcd73af803f87a60b315f9060b4",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "d605ca3403b42bc22f407487920f0cafa2ebb443ca12e721bfca3fb4024a5c0d",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-31T13:53:04",
              "not_before": "2025-10-31T13:53:04"
            },
            "version": 2
          },
          "fingerprint_sha256": "5AC96B62B09DEC2C34BE172D99C2F19EC5CA7A68FD2E4FF1FD578CDBA38D5A21",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:8000/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T17:26:11.822Z"
    },
    {
      "port": 8080,
      "protocol": "tcp",
      "name": "socks5",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body_murmur": -841964987,
          "body_sha256": "7d6d36e973f1401cddd17e40b84903e2e68282f9af6846bf01caa6177b1ad9b5",
          "component": [
            "CFML",
            "Liveinternet",
            "Python",
            "Django",
            "Perl",
            "BEM",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "SPIP:4.1.11",
            "MySQL",
            "PHP",
            "Microsoft ASP.NET",
            "Ruby",
            "Symfony",
            "Adobe ColdFusion",
            "WordPress",
            "Bugzilla:5.0.1"
          ],
          "content_length": 127400,
          "headers": {
            "content_length": [
              "127400"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 20 Oct 2025 19:38:33 GMT"
            ],
            "server": [
              "MoxaHttp/1.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Perkons :: Login"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "1E3D52FC6FB9AD831C1484A79629B8D7",
            "fingerprint_sha1": "102513CABAEE59FE5B45921827BF6C8FB587846A",
            "fingerprint_sha256": "ED39E3C833CDB4A132FEC8BB0E0C8AA0AF3E7C038AF4FFE06B9F01750ECC012F",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "SH"
              ],
              "domain_component": [
                "VOD",
                "local"
              ],
              "organization": [
                "LCTBKCFL"
              ],
              "organizational_unit": [
                "MAYEEYW"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2194264244626179391",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "SH"
              ],
              "domain_component": [
                "VOD",
                "local"
              ],
              "organization": [
                "LCTBKCFL"
              ],
              "organizational_unit": [
                "MAYEEYW"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "b60ea5a8a63c5d513985579517fd8e2e2fd64bd790d2035caa68e3dd730f42a0",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "b7e3a93e34c7373189d9aeedf03a3913f63e476349e0c8283943e1dc1d942755",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-20T19:33:09",
              "not_before": "2025-10-20T19:33:09"
            },
            "version": 2
          },
          "fingerprint_sha256": "ED39E3C833CDB4A132FEC8BB0E0C8AA0AF3E7C038AF4FFE06B9F01750ECC012F",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:8080/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T14:14:28.374Z"
    },
    {
      "port": 8086,
      "protocol": "tcp",
      "name": "http",
      "version": "9.3.z-SNAPSHOT",
      "product": "Jetty",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mortbay:jetty:9.3.z-snapshot",
          "part": "a",
          "vendor": "mortbay",
          "product": "jetty",
          "version": "9\\.3\\.z\\-snapshot",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 940880876,
          "body_sha256": "5d4f7f37a4e77b60decf7aca494a5d7941e2112ecb1d05a33e3a007a1d2d9c81",
          "component": [
            "Java",
            "Django",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "Symfony",
            "SPIP:4.1.11",
            "Jetty:9.4.33",
            "CFML",
            "PHP",
            "Perl",
            "BEM",
            "MySQL",
            "Ruby",
            "Microsoft ASP.NET",
            "Liveinternet",
            "Adobe ColdFusion",
            "WordPress",
            "Python",
            "Bugzilla:5.0.1"
          ],
          "content_length": 128458,
          "headers": {
            "content_length": [
              "128458"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 23 Oct 2025 10:51:10 GMT"
            ],
            "server": [
              "Jetty(9.4.33.v20201020)"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "verysync"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:8086/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-23T14:55:50.296Z"
    },
    {
      "port": 8087,
      "protocol": "tcp",
      "name": "echo",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body_murmur": -651626514,
          "body_sha256": "99912de76e076dbffa1968a50c8e4b841697a2ccec7552b12d585f03fedf4bf1",
          "component": [
            "CFML",
            "Django",
            "Python",
            "Ruby on Rails",
            "Symfony",
            "SPIP:4.1.11",
            "Adobe ColdFusion",
            "Bugzilla:5.0.1",
            "BEM",
            "Ruby",
            "Microsoft ASP.NET",
            "Liveinternet",
            "WordPress",
            "PHP",
            "Roadiz CMS:1.2.36",
            "Perl",
            "MySQL"
          ],
          "content_length": 127442,
          "headers": {
            "content_length": [
              "127442"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 18 Oct 2025 23:55:31 GMT"
            ],
            "server": [
              "Embedded HTTP Server"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "TransPort WR11 (SN: 728533) Configuration and Management"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "456B66523582651A309058E2C2DDAA65",
            "fingerprint_sha1": "90A52216A6D5D8041114AD3E881D41351B4A2537",
            "fingerprint_sha256": "EEED0812AF74BFBE86FD7E805D71A43EA94431E4075DB8B99E93471C903FB340",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "FO"
              ],
              "domain_component": [
                "vsphere",
                "local"
              ],
              "organization": [
                "KCUEPHPY"
              ],
              "organizational_unit": [
                "VMware Engineering"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1997498410884735879",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "FO"
              ],
              "domain_component": [
                "vsphere",
                "local"
              ],
              "organization": [
                "KCUEPHPY"
              ],
              "organizational_unit": [
                "VMware Engineering"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "d0d21b97f712a8903f310a0653ff282a0b6c4632f261193ac1704e33c68cfdf7",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "6c217b052623387821d9fab157b3cadd9d421fe35fcbfeae77069af27767926a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-18T22:08:34",
              "not_before": "2025-10-18T22:08:34"
            },
            "version": 2
          },
          "fingerprint_sha256": "EEED0812AF74BFBE86FD7E805D71A43EA94431E4075DB8B99E93471C903FB340",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:8087/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T12:02:10.044Z"
    },
    {
      "port": 8500,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "consul": {
          "build_date": "2024-10-14T20:52:01Z",
          "datacenter": "dc1",
          "node_id": "e5ad94e9-c381-5717-4b0c-2166fc0bb30b",
          "node_name": "lvmkl",
          "primary_datacenter": "dc1",
          "revision": "cddc6181",
          "server": true,
          "version": "1.20.0"
        },
        "http": {
          "body_murmur": 407360544,
          "body_sha256": "71c89c74cc0c380459fe5172ae15929f269a06ae43946a4f8f56b72f51e2f4e0",
          "component": [
            "Bugzilla:5.0.1",
            "Adobe ColdFusion",
            "Liveinternet",
            "Ruby",
            "SimpleHTTP:0.6",
            "Python:2.7.16",
            "Perl",
            "CFML",
            "Ruby on Rails",
            "BEM",
            "MySQL",
            "Symfony",
            "Django",
            "Roadiz CMS:1.2.36",
            "Microsoft ASP.NET",
            "SPIP:4.1.11",
            "WordPress",
            "PHP"
          ],
          "content_length": 128200,
          "headers": {
            "content_length": [
              "128200"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 13 Oct 2025 21:03:46 GMT"
            ],
            "server": [
              "SimpleHTTP/0.6 Python/2.7.16"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "OGNL Console"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:8500/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T12:22:03.149Z"
    },
    {
      "port": 8883,
      "protocol": "tcp",
      "name": "mqtt",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "ssl",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T00:04:13.653Z"
    },
    {
      "port": 8983,
      "protocol": "tcp",
      "name": "echo",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd00038bffef2e0e3abf6e0e80edf937df92a",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T23:18:56.929Z"
    },
    {
      "port": 9042,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "Brother/HP printer http admin",
      "tunnel": "",
      "modules": {
        "http": {
          "body_murmur": -872037748,
          "body_sha256": "6c3b651bf187c5c6be96c1b330609ea16ab238c54b3759f31f40fac513b2713a",
          "component": [
            "WordPress",
            "PHP",
            "Django",
            "SPIP:4.1.11",
            "CFML",
            "BEM",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "Liveinternet",
            "Bugzilla:5.0.1",
            "Perl",
            "Ruby",
            "Adobe ColdFusion",
            "MySQL",
            "Python",
            "Microsoft ASP.NET",
            "Symfony"
          ],
          "content_length": 128485,
          "favicon": {
            "md5_hash": "c87bab9d4a9129f7d2e97044dbae6793",
            "murmur_hash": -399311436,
            "path": "http://8.215.15.163:9042/favicon.ico",
            "size": 4286
          },
          "headers": {
            "content_length": [
              "128485"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Tue, 28 Oct 2025 07:03:23 GMT"
            ],
            "server": [
              "LSWebServer/1.0.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "AnyBackup"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "index": [
            "Products"
          ],
          "jvm": [],
          "lucene": [],
          "system": [],
          "vm": []
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:9042/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T11:14:48.495Z"
    },
    {
      "port": 9092,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:cherokee-project:cherokee:0.99.9",
          "part": "a",
          "vendor": "cherokee\\-project",
          "product": "cherokee",
          "version": "0\\.99\\.9",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1761063802,
          "body_sha256": "a22fd40f6fbe6cbbd4531cc6fc29c5dc6de94289c0f291a7724e7afa4ec93df8",
          "component": [
            "Adobe ColdFusion",
            "CFML",
            "Symfony",
            "Microsoft ASP.NET",
            "PHP",
            "Python",
            "SPIP:4.1.11",
            "WordPress",
            "Django",
            "Liveinternet",
            "Ruby on Rails",
            "Ruby",
            "Bugzilla:5.0.1",
            "Perl",
            "MySQL",
            "BEM",
            "Roadiz CMS:1.2.36"
          ],
          "content_length": 128489,
          "favicon": {
            "md5_hash": "1dcc55aa6f973801b0252f6304e6dc1c",
            "murmur_hash": -1750461220,
            "path": "http://8.215.15.163:9092/favicon.ico",
            "size": 6772
          },
          "headers": {
            "content_length": [
              "128489"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 27 Oct 2025 13:55:41 GMT"
            ],
            "server": [
              "Unknown"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "博华网龙防火墙"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2009-4489",
          "severity": "medium"
        },
        {
          "id": "CVE-2011-2190",
          "severity": "low"
        },
        {
          "id": "CVE-2011-2191",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:9092/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T16:59:45.297Z"
    },
    {
      "port": 9093,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:twistedmatrix:twistedweb:12.1.0",
          "part": "a",
          "vendor": "twistedmatrix",
          "product": "twistedweb",
          "version": "12\\.1\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -1695048729,
          "body_sha256": "c1a6844e68c2c35ce49caee0b2a15257ee04b90a9acc7e3c4b4a56356d334271",
          "component": [
            "Python",
            "CFML",
            "Symfony",
            "WordPress",
            "PHP",
            "Microsoft ASP.NET",
            "Liveinternet",
            "BEM",
            "Adobe ColdFusion",
            "Bugzilla:5.0.1",
            "MySQL",
            "Django",
            "Roadiz CMS:1.2.36",
            "Perl",
            "Ruby on Rails",
            "Ruby",
            "SPIP:4.1.11"
          ],
          "content_length": 129507,
          "favicon": {
            "md5_hash": "6220f00b190723200494ffaa4dc8c00a",
            "murmur_hash": 1592926977,
            "path": "http://8.215.15.163:9093/favicon.ico",
            "size": 7457
          },
          "headers": {
            "content_length": [
              "129507"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 01:41:37 GMT"
            ],
            "server": [
              "LIVE555 Streaming Media v2020.04.24"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "D401"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:9093/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T01:42:04.253Z"
    },
    {
      "port": 9200,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Lotus Domino httpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:ibm:lotus_domino_web_server",
          "part": "a",
          "vendor": "ibm",
          "product": "lotus_domino_web_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:vmware:ESXi:6.5.0",
          "part": "o",
          "vendor": "vmware",
          "product": "esxi",
          "version": "6\\.5\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "elasticsearch": {
          "index": [
            {
              "count": "16051803",
              "name": "logs-2024",
              "size": "4.9gb"
            },
            {
              "count": "10248228",
              "name": "logs-2023",
              "size": "3.2gb"
            },
            {
              "count": "4629250332",
              "name": "data-2024",
              "size": "6.4tb"
            }
          ],
          "info": {
            "cluster_name": "elasticsearch",
            "cluster_uuid": "",
            "name": "Blob",
            "tagline": "You Know, for Search",
            "version": {
              "build_hash": "05d4530971ef0ea46d0f4fa6ee64dbc8df659682",
              "lucene_version": "4.10.4",
              "number": "1.7.3"
            }
          }
        },
        "http": {
          "body_murmur": 1589257397,
          "body_sha256": "3db479be0c09198605e2f8c1cc34676a4954f80aacfd0c0a21aea11ef115e847",
          "content_length": 316,
          "favicon": {
            "md5_hash": "44071663a97aa46640d124dd31fe7521",
            "murmur_hash": 2091717113,
            "path": "http://8.215.15.163:9200/favicon.ico",
            "size": 7659
          },
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_disposition": [
              "Content-Disposition"
            ],
            "content_length": [
              "316"
            ],
            "content_type": [
              "application/json"
            ],
            "date": [
              "Fri, 31 Oct 2025 06:27:52 GMT"
            ],
            "pragma": [
              "private"
            ],
            "server": [
              "http-daemon"
            ],
            "set_cookie": [
              "SESSID=da122263a2bd; webvpnLang=webvpnLang"
            ],
            "unknown": [
              {
                "key": "x_cache",
                "value": [
                  "MISS from Hello"
                ]
              },
              {
                "key": "x_content_powered_by",
                "value": [
                  "K2 v2.8.0 (by JoomlaWor"
                ]
              },
              {
                "key": "x_drupal_cache",
                "value": [
                  "xHIT"
                ]
              },
              {
                "key": "x_drupal_dynamic_cache",
                "value": [
                  "MISS"
                ]
              },
              {
                "key": "x_cache_lookup",
                "value": [
                  "MISS from Hello:8080"
                ]
              },
              {
                "key": "x_generator",
                "value": [
                  "Drupal 8 (https://www.drupal.org)"
                ]
              },
              {
                "key": "x_jenkins",
                "value": [
                  "2.121.3"
                ]
