80.147.76.40
{
"scan_id": 1764908879,
"ip": "80.147.76.40",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "80.147.76.32/27",
"postal_code": "60435",
"coordinates": {
"latitude": "50.1573",
"longitude": "8.6843"
},
"geo_point": "50.1573, 8.6843",
"locale_code": "en",
"continent": "Europe",
"country_code": "DE",
"country_name": "Germany",
"city": "Frankfurt am Main"
},
"location_updated_at": "2025-12-11T09:32:35Z",
"asn": {
"number": "AS3320",
"organization": "Deutsche Telekom AG",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "80.144.0.0/13",
"organization": "Deutsche Telekom AG, Internet service provider",
"descr": "Deutsche Telekom AG, Internet service provider",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T08:53:17Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-12-11T09:32:35Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-12-11T12:20:11Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-12-11T09:32:35Z"
}
],
"hostnames": [
{
"name": "p50934c28.dip0.t-ipconnect.de",
"last_updated_at": "2025-12-11T12:20:11Z"
}
],
"services": [
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"url": "https://80.147.76.40/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-14T09:55:11.956Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "\n\n\n<!DOCTYPE html>\n<html lang=\"en\">\n\n\n\n<head>\n <meta charset=\"utf-8\"/>\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=Edge\"/>\n <meta HTTP-EQUIV='Pragma' CONTENT='no-cache'>\n <meta HTTP-EQUIV='Cache-Control' CONTENT='no-cache'>\n <title>Log in - SINEMA Remote Connect</title>\n\n <link nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" rel=\"icon\" href=\"data:,\">\n\n <link nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" rel=\"stylesheet\" href=\"/static/css/layout_v3_2.css? 1765218222\"/>\n <link nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" rel=\"stylesheet\" href=\"/static/css/login_v3_2.css? 1765218222\"/>\n <link nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" rel=\"stylesheet\" href=\"/static/css/font-awesome_v3_2.css? 1765218222\"/>\n <link nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" rel=\"stylesheet\" href=\"/static/css/siemens-sans-professional_v3_2.css\"/>\n\n <script nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" src=\"/static/js/jquery/jquery.min.js?v3.2\"></script>\n <script nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" src=\"/static/js/sinemarc.js?v3.2\"></script>\n</head>\n\n<body>\n\n\n\n\n\n\n\n<div class=\"header-wrapper\">\n <div class=\"top-header\">\n <img nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\" src=\"/static/img/logo.gif\" alt=\"SIEMENS\" class=\"logo\"/>\n <div class=\"skip-link\"><a href=\"#maincontent\">Skip to main content</a></div>\n <div class=\"product-name\">SINEMA Remote Connect</div>\n </div>\n <div class=\"sub-header\">\n <div class=\"clock-container\" tabindex=\"0\">\n <span class=\"visually-hidden\">Date & Time</span>\n <span class=\"clock\">1765218222#en#0#</span>\n </div>\n <div class=\"sub-header-right\">\n \n <div class=\"language-selector\" tabindex=\"0\">\n <div class=\"active-language\">\n English\n <span class=\"fa fa-chevron-down\"></span>\n </div>\n <div class=\"language-select-menu\" role=\"button\" aria-label=\"Selected Language Select Combobox\">\n <form action=\"/i18n/setlang/\" method=\"POST\">\n <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"pgWbpTfibQJ8QySwpbJxZaGiHZ9y73ZiKks1rSNATgFhzYZmk4eOqsOwyxE1Kabr\">\n \n <button type=\"submit\" name=\"language\" value=\"de\" tabindex=\"0\" aria-label=\"Language German\"\n class=\"not_selected_lang\">\n German\n \n </button>\n \n <button type=\"submit\" name=\"language\" value=\"en\" tabindex=\"0\" aria-label=\"Language English\"\n class=\"selected_lang\">\n English\n <span