              },
              {
                "key": "x_jenkins_session",
                "value": [
                  "f72d6619"
                ]
              }
            ],
            "x_powered_by": [
              "PHP/4.6.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2022-31681",
          "severity": "medium"
        },
        {
          "id": "CVE-2023-29552",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:9200/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T06:28:21.642Z"
    },
    {
      "port": 10250,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1179458469,
          "body_sha256": "62dc9ac19046df84652e2dbb9c70ae2e908d1eece901f983dd06e5f0a04582e3",
          "component": [
            "WordPress",
            "Ruby",
            "SPIP:4.1.11",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "Adobe ColdFusion",
            "CFML",
            "BEM",
            "Django",
            "PHP",
            "Microsoft ASP.NET",
            "Bugzilla:5.0.1",
            "Symfony",
            "MySQL",
            "Liveinternet",
            "Python",
            "Perl"
          ],
          "content_length": 127305,
          "favicon": {
            "md5_hash": "b89adb697c786ef4c9553d2caf9fc409",
            "murmur_hash": -17306567,
            "path": "http://8.215.15.163:10250/favicon.ico",
            "size": 827
          },
          "headers": {
            "content_length": [
              "127305"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 10 Oct 2025 11:43:56 GMT"
            ],
            "server": [
              "infosec/1.0.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "KACO new energy"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:10250/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T18:18:36.522Z"
    },
    {
      "port": 11211,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -253881401,
          "body_sha256": "dc54cb66104e698621549f472f6146101efaf40cd475a88716a6a70cea83bcfa",
          "component": [
            "BEM",
            "MySQL",
            "Python",
            "SPIP:4.1.11",
            "Bugzilla:5.0.1",
            "PHP",
            "Liveinternet",
            "Perl",
            "WordPress",
            "Microsoft ASP.NET",
            "Ruby on Rails",
            "Ruby",
            "Django",
            "Adobe ColdFusion",
            "CFML",
            "Roadiz CMS:1.2.36",
            "Symfony"
          ],
          "content_length": 127301,
          "favicon": {
            "md5_hash": "6220f00b190723200494ffaa4dc8c00a",
            "murmur_hash": 1592926977,
            "path": "http://8.215.15.163:11211/favicon.ico",
            "size": 7457
          },
          "headers": {
            "content_length": [
              "127301"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 10 Oct 2025 10:22:15 GMT"
            ],
            "server": [
              "APPWebs/"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "WTM"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "memcached": {
          "settings": {
            "accepting_conns": "1",
            "auth_cmds": "0",
            "auth_errors": "0",
            "bytes": "29828",
            "bytes_read": "286857265",
            "bytes_written": "129670828957",
            "cas_badval": "0",
            "cas_hits": "0",
            "cas_misses": "0",
            "cmd_flush": "3",
            "cmd_get": "22076096",
            "cmd_set": "21",
            "cmd_touch": "0",
            "conn_yields": "0",
            "connection_structures": "55",
            "curr_connections": "8",
            "curr_items": "5",
            "decr_hits": "0",
            "decr_misses": "0",
            "delete_hits": "0",
            "delete_misses": "0",
            "evicted_unfetched": "0",
            "evictions": "0",
            "expired_unfetched": "0",
            "get_hits": "22076066",
            "get_misses": "30",
            "hash_bytes": "524288",
            "hash_power_level": "16",
            "incr_hits": "0",
            "incr_misses": "0",
            "libevent": "2.0.16-stable",
            "limit_maxbytes": "67108864",
            "listen_disabled_num": "0",
            "pid": "2080",
            "pointer_size": "64",
            "reclaimed": "3",
            "reserved_fds": "20",
            "rusage_system": "1839.982991",
            "rusage_user": "371.247201",
            "threads": "4",
            "time": "1520550684",
            "total_connections": "5547233",
            "total_items": "21",
            "touch_hits": "0",
            "touch_misses": "0",
            "uptime": "3151236",
            "version": "1.4.13"
          },
          "stats": {
            "accepting_conns": "1",
            "auth_cmds": "0",
            "auth_errors": "0",
            "bytes": "29828",
            "bytes_read": "286857265",
            "bytes_written": "129670828957",
            "cas_badval": "0",
            "cas_hits": "0",
            "cas_misses": "0",
            "cmd_flush": "3",
            "cmd_get": "22076096",
            "cmd_set": "21",
            "cmd_touch": "0",
            "conn_yields": "0",
            "connection_structures": "55",
            "curr_connections": "8",
            "curr_items": "5",
            "decr_hits": "0",
            "decr_misses": "0",
            "delete_hits": "0",
            "delete_misses": "0",
            "evicted_unfetched": "0",
            "evictions": "0",
            "expired_unfetched": "0",
            "get_hits": "22076066",
            "get_misses": "30",
            "hash_bytes": "524288",
            "hash_power_level": "16",
            "incr_hits": "0",
            "incr_misses": "0",
            "libevent": "2.0.16-stable",
            "limit_maxbytes": "67108864",
            "listen_disabled_num": "0",
            "pid": "2080",
            "pointer_size": "64",
            "reclaimed": "3",
            "reserved_fds": "20",
            "rusage_system": "1839.982991",
            "rusage_user": "371.247201",
            "threads": "4",
            "time": "1520550684",
            "total_connections": "5547233",
            "total_items": "21",
            "touch_hits": "0",
            "touch_misses": "0",
            "uptime": "3151236",
            "version": "1.4.13"
          }
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F770C34CF6182B1593949B1D7E2015C6",
            "fingerprint_sha1": "90D8756A2099AFC3F8ECC07A765988EA86584188",
            "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "4003600835069022506",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "CR"
              ],
              "domain_component": [
                "QSUPV",
                "local"
              ],
              "organization": [
                "YWSIMBXC"
              ],
              "organizational_unit": [
                "PKCWLBU"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e09693c0b3d1e693c6f43083870f7dd867f31eb270d99fc1b40197738de366ec",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "dbc99e5c078d640d63ac456a1e9d5964fa2dca83daa15d9d96d637f175b9e472",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-05T15:19:41",
              "not_before": "2025-10-05T15:19:41"
            },
            "version": 2
          },
          "fingerprint_sha256": "7F2CF185EDC0D11DAC332D2E4D94C086E832B0D72221D9C242479553B451A57E",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:11211/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T14:20:24.877Z"
    },
    {
      "port": 11434,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Apache httpd",
      "extra_info": "Red Hat Linux",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 327136018,
          "body_sha256": "3aacf594d972ff1d4f99d9806489fc40da549b2e5880eeb37f38b67347d7cc2b",
          "component": [
            "MySQL",
            "Liveinternet",
            "Python",
            "WordPress",
            "Bugzilla:5.0.1",
            "Perl",
            "Ruby",
            "Adobe ColdFusion",
            "CFML",
            "PHP",
            "BEM",
            "Django",
            "Microsoft ASP.NET",
            "Roadiz CMS:1.2.36",
            "Ruby on Rails",
            "SPIP:4.1.11",
            "Symfony"
          ],
          "content_length": 129511,
          "favicon": {
            "md5_hash": "c87bab9d4a9129f7d2e97044dbae6793",
            "murmur_hash": -399311436,
            "path": "http://8.215.15.163:11434/favicon.ico",
            "size": 4286
          },
          "headers": {
            "content_length": [
              "129511"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 13:31:42 GMT"
            ],
            "server": [
              "AirTunes/377.30.01"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "platform - Login"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "llm": {
          "models": [
            {
              "family": "qwen2",
              "name": "deepseek-r1:latest",
              "parameter_size": "7.6B"
            },
            {
              "family": "llama",
              "name": "llama3:8b-text-q4_K_S",
              "parameter_size": "8.0B"
            },
            {
              "family": "qwen2",
              "name": "qwen:latest",
              "parameter_size": "4B"
            },
            {
              "family": "llama",
              "name": "llama3:latest",
              "parameter_size": "8.0B"
            },
            {
              "family": "llama",
              "name": "mistral:latest",
              "parameter_size": "7.2B"
            }
          ],
          "platform": "ollama",
          "version": "0.1.33"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "2191E3C332236D805B79809755EB4FCE",
            "fingerprint_sha1": "051A504B90F6098ED8BF34787008E1835F5FEE73",
            "fingerprint_sha256": "CC4B853FC85152B6CDF38DE9E7A1D864DD0ECF37DB6CEBEDCCCA26F826E88F16",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "FM"
              ],
              "domain_component": [
                "AHYCXTYS",
                "local"
              ],
              "organization": [
                "SXQBJXTS"
              ],
              "organizational_unit": [
                "GNPQTJW"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2420601775281117484",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "FM"
              ],
              "domain_component": [
                "AHYCXTYS",
                "local"
              ],
              "organization": [
                "SXQBJXTS"
              ],
              "organizational_unit": [
                "GNPQTJW"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "71e33829f62f8ffc0408a5c97841cd271f874e8331a7a8bf7db93b572645953d",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "ec288a03c12c4f22b5fc57aae0736e3324ae353ccb1b767b3e257d61a9ebb5f4",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-21T10:58:12",
              "not_before": "2025-10-21T10:58:12"
            },
            "version": 2
          },
          "fingerprint_sha256": "CC4B853FC85152B6CDF38DE9E7A1D864DD0ECF37DB6CEBEDCCCA26F826E88F16",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0070",
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1199",
          "severity": "high"
        },
        {
          "id": "CVE-2023-25690",
          "severity": "critical"
        }
      ],
      "url": "https://8.215.15.163:11434/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T13:32:04.457Z"
    },
    {
      "port": 15671,
      "protocol": "tcp",
      "name": "http",
      "version": "8",
      "product": "JBoss WildFly Application Server",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:redhat:jboss_wildfly_application_server:8",
          "part": "a",
          "vendor": "redhat",
          "product": "jboss_wildfly_application_server",
          "version": "8",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -955159611,
          "body_sha256": "5fc577021f7113851d8ef79e402f2949d55a9bde9e45b8402e903696e1c3a243",
          "component": [
            "Bugzilla:5.0.1",
            "BEM",
            "SPIP:4.1.11",
            "Microsoft ASP.NET",
            "PHP",
            "MySQL",
            "Ruby on Rails",
            "Roadiz CMS:1.2.36",
            "Python",
            "Liveinternet",
            "CFML",
            "WordPress",
            "Symfony",
            "Django",
            "Perl",
            "Adobe ColdFusion",
            "Ruby"
          ],
          "content_length": 129515,
          "headers": {
            "content_length": [
              "129515"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 31 Oct 2025 07:10:26 GMT"
            ],
            "server": [
              "RealtronWebServer1.1"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Endpoint Security Required"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2016-9589",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:15671/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-31T07:10:57.008Z"
    },
    {
      "port": 15672,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-25T23:17:56.06Z"
    },
    {
      "port": 20000,
      "protocol": "tcp",
      "name": "java-rmi",
      "version": "",
      "product": "Java RMI",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "dnp3": {
          "raw": "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"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T03:16:45.066Z"
    },
    {
      "port": 27017,
      "protocol": "tcp",
      "name": "http",
      "version": "v4.30.1161 (release)",
      "product": "Tracer SC",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:lighttpd:lighttpd:1.4.61",
          "part": "a",
          "vendor": "lighttpd",
          "product": "lighttpd",
          "version": "1\\.4\\.61",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -2026044290,
          "body_sha256": "b222aea2d6831fba8ca0f926b9a6be0bb17062874916c09f6932996e3e50fbbc",
          "component": [
            "Perl",
            "Python",
            "WordPress",
            "MySQL",
            "Ruby",
            "Microsoft ASP.NET",
            "Django",
            "PHP",
            "BEM",
            "CFML",
            "Ruby on Rails",
            "Symfony",
            "SPIP:4.1.11",
            "Bugzilla:5.0.1",
            "Liveinternet",
            "Adobe ColdFusion",
            "Roadiz CMS:1.2.36"
          ],
          "content_length": 128494,
          "favicon": {
            "md5_hash": "44071663a97aa46640d124dd31fe7521",
            "murmur_hash": 2091717113,
            "path": "http://8.215.15.163:27017/favicon.ico",
            "size": 7659
          },
          "headers": {
            "content_length": [
              "128494"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 30 Oct 2025 01:54:53 GMT"
            ],
            "server": [
              "Restlet-Framework/3.0m1"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "IVSWeb 2.0 - Welcome"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "mongodb": {
          "allocator": "tcmalloc",
          "bits": 64,
          "databases": [
            {
              "empty": false,
              "name": "admin",
              "size_on_disk": 1201002
            },
            {
              "empty": false,
              "name": "local",
              "size_on_disk": 2201002
            },
            {
              "empty": false,
              "name": "xdatnlab",
              "size_on_disk": 22900002
            }
          ],
          "dist_arch": "x86_64",
          "dist_mod": "",
          "git_version": "a2d97db8fe449d15eb8e275bbf318491781472bf",
          "is_master": true,
          "javascript_engine": "mozjs",
          "logical_session_timeout_minutes": 0,
          "max_bson_object_size": 16777216,
          "max_message_size_bytes": 48000000,
          "max_wire_version": 5,
          "max_write_batch_size": 1000,
          "read_only": false,
          "storage_engines": [
            "devnull",
            "ephemeralForTest",
            "mmapv1",
            "wiredTiger"
          ],
          "sys_info": "deprecated",
          "target_arch": "x86_64",
          "target_os": "linux",
          "total_size": 26302006,
          "version": "2.2.3"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2022-22707",
          "severity": "medium"
        },
        {
          "id": "CVE-2022-41556",
          "severity": "high"
        }
      ],
      "url": "https://8.215.15.163:27017/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T01:55:20.171Z"
    },
    {
      "port": 27018,
      "protocol": "tcp",
      "name": "http",
      "version": "1.12",
      "product": "Medusa httpd",
      "extra_info": "Supervisor process manager",
      "tunnel": "",
      "modules": {
        "http": {
          "body_murmur": -1139232375,
          "body_sha256": "3eba1542b6fac415aa17f0aebd9745d6bf68fe57d0cd585ee487c7246ac30f11",
          "component": [
            "SPIP:4.1.11",
            "Python",
            "PHP",
            "Adobe ColdFusion",
            "CFML",
            "Perl",
            "Symfony",
            "Java",
            "Django",
            "Liveinternet",
            "MySQL",
            "BEM",
            "Ruby on Rails",
            "Ruby",
            "Jetty",
            "Bugzilla:5.0.1",
            "Microsoft ASP.NET",
            "WordPress",
            "Roadiz CMS:1.2.36"
          ],
          "content_length": 128490,
          "headers": {
            "content_length": [
              "128490"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Mon, 27 Oct 2025 04:20:42 GMT"
            ],
            "server": [
              "Jetty/5.1.x(Linux/2.6.26-2-686i386java/1.6.0_22"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Cisco RV340 VPN Router"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "BECFAAEA43F5AC8BFE4A505C960DE00B",
            "fingerprint_sha1": "F2F72E8B9F0869D83E06DBA5CAB8ECD1D790B312",
            "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "jarm": "3fd3fd0000000000000003fd3fd43dc1859bcb372d875baffd7e59bce0dfba",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "8853807424567989378",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "NP"
              ],
              "domain_component": [
                "KDVXIJ",
                "local"
              ],
              "organization": [
                "FZHVLFAD"
              ],
              "organizational_unit": [
                "YXUVFVO"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "5478d8f93cac4ce0dadc73b535c92f819e1dad9fa35be42eba18daff23828651",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "0ac173378056a5cb37aa10d7b3a5b80d52faf99988c46040a432eac70e4f5d2a",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-22T08:15:10",
              "not_before": "2025-10-22T08:15:10"
            },
            "version": 2
          },
          "fingerprint_sha256": "F448358DC55A331FF72951C020C99C4C5A6CD6D98DB2CF5F877E9E91706A870D",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://8.215.15.163:27018/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-27T04:21:36.226Z"
    },
    {
      "port": 27019,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 1058133294,
          "body_sha256": "916962f34bab780edea4acb3a6457ccd699299f6e9c034242755359a0036a744",
          "component": [
            "SPIP:4.1.11",
            "Roadiz CMS:1.2.36",
            "Symfony",
            "Adobe ColdFusion",
            "Django",
            "PHP",
            "Liveinternet",
            "Ruby on Rails",
            "Bugzilla:5.0.1",
            "Perl",
            "BEM",
            "WordPress",
            "MySQL",
            "Python",
            "Microsoft ASP.NET",
            "CFML",
            "Ruby"
          ],
          "content_length": 127393,
          "favicon": {
            "md5_hash": "83ad768167a370db201db71c482fc9e8",
            "murmur_hash": 2089307605,
            "path": "http://8.215.15.163:27019/favicon.ico",
            "size": 6114
          },
          "headers": {
            "content_length": [
              "127393"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 18 Oct 2025 18:38:19 GMT"
            ],
            "server": [
              "kngx/1.10.2"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "EAS系统登录"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "F5E0FC62BE5793A01E86806B24E648BE",
            "fingerprint_sha1": "C9F396DFF54200677A5B6DD8B067D67CD14E6986",
            "fingerprint_sha256": "C115CA8B702DBE104EA3FE43FCC13BAAFD90B424887339AF79D567B48257A4B7",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "AU"
              ],
              "domain_component": [
                "PIRYNYUO",
                "local"
              ],
              "organization": [
                "YVLUVLHG"
              ],
              "organizational_unit": [
                "DXUJNCL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "150879516429977520",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "AU"
              ],
              "domain_component": [
                "PIRYNYUO",
                "local"
              ],
              "organization": [
                "YVLUVLHG"
              ],
              "organizational_unit": [
                "DXUJNCL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "d57fdcadd13f3fe3bf76a43e78506391fdfe4819c4892094cf49048227ac5b7f",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "ec54b2a32d5ede324be896c733a644277849656bca6dfdac993b00ca2ddc8b52",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-18T17:00:57",
              "not_before": "2025-10-18T17:00:57"
            },
            "version": 2
          },
          "fingerprint_sha256": "C115CA8B702DBE104EA3FE43FCC13BAAFD90B424887339AF79D567B48257A4B7",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:27019/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-28T14:08:51.975Z"
    },
    {
      "port": 29092,
      "protocol": "tcp",
      "name": "sip-proxy",
      "version": "14.0.17",
      "product": "FreePBX",
      "extra_info": "Asterisk 15.7.4",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:sangoma:freepbx:14.0.17",
          "part": "a",
          "vendor": "sangoma",
          "product": "freepbx",
          "version": "14\\.0\\.17",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 60611902,
          "body_sha256": "8f0a062c2aab32d08f48ef1137aae307a3ed22ccf834cc9402993dade3776eee",
          "component": [
            "Microsoft ASP.NET",
            "Bugzilla:5.0.1",
            "Perl",
            "BEM",
            "Liveinternet",
            "SPIP:4.1.11",
            "Roadiz CMS:1.2.36",
            "WordPress",
            "Symfony",
            "CFML",
            "Python:3.5.3",
            "PHP",
            "Django",
            "Ruby on Rails",
            "SimpleHTTP:0.6",
            "Adobe ColdFusion",
            "Ruby",
            "MySQL"
          ],
          "content_length": 129521,
          "favicon": {
            "md5_hash": "c3ee66d45636052a69bab53600f2f878",
            "murmur_hash": 362091310,
            "path": "http://8.215.15.163:29092/favicon.ico",
            "size": 2086
          },
          "headers": {
            "content_length": [
              "129521"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Thu, 30 Oct 2025 17:45:54 GMT"
            ],
            "server": [
              "SimpleHTTP/0.6 Python/3.5.3"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "AppServ Open Project 9.3.0"
        },
        "influxdb": {
          "bind_address": "0.0.0.0:8088",
          "build_commit": "489de31b961831defa9f4173173337d4a6293909",
          "config": {
            "access_log_path": "/var/log/influxdb.access.log",
            "data_dir": "/usr/local/var/influxdb/data",
            "meta_dir": "/usr/local/var/influxdb/meta",
            "wal_dir": "/usr/local/var/influxdb/wal"
          },
          "databases": [
            "_internal",
            "web_database"
          ],
          "go": {
            "arch": "amd64",
            "max_process": 8,
            "os": "darwin",
            "version": "1.8.3"
          },
          "https_enabled": false,
          "network": {
            "host": "influxdb-2.local"
          },
          "version": "v2.1.1"
        },
        "qnap": {
          "config": {
            "firmware_build": "20190531",
            "firmware_version": "4.3.6",
            "force_ssl": "0",
            "msv2_supported": "0",
            "msv2web_enabled": "1",
            "nvr_enabled": "0",
            "qdownload_enabled": "2",
            "qmultimedia_enabled": "2",
            "qmusic_enabled": "0",
            "qphotos_enabled": "0",
            "qvideos_enabled": "0",
            "qweb_enabled": "1",
            "qweb_ssl_enabled": "1",
            "webfs_enabled": "1",
            "wfm2": "1"
          },
          "internal_model_name": "TS-X41",
          "qweb_port": 80,
          "qweb_ssl_port": 8081,
          "ssl_port": 443
        },
        "solrdb": {
          "directory": "D:\\Websites\\CrownSupply\\Solr\\Solr\\server\\solr",
          "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:47:52",
          "index": [
            "Products"
          ],
          "jvm": {
            "stats": "Oracle Corporation Java HotSpot(TM) 64-Bit Server VM",
            "version": "1.8.0_361 25.361-b09"
          },
          "lucene": {
            "impl_version": "7.6.0 719cde97f84640faa1e3525690d262946571245f - nknize - 2018-12-07 14:44:20",
            "spec_version": "7.6.0"
          },
          "system": {
            "arch": "amd64",
            "name": "Windows Server 2022",
            "uname": "admin",
            "version": "8.12"
          },
          "version": "7.6.0",
          "vm": {
            "name": "Java HotSpot(TM) 64-Bit Server VM",
            "vendor": "Oracle Corporation",
            "version": "25.361-b09"
          }
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": true,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              }
            },
            "fingerprint_md5": "FDE1CDCF5092644B27CE008858EA424C",
            "fingerprint_sha1": "E78FF3770981EA1B8BCDE8FD8C10E2C6882877B9",
            "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
            "issuer": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "jarm": "3fd3fd00000000000043d3fd3fd43dabbd511bda998fb779b8208e926c4a0b",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2635588764205870798",
            "signature": {
              "algorithm": {
                "name": "SHA512-RSA",
                "oid": "1.2.840.113549.1.1.13"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "localhost"
              ],
              "country": [
                "WF"
              ],
              "domain_component": [
                "SZHENUH",
                "local"
              ],
              "organization": [
                "GWBBJFCK"
              ],
              "organizational_unit": [
                "YBJHVWL"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "localhost"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "02ce587456fc1c5218e114c236574999e7710b89541e3e7a641839f3c56b22d1",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096
              }
            },
            "tbs_fingerprint": "fa9d9a1aa0a07469620ca3eb290113ecb44495cb40e2a095b295fae25670f698",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315532800,
              "not_after": "2035-10-29T08:50:13",
              "not_before": "2025-10-29T08:50:13"
            },
            "version": 2
          },
          "fingerprint_sha256": "CBA9017DBAA62986463A52F4834E7806EDCD90BBD113D388D10FB389D2E44CCD",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2018-15891",
          "severity": "medium"
        },
        {
          "id": "CVE-2019-19538",
          "severity": "high"
        },
        {
          "id": "CVE-2019-19851",
          "severity": "medium"
        }
      ],
      "url": "https://8.215.15.163:29092/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-10-30T22:57:59.868Z"
    }
  ],
  "services_hash": "c8707505cdca86d08d94880fdd73e5a133bba01e0456f931e4fbe9bd47db299b",
  "last_updated_at": "2025-10-31T20:44:59.311Z",
  "banner": [
    "http",
    "influxdb",
    "qnap",
    "solrdb",
    "tls",
    "mysql",
    "couchdb",
    "elasticsearch",
    "memcached",
    "mongodb",
    "ftp",
    "ssh",
    "telnet",
    "llm",
    "pop3",
    "smtp",
    "consul",
    "dnp3",
    "redis",
    "ipp",
    "mssql"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0070": {
      "id": "CVE-1999-0070",
      "references": [
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
      ],
      "score": 5,
      "services": [
        "11434/http"
      ],
      "severity": "medium",
      "summary": "test-cgi program allows an attacker to list files on the server.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1199": {
      "id": "CVE-1999-1199",
      "references": [
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "http://marc.info/?l=bugtraq&m=90252779826784&w=2",
        "http://marc.info/?l=bugtraq&m=90276683825862&w=2",
        "http://marc.info/?l=bugtraq&m=90280517007869&w=2",
        "http://marc.info/?l=bugtraq&m=90286768232093&w=2",
        "http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
        "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 10,
      "services": [
        "11434/http"
      ],
      "severity": "high",
      "summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "22/ssh"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2007-2768": {
      "id": "CVE-2007-2768",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/",
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/"
      ],
      "score": 4.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2007-4559": {
      "id": "CVE-2007-4559",
      "references": [
        "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
        "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
        "http://secunia.com/advisories/26623",
        "http://www.vupen.com/english/advisories/2007/3022",
        "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
        "https://security.gentoo.org/glsa/202309-06",
        "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
        "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
        "http://secunia.com/advisories/26623",
        "http://www.vupen.com/english/advisories/2007/3022",
        "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
        "https://security.gentoo.org/glsa/202309-06"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-22"
    },
    "CVE-2008-3844": {
      "id": "CVE-2008-3844",
      "references": [
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
      ],
      "score": 9.3,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.  NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points.  As of 20080827, no unofficial distributions of this software are known.",
      "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2009-4489": {
      "id": "CVE-2009-4489",
      "references": [
        "http://secunia.com/advisories/37933",
        "http://svn.cherokee-project.com/changeset/3944",
        "http://svn.cherokee-project.com/changeset/3977",
        "http://www.securityfocus.com/archive/1/508830/100/0/threaded",
        "http://www.securityfocus.com/bid/37715",
        "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
        "http://www.vupen.com/english/advisories/2010/0090",
        "http://secunia.com/advisories/37933",
        "http://svn.cherokee-project.com/changeset/3944",
        "http://svn.cherokee-project.com/changeset/3977",
        "http://www.securityfocus.com/archive/1/508830/100/0/threaded",
        "http://www.securityfocus.com/bid/37715",
        "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
        "http://www.vupen.com/english/advisories/2010/0090"
      ],
      "score": 5,
      "services": [
        "9092/http"
      ],
      "severity": "medium",
      "summary": "header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2011-2190": {
      "id": "CVE-2011-2190",
      "references": [
        "http://code.google.com/p/cherokee/issues/detail?id=1212",
        "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html",
        "http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz",
        "http://www.openwall.com/lists/oss-security/2011/06/03/4",
        "http://www.openwall.com/lists/oss-security/2011/06/06/21",
        "http://www.securityfocus.com/bid/49772",
        "https://bugzilla.redhat.com/show_bug.cgi?id=713304",
        "http://code.google.com/p/cherokee/issues/detail?id=1212",
        "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html",
        "http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz",
        "http://www.openwall.com/lists/oss-security/2011/06/03/4",
        "http://www.openwall.com/lists/oss-security/2011/06/06/21",
        "http://www.securityfocus.com/bid/49772",
        "https://bugzilla.redhat.com/show_bug.cgi?id=713304"
      ],
      "score": 2.1,
      "services": [
        "9092/http"
      ],
      "severity": "low",
      "summary": "The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-310"
    },
    "CVE-2011-2191": {
      "id": "CVE-2011-2191",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html",
        "http://osvdb.org/72693",
        "http://seclists.org/fulldisclosure/2011/Jun/0",
        "http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz",
        "http://www.openwall.com/lists/oss-security/2011/06/02/2",
        "http://www.openwall.com/lists/oss-security/2011/06/03/6",
        "http://www.openwall.com/lists/oss-security/2011/06/06/22",
        "http://www.securityfocus.com/bid/49772",
        "https://bugzilla.redhat.com/show_bug.cgi?id=713304",
        "https://launchpad.net/bugs/784632",
        "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html",
        "http://osvdb.org/72693",
        "http://seclists.org/fulldisclosure/2011/Jun/0",
        "http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz",
        "http://www.openwall.com/lists/oss-security/2011/06/02/2",
        "http://www.openwall.com/lists/oss-security/2011/06/03/6",
        "http://www.openwall.com/lists/oss-security/2011/06/06/22",
        "http://www.securityfocus.com/bid/49772",
        "https://bugzilla.redhat.com/show_bug.cgi?id=713304",
        "https://launchpad.net/bugs/784632"
      ],
      "score": 6.8,
      "services": [
        "9092/http"
      ],
      "severity": "medium",
      "summary": "Cross-site request forgery (CSRF) vulnerability in Cherokee-admin in Cherokee before 1.2.99 allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences, as demonstrated by a crafted nickname field to vserver/apply.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-352"
    },
    "CVE-2013-0340": {