class=\"correct-icon\"></span>\n </button>\n \n </form>\n </div>\n </div>\n \n <div class=\"header-divider\"></div>\n <div class=\"online-help\">\n <a href=\"#\" id=\"id_help\" tabindex=\"0\" aria-label=\"Help\" aria-live=\"polite\">\n <span class=\"online-help-icon\"></span>\n </a>\n </div>\n </div>\n </div>\n</div>\n\n<script nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\">\n let languageSelector = $(\".language-selector\");\n $(\"#id_help\").click(() => {\n openHelpWindow('/static/help/en/login_help.htm');\n });\n\n document.addEventListener(\"DOMContentLoaded\", function () {\n let securityTooltip = document.getElementById(\"security-tooltip\");\n\n if (securityTooltip) {\n let ulElement = securityTooltip.querySelector(\"ul\");\n let liCount = ulElement.querySelectorAll(\"li\").length;\n let currentTopMargin = parseFloat(window.getComputedStyle(securityTooltip).marginTop);\n let newTopMargin = currentTopMargin + (32 * liCount);\n securityTooltip.style.marginTop = newTopMargin + \"px\";\n }\n });\n\n languageSelector.on(\"keydown\", function (event) {\n if (event.keyCode === enter_btn_code || event.keyCode === space_btn_code) {\n event.preventDefault();\n $(this).find(\".language-select-menu\").css(\"display\", \"block\");\n }\n\n if(event.keyCode === tab_btn_code) {\n const menu = $(this).find('.language-select-menu');\n menu.removeClass('hidden').addClass('shown');\n }\n });\n\n $(document).on('click focusin', function (event) {\n if (!$(event.target).closest('.language-selector').length) {\n $('.language-select-menu').removeClass('shown').addClass('hidden');\n }\n });\n\n languageSelector.on(\"keydown\", \"button\", function (event) {\n if (event.keyCode === enter_btn_code) {\n event.preventDefault();\n $(this).click();\n }\n });\n\n document.addEventListener(\"keydown\", function (event) {\n if (event.key === \"Enter\") {\n let focusedElement = document.activeElement;\n if (focusedElement.classList.contains(\"logout\") && focusedElement.querySelector(\"a\")) {\n focusedElement.querySelector(\"a\").click();\n }\n }\n });\n</script>\n\n\n<div id=\"maincontent\" class=\"content\">\n <div class=\"login-wrapper\">\n <div class=\"login-form-wrapper\">\n \n \n\n\n<div id=\"banner_text\" class=\"banner_text\">\n \n Welcome to SINEMA Remote Connect\n \n</div>\n\n \n <div class=\"login-tabs\">\n <ul>\n <li tabindex=\"0\">\n <a id=\"localTab\">Local</a>\n </li>\n <li >\n <a id=\"umcTab\"> UMC</a>\n </li>\n <li >\n <a id=\"otherTab\"> OAuth/OpenID</a>\n </li>\n </ul>\n </div>\n \n \n <div class=\"sinema-messages\" id=\"id_sinema-messages\"></div>\n \n \n\n <div id=\"local\" class=\"tab-content\">\n \n \n \n\n\n<form method=\"POST\" action=\"/wbm/login/\" class=\"login-form\">\n \n <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"pgWbpTfibQJ8QySwpbJxZaGiHZ9y73ZiKks1rSNATgFhzYZmk4eOqsOwyxE1Kabr\">\n <input id=\"id_utcoffset\" name=\"utcoffset\" type=\"hidden\" value=\"0\"/>\n <table class=\"form\">\n <tr>\n <th>\n <label>User name:</label>\n </th>\n <td>\n <input type=\"text\" name=\"username\" autofocus autocapitalize=\"none\" autocomplete=\"username\" maxlength=\"254\" required id=\"id_username\">\n </td>\n </tr>\n <tr>\n <th>\n <label for=\"id_password\">Password:</label>\n </th>\n <td>\n <input id=\"id_password\" name=\"password\" type=\"password\" autocomplete=\"off\"/>\n </td>\n </tr>\n <tr>\n <th></th>\n <td class=\"action-buttons-container\">\n <div class=\"action-buttons-wrapper\">\n <button type=\"submit\" id=\"id_submit\">\n <span class=\"button-text\">Log in</span>\n </button>\n </div>\n </td>\n </tr>\n \n </table>\n \n</form>\n\n \n </div>\n <div id=\"umc\" class=\"tab-content hidden\">\n \n \n\n\n<div class=\"sinema-messages\" id=\"id_sinema-messages\">\n \n <div class=\"error-box-msg\">\n <span class=\"error-icon\"></span>\n <div