      "id": "CVE-2013-0340",
      "references": [
        "http://openwall.com/lists/oss-security/2013/02/22/3",
        "http://seclists.org/fulldisclosure/2021/Oct/61",
        "http://seclists.org/fulldisclosure/2021/Oct/62",
        "http://seclists.org/fulldisclosure/2021/Oct/63",
        "http://seclists.org/fulldisclosure/2021/Sep/33",
        "http://seclists.org/fulldisclosure/2021/Sep/34",
        "http://seclists.org/fulldisclosure/2021/Sep/35",
        "http://seclists.org/fulldisclosure/2021/Sep/38",
        "http://seclists.org/fulldisclosure/2021/Sep/39",
        "http://seclists.org/fulldisclosure/2021/Sep/40",
        "http://securitytracker.com/id?1028213",
        "http://www.openwall.com/lists/oss-security/2013/04/12/6",
        "http://www.openwall.com/lists/oss-security/2021/10/07/4",
        "http://www.osvdb.org/90634",
        "http://www.securityfocus.com/bid/58233",
        "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E",
        "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-21",
        "https://support.apple.com/kb/HT212804",
        "https://support.apple.com/kb/HT212805",
        "https://support.apple.com/kb/HT212807",
        "https://support.apple.com/kb/HT212814",
        "https://support.apple.com/kb/HT212815",
        "https://support.apple.com/kb/HT212819",
        "http://openwall.com/lists/oss-security/2013/02/22/3",
        "http://seclists.org/fulldisclosure/2021/Oct/61",
        "http://seclists.org/fulldisclosure/2021/Oct/62",
        "http://seclists.org/fulldisclosure/2021/Oct/63",
        "http://seclists.org/fulldisclosure/2021/Sep/33",
        "http://seclists.org/fulldisclosure/2021/Sep/34",
        "http://seclists.org/fulldisclosure/2021/Sep/35",
        "http://seclists.org/fulldisclosure/2021/Sep/38",
        "http://seclists.org/fulldisclosure/2021/Sep/39",
        "http://seclists.org/fulldisclosure/2021/Sep/40",
        "http://securitytracker.com/id?1028213",
        "http://www.openwall.com/lists/oss-security/2013/04/12/6",
        "http://www.openwall.com/lists/oss-security/2021/10/07/4",
        "http://www.osvdb.org/90634",
        "http://www.securityfocus.com/bid/58233",
        "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E",
        "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-21",
        "https://support.apple.com/kb/HT212804",
        "https://support.apple.com/kb/HT212805",
        "https://support.apple.com/kb/HT212807",
        "https://support.apple.com/kb/HT212814",
        "https://support.apple.com/kb/HT212815",
        "https://support.apple.com/kb/HT212819"
      ],
      "score": 6.8,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-611"
    },
    "CVE-2014-4668": {
      "id": "CVE-2014-4668",
      "references": [
        "http://advisories.mageia.org/MGASA-2015-0181.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156162.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156190.html",
        "http://openwall.com/lists/oss-security/2014/06/28/3",
        "http://openwall.com/lists/oss-security/2014/06/28/7",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:225",
        "http://www.securityfocus.com/bid/68249",
        "https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88",
        "http://advisories.mageia.org/MGASA-2015-0181.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156162.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156190.html",
        "http://openwall.com/lists/oss-security/2014/06/28/3",
        "http://openwall.com/lists/oss-security/2014/06/28/7",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:225",
        "http://www.securityfocus.com/bid/68249",
        "https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88"
      ],
      "score": 6.8,
      "services": [
        "9092/http"
      ],
      "severity": "medium",
      "summary": "The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-287"
    },
    "CVE-2016-20012": {
      "id": "CVE-2016-20012",
      "references": [
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1",
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2016-9589": {
      "id": "CVE-2016-9589",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2017-0830.html",
        "http://rhn.redhat.com/errata/RHSA-2017-0831.html",
        "http://rhn.redhat.com/errata/RHSA-2017-0832.html",
        "http://rhn.redhat.com/errata/RHSA-2017-0834.html",
        "http://rhn.redhat.com/errata/RHSA-2017-0876.html",
        "http://www.securityfocus.com/bid/97060",
        "https://access.redhat.com/errata/RHSA-2017:0872",
        "https://access.redhat.com/errata/RHSA-2017:0873",
        "https://access.redhat.com/errata/RHSA-2017:3454",
        "https://access.redhat.com/errata/RHSA-2017:3455",
        "https://access.redhat.com/errata/RHSA-2017:3456",
        "https://access.redhat.com/errata/RHSA-2017:3458",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1404782"
      ],
      "score": 7.5,
      "services": [
        "15671/http"
      ],
      "severity": "high",
      "summary": "Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to \"max-headers\" (default 200) * \"max-header-size\" (default 1MB) per active TCP connection.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2017-17522": {
      "id": "CVE-2017-17522",
      "references": [
        "http://www.securityfocus.com/bid/102207",
        "https://bugs.python.org/issue32367",
        "https://security-tracker.debian.org/tracker/CVE-2017-17522",
        "http://www.securityfocus.com/bid/102207",
        "https://bugs.python.org/issue32367",
        "https://security-tracker.debian.org/tracker/CVE-2017-17522"
      ],
      "score": 8.8,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-74"
    },
    "CVE-2017-18207": {
      "id": "CVE-2017-18207",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://bugs.python.org/issue32056",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://bugs.python.org/issue32056"
      ],
      "score": 6.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "CWE-369"
    },
    "CVE-2017-5660": {
      "id": "CVE-2017-5660",
      "references": [
        "https://lists.apache.org/thread.html/22d84783d94c53a5132ec89f002fe5165c87561a9428bcb6713b3c98%40%3Cdev.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4128"
      ],
      "score": 8.6,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2017-7671": {
      "id": "CVE-2017-7671",
      "references": [
        "https://lists.apache.org/thread.html/203bdcf9bbb718f3dc6f7aaf3e2af632474d51fa9e7bfb7832729905%40%3Cdev.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4128"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "There is a DOS attack vulnerability in Apache Traffic Server (ATS) 5.2.0 to 5.3.2, 6.0.0 to 6.2.0, and 7.0.0 with the TLS handshake. This issue can cause the server to coredump.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2018-1000117": {
      "id": "CVE-2018-1000117",
      "references": [
        "https://bugs.python.org/issue33001",
        "https://github.com/python/cpython/pull/5989",
        "https://bugs.python.org/issue33001",
        "https://github.com/python/cpython/pull/5989"
      ],
      "score": 6.7,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2018-1060": {
      "id": "CVE-2018-1060",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securitytracker.com/id/1042001",
        "https://access.redhat.com/errata/RHBA-2019:0327",
        "https://access.redhat.com/errata/RHSA-2018:3041",
        "https://access.redhat.com/errata/RHSA-2018:3505",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue32981",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060",
        "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
        "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us",
        "https://usn.ubuntu.com/3817-1/",
        "https://usn.ubuntu.com/3817-2/",
        "https://www.debian.org/security/2018/dsa-4306",
        "https://www.debian.org/security/2018/dsa-4307",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securitytracker.com/id/1042001",
        "https://access.redhat.com/errata/RHBA-2019:0327",
        "https://access.redhat.com/errata/RHSA-2018:3041",
        "https://access.redhat.com/errata/RHSA-2018:3505",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue32981",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060",
        "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
        "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us",
        "https://usn.ubuntu.com/3817-1/",
        "https://usn.ubuntu.com/3817-2/",
        "https://www.debian.org/security/2018/dsa-4306",
        "https://www.debian.org/security/2018/dsa-4307",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2018-1061": {
      "id": "CVE-2018-1061",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securitytracker.com/id/1042001",
        "https://access.redhat.com/errata/RHBA-2019:0327",
        "https://access.redhat.com/errata/RHSA-2018:3041",
        "https://access.redhat.com/errata/RHSA-2018:3505",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue32981",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061",
        "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
        "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us",
        "https://usn.ubuntu.com/3817-1/",
        "https://usn.ubuntu.com/3817-2/",
        "https://www.debian.org/security/2018/dsa-4306",
        "https://www.debian.org/security/2018/dsa-4307",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securitytracker.com/id/1042001",
        "https://access.redhat.com/errata/RHBA-2019:0327",
        "https://access.redhat.com/errata/RHSA-2018:3041",
        "https://access.redhat.com/errata/RHSA-2018:3505",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue32981",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061",
        "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
        "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us",
        "https://usn.ubuntu.com/3817-1/",
        "https://usn.ubuntu.com/3817-2/",
        "https://www.debian.org/security/2018/dsa-4306",
        "https://www.debian.org/security/2018/dsa-4307"
      ],
      "score": 6.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2018-11783": {
      "id": "CVE-2018-11783",
      "references": [
        "http://www.securityfocus.com/bid/107032",
        "https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e%40%3Cannounce.trafficserver.apache.org%3E"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2018-1318": {
      "id": "CVE-2018-1318",
      "references": [
        "http://www.securityfocus.com/bid/105176",
        "https://github.com/apache/trafficserver/pull/3195",
        "https://lists.apache.org/thread.html/9357cdfb6352f72944411608b712e37196ad9e4bc0f17c4828a26fb2%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4282"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Adding method ACLs in remap.config can cause a segfault when the user makes a carefully crafted request. This affects versions Apache Traffic Server (ATS) 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2018-14647": {
      "id": "CVE-2018-14647",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securityfocus.com/bid/105396",
        "http://www.securitytracker.com/id/1041740",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue34623",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/",
        "https://usn.ubuntu.com/3817-1/",
        "https://usn.ubuntu.com/3817-2/",
        "https://www.debian.org/security/2018/dsa-4306",
        "https://www.debian.org/security/2018/dsa-4307"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-909"
    },
    "CVE-2018-15473": {
      "id": "CVE-2018-15473",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/08/15/5",
        "http://www.securityfocus.com/bid/105140",
        "http://www.securitytracker.com/id/1041487",
        "https://access.redhat.com/errata/RHSA-2019:0711",
        "https://access.redhat.com/errata/RHSA-2019:2143",
        "https://bugs.debian.org/906236",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
        "https://security.gentoo.org/glsa/201810-03",
        "https://security.netapp.com/advisory/ntap-20181101-0001/",
        "https://usn.ubuntu.com/3809-1/",
        "https://www.debian.org/security/2018/dsa-4280",
        "https://www.exploit-db.com/exploits/45210/",
        "https://www.exploit-db.com/exploits/45233/",
        "https://www.exploit-db.com/exploits/45939/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://www.openwall.com/lists/oss-security/2018/08/15/5",
        "http://www.securityfocus.com/bid/105140",
        "http://www.securitytracker.com/id/1041487",
        "https://access.redhat.com/errata/RHSA-2019:0711",
        "https://access.redhat.com/errata/RHSA-2019:2143",
        "https://bugs.debian.org/906236",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
        "https://security.gentoo.org/glsa/201810-03",
        "https://security.netapp.com/advisory/ntap-20181101-0001/",
        "https://usn.ubuntu.com/3809-1/",
        "https://www.debian.org/security/2018/dsa-4280",
        "https://www.exploit-db.com/exploits/45210/",
        "https://www.exploit-db.com/exploits/45233/",
        "https://www.exploit-db.com/exploits/45939/",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-362"
    },
    "CVE-2018-15891": {
      "id": "CVE-2018-15891",
      "references": [
        "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
        "https://www.freepbx.org/",
        "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode",
        "https://www.freepbx.org/"
      ],
      "score": 4.8,
      "services": [
        "2181/sip-proxy"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-79"
    },
    "CVE-2018-15919": {
      "id": "CVE-2018-15919",
      "references": [
        "http://seclists.org/oss-sec/2018/q3/180",
        "http://www.securityfocus.com/bid/105163",
        "https://security.netapp.com/advisory/ntap-20181221-0001/",
        "http://seclists.org/oss-sec/2018/q3/180",
        "http://www.securityfocus.com/bid/105163",
        "https://security.netapp.com/advisory/ntap-20181221-0001/"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2018-20406": {
      "id": "CVE-2018-20406",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue34656",
        "https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/",
        "https://security.netapp.com/advisory/ntap-20190416-0010/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue34656",
        "https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/",
        "https://security.netapp.com/advisory/ntap-20190416-0010/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2018-20685": {
      "id": "CVE-2018-20685",
      "references": [
        "http://www.securityfocus.com/bid/106531",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
        "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.gentoo.org/glsa/202007-53",
        "https://security.netapp.com/advisory/ntap-20190215-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://www.securityfocus.com/bid/106531",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
        "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.gentoo.org/glsa/202007-53",
        "https://security.netapp.com/advisory/ntap-20190215-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
      "weakness": "CWE-863"
    },
    "CVE-2018-20852": {
      "id": "CVE-2018-20852",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://access.redhat.com/errata/RHSA-2019:3948",
        "https://bugs.python.org/issue35121",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://python-security.readthedocs.io/vuln/cookie-domain-check.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://access.redhat.com/errata/RHSA-2019:3948",
        "https://bugs.python.org/issue35121",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://python-security.readthedocs.io/vuln/cookie-domain-check.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 5.3,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2018-8004": {
      "id": "CVE-2018-8004",
      "references": [
        "http://www.securityfocus.com/bid/105192",
        "https://github.com/apache/trafficserver/pull/3192",
        "https://github.com/apache/trafficserver/pull/3201",
        "https://github.com/apache/trafficserver/pull/3231",
        "https://github.com/apache/trafficserver/pull/3251",
        "https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4282"
      ],
      "score": 6.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "medium",
      "summary": "There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2018-8005": {
      "id": "CVE-2018-8005",
      "references": [
        "http://www.securityfocus.com/bid/105187",
        "https://github.com/apache/trafficserver/pull/3106",
        "https://github.com/apache/trafficserver/pull/3124",
        "https://lists.apache.org/thread.html/55d225af92887bfed0194400fd1b718622cca4140fc7318d982e25ca%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4282"
      ],
      "score": 5.3,
      "services": [
        "445/http-proxy"
      ],
      "severity": "medium",
      "summary": "When there are multiple ranges in a range request, Apache Traffic Server (ATS) will read the entire object from cache. This can cause performance problems with large objects in cache. This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x users should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "weakness": "CWE-400"
    },
    "CVE-2018-8040": {
      "id": "CVE-2018-8040",
      "references": [
        "http://www.securityfocus.com/bid/105181",
        "https://github.com/apache/trafficserver/pull/3926",
        "https://lists.apache.org/thread.html/36b3df68fe7311965f6bc4630ca413d2aa99d8f1d53affda85ea70d7%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/cc7aa2ce1c6f4fe0c6bfef517763cdaad30ec7bcb0115b73f73f3c01%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2018/dsa-4282"
      ],
      "score": 5.3,
      "services": [
        "445/http-proxy"
      ],
      "severity": "medium",
      "summary": "Pages that are rendered using the ESI plugin can have access to the cookie header when the plugin is configured not to allow access. This affects Apache Traffic Server (ATS) versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-668"
    },
    "CVE-2019-10079": {
      "id": "CVE-2019-10079",
      "references": [
        "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-10160": {
      "id": "CVE-2019-10160",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:1587",
        "https://access.redhat.com/errata/RHSA-2019:1700",
        "https://access.redhat.com/errata/RHSA-2019:2437",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160",
        "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09",
        "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e",
        "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de",
        "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/",
        "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html",
        "https://security.netapp.com/advisory/ntap-20190617-0003/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:1587",
        "https://access.redhat.com/errata/RHSA-2019:1700",
        "https://access.redhat.com/errata/RHSA-2019:2437",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160",
        "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09",
        "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e",
        "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de",
        "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/",
        "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html",
        "https://security.netapp.com/advisory/ntap-20190617-0003/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-172"
    },
    "CVE-2019-15903": {
      "id": "CVE-2019-15903",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html",
        "http://seclists.org/fulldisclosure/2019/Dec/23",
        "http://seclists.org/fulldisclosure/2019/Dec/26",
        "http://seclists.org/fulldisclosure/2019/Dec/27",
        "http://seclists.org/fulldisclosure/2019/Dec/30",
        "https://access.redhat.com/errata/RHSA-2019:3210",
        "https://access.redhat.com/errata/RHSA-2019:3237",
        "https://access.redhat.com/errata/RHSA-2019:3756",
        "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43",
        "https://github.com/libexpat/libexpat/issues/317",
        "https://github.com/libexpat/libexpat/issues/342",
        "https://github.com/libexpat/libexpat/pull/318",
        "https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html",
        "https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/",
        "https://seclists.org/bugtraq/2019/Dec/17",
        "https://seclists.org/bugtraq/2019/Dec/21",
        "https://seclists.org/bugtraq/2019/Dec/23",
        "https://seclists.org/bugtraq/2019/Nov/1",
        "https://seclists.org/bugtraq/2019/Nov/24",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://seclists.org/bugtraq/2019/Sep/30",
        "https://seclists.org/bugtraq/2019/Sep/37",
        "https://security.gentoo.org/glsa/201911-08",
        "https://security.netapp.com/advisory/ntap-20190926-0004/",
        "https://support.apple.com/kb/HT210785",
        "https://support.apple.com/kb/HT210788",
        "https://support.apple.com/kb/HT210789",
        "https://support.apple.com/kb/HT210790",
        "https://support.apple.com/kb/HT210793",
        "https://support.apple.com/kb/HT210794",
        "https://support.apple.com/kb/HT210795",
        "https://usn.ubuntu.com/4132-1/",
        "https://usn.ubuntu.com/4132-2/",
        "https://usn.ubuntu.com/4165-1/",
        "https://usn.ubuntu.com/4202-1/",
        "https://usn.ubuntu.com/4335-1/",
        "https://www.debian.org/security/2019/dsa-4530",
        "https://www.debian.org/security/2019/dsa-4549",
        "https://www.debian.org/security/2019/dsa-4571",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html",
        "https://www.tenable.com/security/tns-2021-11",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html",
        "http://seclists.org/fulldisclosure/2019/Dec/23",
        "http://seclists.org/fulldisclosure/2019/Dec/26",
        "http://seclists.org/fulldisclosure/2019/Dec/27",
        "http://seclists.org/fulldisclosure/2019/Dec/30",
        "https://access.redhat.com/errata/RHSA-2019:3210",
        "https://access.redhat.com/errata/RHSA-2019:3237",
        "https://access.redhat.com/errata/RHSA-2019:3756",
        "https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43",
        "https://github.com/libexpat/libexpat/issues/317",
        "https://github.com/libexpat/libexpat/issues/342",
        "https://github.com/libexpat/libexpat/pull/318",
        "https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html",
        "https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/",
        "https://seclists.org/bugtraq/2019/Dec/17",
        "https://seclists.org/bugtraq/2019/Dec/21",
        "https://seclists.org/bugtraq/2019/Dec/23",
        "https://seclists.org/bugtraq/2019/Nov/1",
        "https://seclists.org/bugtraq/2019/Nov/24",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://seclists.org/bugtraq/2019/Sep/30",
        "https://seclists.org/bugtraq/2019/Sep/37",
        "https://security.gentoo.org/glsa/201911-08",
        "https://security.netapp.com/advisory/ntap-20190926-0004/",
        "https://support.apple.com/kb/HT210785",
        "https://support.apple.com/kb/HT210788",
        "https://support.apple.com/kb/HT210789",
        "https://support.apple.com/kb/HT210790",
        "https://support.apple.com/kb/HT210793",
        "https://support.apple.com/kb/HT210794",
        "https://support.apple.com/kb/HT210795",
        "https://usn.ubuntu.com/4132-1/",
        "https://usn.ubuntu.com/4132-2/",
        "https://usn.ubuntu.com/4165-1/",
        "https://usn.ubuntu.com/4202-1/",
        "https://usn.ubuntu.com/4335-1/",
        "https://www.debian.org/security/2019/dsa-4530",
        "https://www.debian.org/security/2019/dsa-4549",
        "https://www.debian.org/security/2019/dsa-4571",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html",
        "https://www.tenable.com/security/tns-2021-11"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2019-16056": {
      "id": "CVE-2019-16056",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://access.redhat.com/errata/RHSA-2019:3948",
        "https://bugs.python.org/issue34155",
        "https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://security.netapp.com/advisory/ntap-20190926-0005/",
        "https://usn.ubuntu.com/4151-1/",
        "https://usn.ubuntu.com/4151-2/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://access.redhat.com/errata/RHSA-2019:3948",
        "https://bugs.python.org/issue34155",
        "https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://security.netapp.com/advisory/ntap-20190926-0005/",
        "https://usn.ubuntu.com/4151-1/",
        "https://usn.ubuntu.com/4151-2/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-16935": {
      "id": "CVE-2019-16935",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://bugs.python.org/issue38243",
        "https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897",
        "https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213",
        "https://github.com/python/cpython/pull/16373",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://security.netapp.com/advisory/ntap-20191017-0004/",
        "https://usn.ubuntu.com/4151-1/",
        "https://usn.ubuntu.com/4151-2/",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://bugs.python.org/issue38243",
        "https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897",
        "https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213",
        "https://github.com/python/cpython/pull/16373",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/",
        "https://security.netapp.com/advisory/ntap-20191017-0004/",
        "https://usn.ubuntu.com/4151-1/",
        "https://usn.ubuntu.com/4151-2/",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 6.1,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-79"
    },
    "CVE-2019-17559": {
      "id": "CVE-2019-17559",
      "references": [
        "https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2020/dsa-4672"
      ],
      "score": 9.8,
      "services": [
        "445/http-proxy"
      ],
      "severity": "critical",
      "summary": "There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and scheme parsing. Upgrade to versions 7.1.9 and 8.0.6 or later versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2019-17565": {
      "id": "CVE-2019-17565",
      "references": [
        "https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2020/dsa-4672"
      ],
      "score": 9.8,
      "services": [
        "445/http-proxy"
      ],
      "severity": "critical",
      "summary": "There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding. Upgrade to versions 7.1.9 and 8.0.6 or later versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2019-18348": {
      "id": "CVE-2019-18348",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
        "https://bugs.python.org/issue30458#msg347282",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1727276",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
        "https://security.netapp.com/advisory/ntap-20191107-0004/",
        "https://usn.ubuntu.com/4333-1/",
        "https://usn.ubuntu.com/4333-2/",
        "https://www.oracle.com/security-alerts/cpuoct2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
        "https://bugs.python.org/issue30458#msg347282",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1727276",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
        "https://security.netapp.com/advisory/ntap-20191107-0004/",
        "https://usn.ubuntu.com/4333-1/",
        "https://usn.ubuntu.com/4333-2/",
        "https://www.oracle.com/security-alerts/cpuoct2020.html"
      ],
      "score": 6.1,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2019-19538": {
      "id": "CVE-2019-19538",
      "references": [
        "https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
        "https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution",
        "https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00",
        "https://wiki.freepbx.org/display/FOP/2019-12-03+Remote+Command+Execution"
      ],
      "score": 7.2,
      "services": [
        "2181/sip-proxy"
      ],
      "severity": "high",
      "summary": "In Sangoma FreePBX 13 through 15 and sysadmin (aka System Admin) 13.0.92 through 15.0.13.6 modules have a Remote Command Execution vulnerability that results in Privilege Escalation.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-19851": {
      "id": "CVE-2019-19851",
      "references": [
        "https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
        "https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities",
        "https://wiki.freepbx.org/display/FOP/2020-01-09+XSS+Injection+vulnerability+in+Superfecta+Module",
        "https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities"
      ],
      "score": 4.8,
      "services": [
        "2181/sip-proxy"
      ],
      "severity": "medium",
      "summary": "An XSS Injection vulnerability exists in Sangoma FreePBX and PBXact 13, 14, and 15 within the Debug/Test page of the Superfecta module at the admin/config.php?display=superfecta URI. This affects Superfecta through 13.0.4.7, 14.x through 14.0.24, and 15.x through 15.0.2.20.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-79"
    },
    "CVE-2019-20798": {
      "id": "CVE-2019-20798",
      "references": [
        "https://github.com/cherokee/webserver/issues/1227",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09",
        "https://github.com/cherokee/webserver/issues/1227",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09"
      ],
      "score": 8.4,
      "services": [
        "9092/http"
      ],
      "severity": "high",
      "summary": "An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary commands.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
      "weakness": "CWE-79"
    },
    "CVE-2019-20799": {
      "id": "CVE-2019-20799",
      "references": [
        "https://github.com/cherokee/webserver/issues/1221",
        "https://github.com/cherokee/webserver/issues/1222",
        "https://github.com/cherokee/webserver/issues/1225",
        "https://github.com/cherokee/webserver/issues/1226",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09",
        "https://github.com/cherokee/webserver/issues/1221",
        "https://github.com/cherokee/webserver/issues/1222",
        "https://github.com/cherokee/webserver/issues/1225",
        "https://github.com/cherokee/webserver/issues/1226",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09"
      ],
      "score": 7.5,
      "services": [
        "9092/http"
      ],
      "severity": "high",
      "summary": "In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2019-20800": {
      "id": "CVE-2019-20800",
      "references": [
        "https://github.com/cherokee/webserver/issues/1224",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09",
        "https://github.com/cherokee/webserver/issues/1224",
        "https://logicaltrust.net/blog/2019/11/cherokee.html",
        "https://security.gentoo.org/glsa/202012-09"
      ],
      "score": 9.8,
      "services": [
        "9092/http"
      ],
      "severity": "critical",
      "summary": "In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many \"Host: 127.0.0.1\" headers.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2019-20907": {
      "id": "CVE-2019-20907",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html",
        "https://bugs.python.org/issue39017",
        "https://github.com/python/cpython/pull/21454",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/",
        "https://security.gentoo.org/glsa/202008-01",
        "https://security.netapp.com/advisory/ntap-20200731-0002/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html",
        "https://bugs.python.org/issue39017",
        "https://github.com/python/cpython/pull/21454",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/",
        "https://security.gentoo.org/glsa/202008-01",
        "https://security.netapp.com/advisory/ntap-20200731-0002/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-835"
    },
    "CVE-2019-5010": {
      "id": "CVE-2019-5010",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2019-6109": {
      "id": "CVE-2019-6109",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 6.8,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
      "weakness": "CWE-116"
    },
    "CVE-2019-6110": {
      "id": "CVE-2019-6110",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://www.exploit-db.com/exploits/46193/",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://www.exploit-db.com/exploits/46193/"
      ],
      "score": 6.8,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
      "weakness": "CWE-838"
    },
    "CVE-2019-6111": {
      "id": "CVE-2019-6111",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "http://www.openwall.com/lists/oss-security/2019/04/18/1",
        "http://www.openwall.com/lists/oss-security/2022/08/02/1",
        "http://www.securityfocus.com/bid/106741",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://usn.ubuntu.com/3885-2/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.exploit-db.com/exploits/46193/",
        "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "http://www.openwall.com/lists/oss-security/2019/04/18/1",
        "http://www.openwall.com/lists/oss-security/2022/08/02/1",
        "http://www.securityfocus.com/bid/106741",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://usn.ubuntu.com/3885-2/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.exploit-db.com/exploits/46193/",
        "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-22"
    },
    "CVE-2019-9511": {
      "id": "CVE-2019-9511",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html",
        "https://access.redhat.com/errata/RHSA-2019:2692",
        "https://access.redhat.com/errata/RHSA-2019:2745",
        "https://access.redhat.com/errata/RHSA-2019:2746",
        "https://access.redhat.com/errata/RHSA-2019:2775",
        "https://access.redhat.com/errata/RHSA-2019:2799",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2949",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:2966",
        "https://access.redhat.com/errata/RHSA-2019:3041",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://access.redhat.com/errata/RHSA-2019:4018",
        "https://access.redhat.com/errata/RHSA-2019:4019",
        "https://access.redhat.com/errata/RHSA-2019:4020",
        "https://access.redhat.com/errata/RHSA-2019:4021",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/",
        "https://seclists.org/bugtraq/2019/Aug/40",
        "https://seclists.org/bugtraq/2019/Sep/1",
        "https://security.netapp.com/advisory/ntap-20190823-0002/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K02591030",
        "https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4099-1/",
        "https://www.debian.org/security/2019/dsa-4505",
        "https://www.debian.org/security/2019/dsa-4511",
        "https://www.debian.org/security/2020/dsa-4669",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9512": {
      "id": "CVE-2019-9512",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html",
        "http://seclists.org/fulldisclosure/2019/Aug/16",
        "http://www.openwall.com/lists/oss-security/2019/08/20/1",
        "https://access.redhat.com/errata/RHSA-2019:2594",
        "https://access.redhat.com/errata/RHSA-2019:2661",
        "https://access.redhat.com/errata/RHSA-2019:2682",
        "https://access.redhat.com/errata/RHSA-2019:2690",
        "https://access.redhat.com/errata/RHSA-2019:2726",
        "https://access.redhat.com/errata/RHSA-2019:2766",
        "https://access.redhat.com/errata/RHSA-2019:2769",
        "https://access.redhat.com/errata/RHSA-2019:2796",
        "https://access.redhat.com/errata/RHSA-2019:2861",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:2966",
        "https://access.redhat.com/errata/RHSA-2019:3131",
        "https://access.redhat.com/errata/RHSA-2019:3245",
        "https://access.redhat.com/errata/RHSA-2019:3265",
        "https://access.redhat.com/errata/RHSA-2019:3892",
        "https://access.redhat.com/errata/RHSA-2019:3906",
        "https://access.redhat.com/errata/RHSA-2019:4018",
        "https://access.redhat.com/errata/RHSA-2019:4019",
        "https://access.redhat.com/errata/RHSA-2019:4020",
        "https://access.redhat.com/errata/RHSA-2019:4021",
        "https://access.redhat.com/errata/RHSA-2019:4040",
        "https://access.redhat.com/errata/RHSA-2019:4041",
        "https://access.redhat.com/errata/RHSA-2019:4042",
        "https://access.redhat.com/errata/RHSA-2019:4045",
        "https://access.redhat.com/errata/RHSA-2019:4269",
        "https://access.redhat.com/errata/RHSA-2019:4273",
        "https://access.redhat.com/errata/RHSA-2019:4352",
        "https://access.redhat.com/errata/RHSA-2020:0406",
        "https://access.redhat.com/errata/RHSA-2020:0727",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/",
        "https://seclists.org/bugtraq/2019/Aug/24",
        "https://seclists.org/bugtraq/2019/Aug/31",
        "https://seclists.org/bugtraq/2019/Aug/43",
        "https://seclists.org/bugtraq/2019/Sep/18",
        "https://security.netapp.com/advisory/ntap-20190823-0001/",
        "https://security.netapp.com/advisory/ntap-20190823-0004/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K98053339",
        "https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4308-1/",
        "https://www.debian.org/security/2019/dsa-4503",
        "https://www.debian.org/security/2019/dsa-4508",
        "https://www.debian.org/security/2019/dsa-4520",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2019-9513": {
      "id": "CVE-2019-9513",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html",
        "https://access.redhat.com/errata/RHSA-2019:2692",
        "https://access.redhat.com/errata/RHSA-2019:2745",
        "https://access.redhat.com/errata/RHSA-2019:2746",
        "https://access.redhat.com/errata/RHSA-2019:2775",
        "https://access.redhat.com/errata/RHSA-2019:2799",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2949",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:2966",
        "https://access.redhat.com/errata/RHSA-2019:3041",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/",
        "https://seclists.org/bugtraq/2019/Aug/40",
        "https://seclists.org/bugtraq/2019/Sep/1",
        "https://security.netapp.com/advisory/ntap-20190823-0002/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K02591030",
        "https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4099-1/",
        "https://www.debian.org/security/2019/dsa-4505",
        "https://www.debian.org/security/2019/dsa-4511",
        "https://www.debian.org/security/2020/dsa-4669",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://www.oracle.com/security-alerts/cpuoct2020.html",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2019-9514": {
      "id": "CVE-2019-9514",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html",
        "http://seclists.org/fulldisclosure/2019/Aug/16",
        "http://www.openwall.com/lists/oss-security/2019/08/20/1",
        "http://www.openwall.com/lists/oss-security/2023/10/18/8",
        "https://access.redhat.com/errata/RHSA-2019:2594",
        "https://access.redhat.com/errata/RHSA-2019:2661",
        "https://access.redhat.com/errata/RHSA-2019:2682",
        "https://access.redhat.com/errata/RHSA-2019:2690",
        "https://access.redhat.com/errata/RHSA-2019:2726",
        "https://access.redhat.com/errata/RHSA-2019:2766",
        "https://access.redhat.com/errata/RHSA-2019:2769",
        "https://access.redhat.com/errata/RHSA-2019:2796",
        "https://access.redhat.com/errata/RHSA-2019:2861",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:2966",
        "https://access.redhat.com/errata/RHSA-2019:3131",
        "https://access.redhat.com/errata/RHSA-2019:3245",
        "https://access.redhat.com/errata/RHSA-2019:3265",
        "https://access.redhat.com/errata/RHSA-2019:3892",
        "https://access.redhat.com/errata/RHSA-2019:3906",
        "https://access.redhat.com/errata/RHSA-2019:4018",
        "https://access.redhat.com/errata/RHSA-2019:4019",
        "https://access.redhat.com/errata/RHSA-2019:4020",
        "https://access.redhat.com/errata/RHSA-2019:4021",
        "https://access.redhat.com/errata/RHSA-2019:4040",
        "https://access.redhat.com/errata/RHSA-2019:4041",
        "https://access.redhat.com/errata/RHSA-2019:4042",
        "https://access.redhat.com/errata/RHSA-2019:4045",
        "https://access.redhat.com/errata/RHSA-2019:4269",
        "https://access.redhat.com/errata/RHSA-2019:4273",
        "https://access.redhat.com/errata/RHSA-2019:4352",
        "https://access.redhat.com/errata/RHSA-2020:0406",
        "https://access.redhat.com/errata/RHSA-2020:0727",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/",
        "https://seclists.org/bugtraq/2019/Aug/24",
        "https://seclists.org/bugtraq/2019/Aug/31",
        "https://seclists.org/bugtraq/2019/Aug/43",
        "https://seclists.org/bugtraq/2019/Sep/18",
        "https://security.netapp.com/advisory/ntap-20190823-0001/",
        "https://security.netapp.com/advisory/ntap-20190823-0004/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K01988340",
        "https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4308-1/",
        "https://www.debian.org/security/2019/dsa-4503",
        "https://www.debian.org/security/2019/dsa-4508",
        "https://www.debian.org/security/2019/dsa-4520",
        "https://www.debian.org/security/2020/dsa-4669",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9515": {
      "id": "CVE-2019-9515",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://seclists.org/fulldisclosure/2019/Aug/16",
        "https://access.redhat.com/errata/RHSA-2019:2766",
        "https://access.redhat.com/errata/RHSA-2019:2796",
        "https://access.redhat.com/errata/RHSA-2019:2861",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:3892",
        "https://access.redhat.com/errata/RHSA-2019:4018",
        "https://access.redhat.com/errata/RHSA-2019:4019",
        "https://access.redhat.com/errata/RHSA-2019:4020",
        "https://access.redhat.com/errata/RHSA-2019:4021",
        "https://access.redhat.com/errata/RHSA-2019:4040",
        "https://access.redhat.com/errata/RHSA-2019:4041",
        "https://access.redhat.com/errata/RHSA-2019:4042",
        "https://access.redhat.com/errata/RHSA-2019:4045",
        "https://access.redhat.com/errata/RHSA-2019:4352",
        "https://access.redhat.com/errata/RHSA-2020:0727",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://seclists.org/bugtraq/2019/Aug/24",
        "https://seclists.org/bugtraq/2019/Aug/43",
        "https://seclists.org/bugtraq/2019/Sep/18",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K50233772",
        "https://support.f5.com/csp/article/K50233772?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4308-1/",
        "https://www.debian.org/security/2019/dsa-4508",
        "https://www.debian.org/security/2019/dsa-4520",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9516": {
      "id": "CVE-2019-9516",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html",
        "http://seclists.org/fulldisclosure/2019/Aug/16",
        "https://access.redhat.com/errata/RHSA-2019:2745",
        "https://access.redhat.com/errata/RHSA-2019:2746",
        "https://access.redhat.com/errata/RHSA-2019:2775",
        "https://access.redhat.com/errata/RHSA-2019:2799",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2946",
        "https://access.redhat.com/errata/RHSA-2019:2950",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:2966",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/",
        "https://seclists.org/bugtraq/2019/Aug/24",
        "https://seclists.org/bugtraq/2019/Aug/40",
        "https://security.netapp.com/advisory/ntap-20190823-0002/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K02591030",
        "https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4099-1/",
        "https://www.debian.org/security/2019/dsa-4505",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 6.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "medium",
      "summary": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9517": {
      "id": "CVE-2019-9517",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://www.openwall.com/lists/oss-security/2019/08/15/7",
        "https://access.redhat.com/errata/RHSA-2019:2893",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2946",
        "https://access.redhat.com/errata/RHSA-2019:2949",
        "https://access.redhat.com/errata/RHSA-2019:2950",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/",
        "https://seclists.org/bugtraq/2019/Aug/47",
        "https://security.gentoo.org/glsa/201909-04",
        "https://security.netapp.com/advisory/ntap-20190823-0003/",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://security.netapp.com/advisory/ntap-20190905-0003/",
        "https://support.f5.com/csp/article/K02591030",
        "https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4113-1/",
        "https://www.debian.org/security/2019/dsa-4509",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9518": {
      "id": "CVE-2019-9518",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html",
        "http://seclists.org/fulldisclosure/2019/Aug/16",
        "https://access.redhat.com/errata/RHSA-2019:2925",
        "https://access.redhat.com/errata/RHSA-2019:2939",
        "https://access.redhat.com/errata/RHSA-2019:2955",
        "https://access.redhat.com/errata/RHSA-2019:3892",
        "https://access.redhat.com/errata/RHSA-2019:4352",
        "https://access.redhat.com/errata/RHSA-2020:0727",
        "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md",
        "https://kb.cert.org/vuls/id/605641/",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
        "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E",
        "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E",
        "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/",
        "https://seclists.org/bugtraq/2019/Aug/24",
        "https://seclists.org/bugtraq/2019/Sep/18",
        "https://security.netapp.com/advisory/ntap-20190823-0005/",
        "https://support.f5.com/csp/article/K46011592",
        "https://support.f5.com/csp/article/K46011592?utm_source=f5support&%3Butm_medium=RSS",
        "https://www.debian.org/security/2019/dsa-4520",
        "https://www.synology.com/security/advisory/Synology_SA_19_33"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2019-9636": {
      "id": "CVE-2019-9636",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securityfocus.com/bid/107400",
        "https://access.redhat.com/errata/RHBA-2019:0763",
        "https://access.redhat.com/errata/RHBA-2019:0764",
        "https://access.redhat.com/errata/RHBA-2019:0959",
        "https://access.redhat.com/errata/RHSA-2019:0710",
        "https://access.redhat.com/errata/RHSA-2019:0765",
        "https://access.redhat.com/errata/RHSA-2019:0806",
        "https://access.redhat.com/errata/RHSA-2019:0902",
        "https://access.redhat.com/errata/RHSA-2019:0981",
        "https://access.redhat.com/errata/RHSA-2019:0997",
        "https://access.redhat.com/errata/RHSA-2019:1467",
        "https://access.redhat.com/errata/RHSA-2019:2980",
        "https://access.redhat.com/errata/RHSA-2019:3170",
        "https://bugs.python.org/issue36216",
        "https://github.com/python/cpython/pull/12201",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFBAAGM27H73OLYBUA2IAZFSUN6KGLME/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFAXBEY2TGOBDRKTR556JBXBVFSAKD6I/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L25RTMKCF62DLC2XVSNXGX7C7HXISLVM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/",
        "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190517-0001/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.securityfocus.com/bid/107400",
        "https://access.redhat.com/errata/RHBA-2019:0763",
        "https://access.redhat.com/errata/RHBA-2019:0764",
        "https://access.redhat.com/errata/RHBA-2019:0959",
        "https://access.redhat.com/errata/RHSA-2019:0710",
        "https://access.redhat.com/errata/RHSA-2019:0765",
        "https://access.redhat.com/errata/RHSA-2019:0806",
        "https://access.redhat.com/errata/RHSA-2019:0902",
        "https://access.redhat.com/errata/RHSA-2019:0981",
        "https://access.redhat.com/errata/RHSA-2019:0997",
        "https://access.redhat.com/errata/RHSA-2019:1467",
        "https://access.redhat.com/errata/RHSA-2019:2980",
        "https://access.redhat.com/errata/RHSA-2019:3170",
        "https://bugs.python.org/issue36216",
        "https://github.com/python/cpython/pull/12201",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFBAAGM27H73OLYBUA2IAZFSUN6KGLME/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFAXBEY2TGOBDRKTR556JBXBVFSAKD6I/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L25RTMKCF62DLC2XVSNXGX7C7HXISLVM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/",
        "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190517-0001/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-9674": {
      "id": "CVE-2019-9674",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
        "https://bugs.python.org/issue36260",
        "https://bugs.python.org/issue36462",
        "https://github.com/python/cpython/blob/master/Lib/zipfile.py",
        "https://python-security.readthedocs.io/security.html#archives-and-zip-bomb",
        "https://security.netapp.com/advisory/ntap-20200221-0003/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.python.org/news/security/",
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html",
        "https://bugs.python.org/issue36260",
        "https://bugs.python.org/issue36462",
        "https://github.com/python/cpython/blob/master/Lib/zipfile.py",
        "https://python-security.readthedocs.io/security.html#archives-and-zip-bomb",
        "https://security.netapp.com/advisory/ntap-20200221-0003/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.python.org/news/security/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2019-9740": {
      "id": "CVE-2019-9740",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://www.openwall.com/lists/oss-security/2021/02/04/2",
        "http://www.securityfocus.com/bid/107466",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue36276",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190619-0005/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://www.openwall.com/lists/oss-security/2021/02/04/2",
        "http://www.securityfocus.com/bid/107466",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue36276",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190619-0005/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 6.1,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-93"
    },
    "CVE-2019-9947": {
      "id": "CVE-2019-9947",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.openwall.com/lists/oss-security/2021/02/04/2",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue35906",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190404-0004/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
        "http://www.openwall.com/lists/oss-security/2021/02/04/2",
        "https://access.redhat.com/errata/RHSA-2019:1260",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://access.redhat.com/errata/RHSA-2019:3725",
        "https://bugs.python.org/issue35906",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190404-0004/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/"
      ],
      "score": 6.1,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-93"
    },
    "CVE-2019-9948": {
      "id": "CVE-2019-9948",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://www.securityfocus.com/bid/107549",
        "https://access.redhat.com/errata/RHSA-2019:1700",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://bugs.python.org/issue35907",
        "https://github.com/python/cpython/pull/11842",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190404-0004/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html",
        "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
        "http://www.securityfocus.com/bid/107549",
        "https://access.redhat.com/errata/RHSA-2019:1700",
        "https://access.redhat.com/errata/RHSA-2019:2030",
        "https://access.redhat.com/errata/RHSA-2019:3335",
        "https://access.redhat.com/errata/RHSA-2019:3520",
        "https://bugs.python.org/issue35907",
        "https://github.com/python/cpython/pull/11842",
        "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2019/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
        "https://seclists.org/bugtraq/2019/Oct/29",
        "https://security.gentoo.org/glsa/202003-26",
        "https://security.netapp.com/advisory/ntap-20190404-0004/",
        "https://usn.ubuntu.com/4127-1/",
        "https://usn.ubuntu.com/4127-2/"
      ],
      "score": 9.1,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
      "weakness": "CWE-22"
    },
    "CVE-2020-12845": {
      "id": "CVE-2020-12845",
      "references": [
        "http://cherokee-project.com/downloads.html",
        "https://github.com/cherokee/webserver/issues/1242",
        "https://github.com/cherokee/webserver/releases",
        "https://security.gentoo.org/glsa/202012-09",
        "http://cherokee-project.com/downloads.html",
        "https://github.com/cherokee/webserver/issues/1242",
        "https://github.com/cherokee/webserver/releases",
        "https://security.gentoo.org/glsa/202012-09"
      ],
      "score": 7.5,
      "services": [
        "9092/http"
      ],
      "severity": "high",
      "summary": "Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2020-14145": {
      "id": "CVE-2020-14145",
      "references": [
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-203"
    },
    "CVE-2020-14422": {
      "id": "CVE-2020-14422",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html",
        "https://bugs.python.org/issue41004",
        "https://github.com/python/cpython/pull/20956",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCCZTAYZATTNSNEAXWA7U3HCO2OVQKT5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X36Y523UAZY5QFXZAAORNFY63HLBWX7N/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/",
        "https://security.gentoo.org/glsa/202008-01",
        "https://security.netapp.com/advisory/ntap-20200724-0004/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html",
        "https://bugs.python.org/issue41004",
        "https://github.com/python/cpython/pull/20956",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCCZTAYZATTNSNEAXWA7U3HCO2OVQKT5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X36Y523UAZY5QFXZAAORNFY63HLBWX7N/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/",
        "https://security.gentoo.org/glsa/202008-01",
        "https://security.netapp.com/advisory/ntap-20200724-0004/",
        "https://usn.ubuntu.com/4428-1/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 5.9,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-330"
    },
    "CVE-2020-15523": {
      "id": "CVE-2020-15523",
      "references": [
        "https://bugs.python.org/issue29778",
        "https://github.com/python/cpython/pull/21297",
        "https://security.netapp.com/advisory/ntap-20210312-0004/",
        "https://bugs.python.org/issue29778",
        "https://github.com/python/cpython/pull/21297",
        "https://security.netapp.com/advisory/ntap-20210312-0004/"
      ],
      "score": 7.8,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-427"
    },
    "CVE-2020-15778": {
      "id": "CVE-2020-15778",
      "references": [
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html",
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html"
      ],
      "score": 7.4,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
      "vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2020-17508": {
      "id": "CVE-2020-17508",
      "references": [
        "https://lists.apache.org/thread.html/r65434f7acca3aebf81b0588587149c893fe9f8f9f159eaa7364a70ff%40%3Cannounce.trafficserver.apache.org%3E"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "The ATS ESI plugin has a memory disclosure vulnerability. If you are running the plugin please upgrade. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-17509": {
      "id": "CVE-2020-17509",
      "references": [
        "https://lists.apache.org/thread.html/raa9f0589c26c4d146646425e51e2a33e1457492df9f7ea2019daa6d3%40%3Cannounce.trafficserver.apache.org%3E"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2020-1944": {
      "id": "CVE-2020-1944",
      "references": [
        "https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2020/dsa-4672"
      ],
      "score": 9.8,
      "services": [
        "445/http-proxy"
      ],
      "severity": "critical",
      "summary": "There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and Transfer-Encoding and Content length headers. Upgrade to versions 7.1.9 and 8.0.6 or later versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2020-26116": {
      "id": "CVE-2020-26116",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html",
        "https://bugs.python.org/issue39603",
        "https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/",
        "https://python-security.readthedocs.io/vuln/http-header-injection-method.html",
        "https://security.gentoo.org/glsa/202101-18",
        "https://security.netapp.com/advisory/ntap-20201023-0001/",
        "https://usn.ubuntu.com/4581-1/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html",
        "https://bugs.python.org/issue39603",
        "https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/",
        "https://python-security.readthedocs.io/vuln/http-header-injection-method.html",
        "https://security.gentoo.org/glsa/202101-18",
        "https://security.netapp.com/advisory/ntap-20201023-0001/",
        "https://usn.ubuntu.com/4581-1/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.2,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2020-27619": {
      "id": "CVE-2020-27619",
      "references": [
        "https://bugs.python.org/issue41944",
        "https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
        "https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
        "https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
        "https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
        "https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
        "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
        "https://security.gentoo.org/glsa/202402-04",
        "https://security.netapp.com/advisory/ntap-20201123-0004/",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://bugs.python.org/issue41944",
        "https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8",
        "https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9",
        "https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33",
        "https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794",
        "https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b",
        "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
        "https://security.gentoo.org/glsa/202402-04",
        "https://security.netapp.com/advisory/ntap-20201123-0004/",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-8315": {
      "id": "CVE-2020-8315",
      "references": [
        "https://bugs.python.org/issue39401",
        "https://bugs.python.org/issue39401"
      ],
      "score": 5.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
      "weakness": "CWE-427"
    },
    "CVE-2020-8492": {
      "id": "CVE-2020-8492",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
        "https://bugs.python.org/issue39503",
        "https://github.com/python/cpython/pull/18284",
        "https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
        "https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html",
        "https://security.gentoo.org/glsa/202005-09",
        "https://security.netapp.com/advisory/ntap-20200221-0001/",
        "https://usn.ubuntu.com/4333-1/",
        "https://usn.ubuntu.com/4333-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html",
        "https://bugs.python.org/issue39503",
        "https://github.com/python/cpython/pull/18284",
        "https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/",
        "https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html",
        "https://security.gentoo.org/glsa/202005-09",
        "https://security.netapp.com/advisory/ntap-20200221-0001/",
        "https://usn.ubuntu.com/4333-1/",
        "https://usn.ubuntu.com/4333-2/"
      ],
      "score": 6.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2020-9481": {
      "id": "CVE-2020-9481",
      "references": [
        "https://lists.apache.org/thread.html/r21ddaf0a4a973f3c43c7ff399ae50d2f858f13f87bd6a9551c5cf6db%40%3Cannounce.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2020/dsa-4672"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Apache ATS 6.0.0 to 6.2.3, 7.0.0 to 7.1.9, and 8.0.0 to 8.0.6 is vulnerable to a HTTP/2 slow read attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2020-9494": {
      "id": "CVE-2020-9494",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/03/01/2",
        "https://lists.apache.org/thread.html/rf7f86917f42fdaf904d99560cba0c016e03baea6244c47efeb60ecbe%40%3Cdev.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2020/dsa-4710"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2021-23336": {
      "id": "CVE-2021-23336",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/02/19/4",
        "http://www.openwall.com/lists/oss-security/2021/05/01/2",
        "https://github.com/python/cpython/pull/24297",
        "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
        "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
        "https://security.gentoo.org/glsa/202104-04",
        "https://security.netapp.com/advisory/ntap-20210326-0004/",
        "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
        "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
        "https://www.oracle.com//security-alerts/cpujul2021.html",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://www.openwall.com/lists/oss-security/2021/02/19/4",
        "http://www.openwall.com/lists/oss-security/2021/05/01/2",
        "https://github.com/python/cpython/pull/24297",
        "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
        "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
        "https://security.gentoo.org/glsa/202104-04",
        "https://security.netapp.com/advisory/ntap-20210326-0004/",
        "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
        "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
        "https://www.oracle.com//security-alerts/cpujul2021.html",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 5.9,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2021-27577": {
      "id": "CVE-2021-27577",
      "references": [
        "https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2021/dsa-4957"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2021-28861": {
      "id": "CVE-2021-28861",
      "references": [
        "https://bugs.python.org/issue43223",
        "https://github.com/python/cpython/pull/24848",
        "https://github.com/python/cpython/pull/93879",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2TRINJE3INWDVIHIABW4L2NP3RUSK7BJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LTSPFIULY2GZJN3QYNFVM4JSU6H4D6J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OABQ5CMPQETJLFHROAXDIDXCMDTNVYG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DISZAFSIQ7IAPAEQTC7G2Z5QUA2V2PSW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPX4XHT2FGVQYLY2STT2MRVENILNZTTU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3MQT5ZE3QH5PVDJMERTBOCILHK35CBE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRGKPYA5YHIXQAMRIXO5DSCX7D4UUW4Q/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLE5INSVJUZJGY5OJXV6JREXWD7UDHYN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G66SRWUM36ENQ3X6LAIG7HAB27D4XJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZEPOPUFC42KXXSLFPZ47ZZRGPOR7SQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X46T4EFTIBXZRYTGASBDEZGYJINH2OWV/",
        "https://security.gentoo.org/glsa/202305-02",
        "https://bugs.python.org/issue43223",
        "https://github.com/python/cpython/pull/24848",
        "https://github.com/python/cpython/pull/93879",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2TRINJE3INWDVIHIABW4L2NP3RUSK7BJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LTSPFIULY2GZJN3QYNFVM4JSU6H4D6J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OABQ5CMPQETJLFHROAXDIDXCMDTNVYG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DISZAFSIQ7IAPAEQTC7G2Z5QUA2V2PSW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPX4XHT2FGVQYLY2STT2MRVENILNZTTU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3MQT5ZE3QH5PVDJMERTBOCILHK35CBE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRGKPYA5YHIXQAMRIXO5DSCX7D4UUW4Q/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLE5INSVJUZJGY5OJXV6JREXWD7UDHYN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G66SRWUM36ENQ3X6LAIG7HAB27D4XJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZEPOPUFC42KXXSLFPZ47ZZRGPOR7SQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X46T4EFTIBXZRYTGASBDEZGYJINH2OWV/",
        "https://security.gentoo.org/glsa/202305-02"
      ],
      "score": 7.4,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
      "weakness": "CWE-601"
    },
    "CVE-2021-3177": {
      "id": "CVE-2021-3177",
      "references": [
        "https://bugs.python.org/issue42938",
        "https://github.com/python/cpython/pull/24239",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/",
        "https://news.ycombinator.com/item?id=26185005",
        "https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html",
        "https://security.gentoo.org/glsa/202101-18",
        "https://security.netapp.com/advisory/ntap-20210226-0003/",
        "https://www.oracle.com//security-alerts/cpujul2021.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "https://bugs.python.org/issue42938",
        "https://github.com/python/cpython/pull/24239",
        "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/",
        "https://news.ycombinator.com/item?id=26185005",
        "https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html",
        "https://security.gentoo.org/glsa/202101-18",
        "https://security.netapp.com/advisory/ntap-20210226-0003/",
        "https://www.oracle.com//security-alerts/cpujul2021.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2021-32565": {
      "id": "CVE-2021-32565",
      "references": [
        "https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2021/dsa-4957"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2021-32566": {
      "id": "CVE-2021-32566",
      "references": [
        "https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2021/dsa-4957"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2021-32567": {
      "id": "CVE-2021-32567",
      "references": [
        "https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2021/dsa-4957"
      ],
      "score": 7.5,
      "services": [
        "445/http-proxy"
      ],
      "severity": "high",
      "summary": "Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2021-3426": {
      "id": "CVE-2021-3426",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
        "https://security.gentoo.org/glsa/202104-04",
        "https://security.netapp.com/advisory/ntap-20210629-0003/",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1935913",
        "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/",
        "https://security.gentoo.org/glsa/202104-04",
        "https://security.netapp.com/advisory/ntap-20210629-0003/",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 5.7,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
      "vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2021-35474": {
      "id": "CVE-2021-35474",
      "references": [
        "https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E",
        "https://www.debian.org/security/2021/dsa-4957"
      ],
      "score": 9.8,
      "services": [
        "445/http-proxy"
      ],
      "severity": "critical",
      "summary": "Stack-based Buffer Overflow vulnerability in cachekey plugin of Apache Traffic Server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2021-36368": {
      "id": "CVE-2021-36368",
      "references": [
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html",
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html"
      ],
      "score": 3.7,
      "services": [
        "22/ssh"
      ],
      "severity": "low",
      "summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-287"
    },
    "CVE-2021-3733": {
      "id": "CVE-2021-3733",
      "references": [
        "https://bugs.python.org/issue43075",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
        "https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
        "https://github.com/python/cpython/pull/24391",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://security.netapp.com/advisory/ntap-20220407-0001/",
        "https://ubuntu.com/security/CVE-2021-3733",
        "https://bugs.python.org/issue43075",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1995234",
        "https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb",
        "https://github.com/python/cpython/pull/24391",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://security.netapp.com/advisory/ntap-20220407-0001/",
        "https://ubuntu.com/security/CVE-2021-3733"
      ],
      "score": 6.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2021-3737": {
      "id": "CVE-2021-3737",
      "references": [
        "https://bugs.python.org/issue44022",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
        "https://github.com/python/cpython/pull/25916",
        "https://github.com/python/cpython/pull/26503",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
        "https://security.netapp.com/advisory/ntap-20220407-0009/",
        "https://ubuntu.com/security/CVE-2021-3737",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://bugs.python.org/issue44022",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1995162",
        "https://github.com/python/cpython/pull/25916",
        "https://github.com/python/cpython/pull/26503",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
        "https://security.netapp.com/advisory/ntap-20220407-0009/",
        "https://ubuntu.com/security/CVE-2021-3737",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-835"
    },
    "CVE-2021-41617": {
      "id": "CVE-2021-41617",
      "references": [
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174",
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2021-4189": {
      "id": "CVE-2021-4189",
      "references": [
        "https://access.redhat.com/security/cve/CVE-2021-4189",
        "https://bugs.python.org/issue43285",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
        "https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
        "https://security-tracker.debian.org/tracker/CVE-2021-4189",
        "https://security.netapp.com/advisory/ntap-20221104-0004/",
        "https://access.redhat.com/security/cve/CVE-2021-4189",
        "https://bugs.python.org/issue43285",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2036020",
        "https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
        "https://security-tracker.debian.org/tracker/CVE-2021-4189",
        "https://security.netapp.com/advisory/ntap-20221104-0004/"
      ],
      "score": 5.3,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-252"
    },
    "CVE-2022-0391": {
      "id": "CVE-2022-0391",
      "references": [
        "https://bugs.python.org/issue43882",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
        "https://security.gentoo.org/glsa/202305-02",
        "https://security.netapp.com/advisory/ntap-20220225-0009/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://bugs.python.org/issue43882",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/",
        "https://security.gentoo.org/glsa/202305-02",
        "https://security.netapp.com/advisory/ntap-20220225-0009/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2022-22707": {
      "id": "CVE-2022-22707",
      "references": [
        "https://redmine.lighttpd.net/issues/3134",
        "https://www.debian.org/security/2022/dsa-5040",
        "https://redmine.lighttpd.net/issues/3134",
        "https://www.debian.org/security/2022/dsa-5040"
      ],
      "score": 5.9,
      "services": [
        "27017/http"
      ],
      "severity": "medium",
      "summary": "In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2022-26488": {
      "id": "CVE-2022-26488",
      "references": [
        "https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/",
        "https://security.netapp.com/advisory/ntap-20220419-0005/",
        "https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/",
        "https://security.netapp.com/advisory/ntap-20220419-0005/"
      ],
      "score": 7,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-426"
    },
    "CVE-2022-31681": {
      "id": "CVE-2022-31681",
      "references": [
        "https://www.vmware.com/security/advisories/VMSA-2022-0025.html"
      ],
      "score": 6.5,
      "services": [
        "5984/http"
      ],
      "severity": "medium",
      "summary": "VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2022-37454": {
      "id": "CVE-2022-37454",
      "references": [
        "https://csrc.nist.gov/projects/hash-functions/sha-3-project",
        "https://eprint.iacr.org/2023/331",
        "https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658",
        "https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html",
        "https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/",
        "https://mouha.be/sha-3-buffer-overflow/",
        "https://news.ycombinator.com/item?id=33281106",
        "https://news.ycombinator.com/item?id=35050307",
        "https://security.gentoo.org/glsa/202305-02",
        "https://www.debian.org/security/2022/dsa-5267",
        "https://www.debian.org/security/2022/dsa-5269",
        "https://csrc.nist.gov/projects/hash-functions/sha-3-project",
        "https://eprint.iacr.org/2023/331",
        "https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658",
        "https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html",
        "https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/",
        "https://mouha.be/sha-3-buffer-overflow/",
        "https://news.ycombinator.com/item?id=33281106",
        "https://news.ycombinator.com/item?id=35050307",
        "https://security.gentoo.org/glsa/202305-02",
        "https://security.netapp.com/advisory/ntap-20230203-0001/",
        "https://www.debian.org/security/2022/dsa-5267",
        "https://www.debian.org/security/2022/dsa-5269"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-41556": {
      "id": "CVE-2022-41556",
      "references": [
        "https://git.lighttpd.net/lighttpd/lighttpd1.4/commit/b18de6f9264f914f7bf493abd3b6059343548e50",
        "https://github.com/lighttpd/lighttpd1.4/compare/lighttpd-1.4.66...lighttpd-1.4.67",
        "https://github.com/lighttpd/lighttpd1.4/pull/115",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVOSBSCMLGCHH2Z74H64ZWVDFJFQTBC2/",
        "https://security.gentoo.org/glsa/202210-12",
        "https://git.lighttpd.net/lighttpd/lighttpd1.4/commit/b18de6f9264f914f7bf493abd3b6059343548e50",
        "https://github.com/lighttpd/lighttpd1.4/compare/lighttpd-1.4.66...lighttpd-1.4.67",
        "https://github.com/lighttpd/lighttpd1.4/pull/115",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVOSBSCMLGCHH2Z74H64ZWVDFJFQTBC2/",
        "https://security.gentoo.org/glsa/202210-12"
      ],
      "score": 7.5,
      "services": [
        "27017/http"
      ],
      "severity": "high",
      "summary": "A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-401"
    },
    "CVE-2022-45061": {
      "id": "CVE-2022-45061",
      "references": [
        "https://github.com/python/cpython/issues/98433",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
        "https://security.gentoo.org/glsa/202305-02",
        "https://security.netapp.com/advisory/ntap-20221209-0007/",
        "https://github.com/python/cpython/issues/98433",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
        "https://security.gentoo.org/glsa/202305-02",
        "https://security.netapp.com/advisory/ntap-20221209-0007/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-407"
    },
    "CVE-2022-48560": {
      "id": "CVE-2022-48560",
      "references": [
        "https://bugs.python.org/issue39421",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
        "https://security.netapp.com/advisory/ntap-20230929-0008/",
        "https://bugs.python.org/issue39421",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/",
        "https://security.netapp.com/advisory/ntap-20230929-0008/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-48564": {
      "id": "CVE-2022-48564",
      "references": [
        "https://bugs.python.org/issue42103",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://security.netapp.com/advisory/ntap-20230929-0009/",
        "https://bugs.python.org/issue42103",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://security.netapp.com/advisory/ntap-20230929-0009/"
      ],
      "score": 6.5,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "read_ints in plistlib.py in Python through 3.9.1 is vulnerable to a potential DoS attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2022-48565": {
      "id": "CVE-2022-48565",
      "references": [
        "https://bugs.python.org/issue42051",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/",
        "https://security.netapp.com/advisory/ntap-20231006-0007/",
        "https://bugs.python.org/issue42051",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/",
        "https://security.netapp.com/advisory/ntap-20231006-0007/"
      ],
      "score": 9.8,
      "services": [
        "5000/http"
      ],
      "severity": "critical",
      "summary": "An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-611"
    },
    "CVE-2022-48566": {
      "id": "CVE-2022-48566",
      "references": [
        "https://bugs.python.org/issue40791",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://security.netapp.com/advisory/ntap-20231006-0013/",
        "https://bugs.python.org/issue40791",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://security.netapp.com/advisory/ntap-20231006-0013/"
      ],
      "score": 5.9,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-362"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-24329": {
      "id": "CVE-2023-24329",
      "references": [
        "https://github.com/python/cpython/issues/102153",
        "https://github.com/python/cpython/pull/99421",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/",
        "https://pointernull.com/security/python-url-parse-problem.html",
        "https://security.netapp.com/advisory/ntap-20230324-0004/",
        "https://www.kb.cert.org/vuls/id/127587",
        "https://github.com/python/cpython/issues/102153",
        "https://github.com/python/cpython/pull/99421",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/",
        "https://pointernull.com/security/python-url-parse-problem.html",
        "https://security.netapp.com/advisory/ntap-20230324-0004/",
        "https://www.kb.cert.org/vuls/id/127587"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "11434/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-27043": {
      "id": "CVE-2023-27043",
      "references": [
        "http://python.org",
        "https://github.com/python/cpython/issues/102988",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
        "https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html",
        "https://security.netapp.com/advisory/ntap-20230601-0003/",
        "http://python.org",
        "https://github.com/python/cpython/issues/102988",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/",
        "https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html",
        "https://security.netapp.com/advisory/ntap-20230601-0003/"
      ],
      "score": 5.3,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2023-27522": {
      "id": "CVE-2023-27522",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 7.5,
      "services": [
        "11434/http"
      ],
      "severity": "high",
      "summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2023-29552": {
      "id": "CVE-2023-29552",
      "references": [
        "https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html",
        "https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html",
        "https://datatracker.ietf.org/doc/html/rfc2608",
        "https://github.com/curesec/slpload",
        "https://security.netapp.com/advisory/ntap-20230426-0001/",
        "https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp",
        "https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks",
        "https://www.suse.com/support/kb/doc/?id=000021051"
      ],
      "score": 7.5,
      "services": [
        "5984/http"
      ],
      "severity": "high",
      "summary": "The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-36632": {
      "id": "CVE-2023-36632",
      "references": [
        "https://docs.python.org/3/library/email.html",
        "https://docs.python.org/3/library/email.utils.html",
        "https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py",
        "https://github.com/python/cpython/issues/103800",
        "https://docs.python.org/3/library/email.html",
        "https://docs.python.org/3/library/email.utils.html",
        "https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py",
        "https://github.com/python/cpython/issues/103800"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger \"RecursionError: maximum recursion depth exceeded while calling a Python object\" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-674"
    },
    "CVE-2023-38408": {
      "id": "CVE-2023-38408",
      "references": [
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
      ],
      "score": 9.8,
      "services": [
        "22/ssh"
      ],
      "severity": "critical",
      "summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-428"
    },
    "CVE-2023-40217": {
      "id": "CVE-2023-40217",
      "references": [
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/",
        "https://security.netapp.com/advisory/ntap-20231006-0014/",
        "https://www.python.org/dev/security/",
        "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
        "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
        "https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/",
        "https://security.netapp.com/advisory/ntap-20231006-0014/",
        "https://www.python.org/dev/security/"
      ],
      "score": 5.3,
      "services": [
        "5000/http"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-43336": {
      "id": "CVE-2023-43336",
      "references": [
        "http://freepbx.com",
        "http://sangoma.com",
        "https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826",
        "http://freepbx.com",
        "http://sangoma.com",
        "https://medium.com/%40janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826"
      ],
      "score": 8.8,
      "services": [
        "2181/sip-proxy"
      ],
      "severity": "high",
      "summary": "Sangoma Technologies FreePBX before cdr 15.0.18, 16.0.40, 15.0.16, and 16.0.17 was discovered to contain an access control issue via a modified parameter value, e.g., changing extension=self to extension=101.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2023-48795": {
      "id": "CVE-2023-48795",
      "references": [
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-354"
    },
    "CVE-2023-51384": {
      "id": "CVE-2023-51384",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 5.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-51385": {
      "id": "CVE-2023-51385",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 6.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
      "weakness": "CWE-78"
    },
    "CVE-2023-51767": {
      "id": "CVE-2023-51767",
      "references": [
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767",
        "https://www.openwall.com/lists/oss-security/2025/09/22/1",
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2024-6232": {
      "id": "CVE-2024-6232",
      "references": [
        "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4",
        "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06",
        "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4",
        "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d",
        "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877",
        "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf",
        "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373",
        "https://github.com/python/cpython/issues/121285",
        "https://github.com/python/cpython/pull/121286",
        "https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
        "http://www.openwall.com/lists/oss-security/2024/09/03/5",
        "https://security.netapp.com/advisory/ntap-20241018-0007/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1333"
    },
    "CVE-2024-7592": {
      "id": "CVE-2024-7592",
      "references": [
        "https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621",
        "https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef",
        "https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06",
        "https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a",
        "https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f",
        "https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774",
        "https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1",
        "https://github.com/python/cpython/issues/123067",
        "https://github.com/python/cpython/pull/123075",
        "https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/",
        "https://security.netapp.com/advisory/ntap-20241018-0006/"
      ],
      "score": 7.5,
      "services": [
        "5000/http"
      ],
      "severity": "high",
      "summary": "There is a LOW severity vulnerability affecting CPython, specifically the\n'http.cookies' standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    }
  }
}