class=\"messages-inner-wrapper\">\n U M C S e r v i c e N o t A c t i v a t e d \n </div>\n </div>\n \n</div>\n\n \n </div>\n <div id=\"other\" class=\"tab-content hidden\">\n \n </div>\n <div id=\"pki\" class=\"hidden\">\n \n\n\n\n\n \n\n\n<form method=\"POST\" action=\"/wbm/login/pki/\" class=\"login-form\">\n \n <div class=\"pki-row\">\n \n <input type=\"image\" src=\"/static/img/chip-icon.png\" disabled=\"disabled\" alt=\"\">\n \n <p>Log in with smart card</p>\n </div>\n \n</form>\n\n\n\n </div>\n </div>\n </div>\n</div>\n</body>\n</html>\n\n<script nonce=\"R+K9AqwjHQjuCAsNIZe8/Q==\">\n \n let value = new Date().getTimezoneOffset() * -1;\n $(\"#id_utcoffset\").prop('value', value);\n\n let usernameInput = $(\"#id_username\");\n usernameInput.focus().val(usernameInput.val());\n\n $(document).ready(() => {\n PasswordFieldEncoder.init('b6en4c__')\n \n toggleLoginForm(\"localTab\");\n \n });\n\n $(document).on(\"click\", \"#localTab\", (event) => {\n openLoginForm(event);\n });\n\n \n\n \n\n function toggleLoginForm(formName) {\n let local = $(\"#local\");\n let umc = $(\"#umc\");\n let pki = $(\"#pki\");\n let localTab = $('#localTab');\n let umcTab = $('#umcTab');\n let other = $(\"#other\");\n let otherTab = $('#otherTab');\n\n localTab.removeClass(\"active\");\n umcTab.removeClass(\"active\");\n otherTab.removeClass(\"active\");\n\n local.css(\"display\", \"none\");\n umc.css(\"display\", \"none\");\n other.css(\"display\", \"none\");\n pki.css(\"display\", \"none\");\n\n if (formName === \"localTab\") {\n localTab.addClass(\"active\");\n local.css(\"display\", \"block\");\n pki.css(\"display\", \"block\");\n } else if (formName === \"umcTab\") {\n umcTab.addClass(\"active\");\n umc.css(\"display\", \"block\");\n \n } else {\n otherTab.addClass(\"active\");\n other.css({\n \"margin-left\": \"0px\",\n \"display\": \"flex\",\n \"justify-content\": \"center\",\n \"align-items\": \"center\"\n });\n }\n }\n\n function openLoginForm(e) {\n cleanMessages();\n toggleLoginForm(e.currentTarget.id);\n }\n\n document.addEventListener(\"keydown\", function (event) {\n if (event.key === \"Enter\") {\n let focusedTab = $(\".login-tabs li[tabindex='0']:focus\");\n if (focusedTab.length) {\n let formName = focusedTab.find(\"a\").attr(\"id\");\n toggleLoginForm(formName);\n }\n }\n });\n</script>\n",
"body_murmur": 2026002651,
"body_sha256": "a80e905d3aedcf497f62e326b717348dfac2335d565b574b8a3359209aeb16e9",
"component": [
"Apache HTTP Server",
"Django",
"Python"
],
"content_length": 10555,
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate, private"
],
"content_language": [
"en"
],
"content_length": [
"10555"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Mon, 08 Dec 2025 18:23:42 GMT"
],
"expires": [
"Mon, 08 Dec 2025 18:23:42 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
],
"set_cookie": [
"csrftoken=cDn8ddw3jcsetqGLC5MyF3UJgfwVAdm7xHTYfc4l1ConcQNBxYhP6l2X7N1odkyg; expires=Mon, 07 Dec 2026 18:23:42 GMT; HttpOnly; Max-Age=31449600; Path=/; SameSite=Lax; Secure",
"sessionid=9ew3p06n47fk660uf9gk9qegva02ezqt; HttpOnly; Path=/; SameSite=Lax; Secure"
],
"strict_transport_security": [
"max-age=15768000"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"same-origin"
]
}
],
"vary": [
"Cookie,Accept-Language"
],
"x_content_type_options": [
"nosniff",
"nosniff"
],
"x_frame_options": [
"sameorigin"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate, private"
],
"content_language": [
"en"
],
"content_length": [
"0"
],
"content_security_policy": [
"object-src 'none'; style-src 'self' 'unsafe-hashes' 'sha256-qnVkQSG7pWu17hBhIw0kCpfEB3XGvt0mNRa6+uM6OUU=' 'sha256-ZdHxw9eWtnxUb3mk6tBS+gIiVUPE3pGM470keHPDFlE=' 'sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=' 'sha256-aqNNdDLnnrDOnTNdkJpYlAxKVJtLt9CtFLklmInuUAE=' 'sha256-0EZqoz+oBhx7gF4nvY2bSqoGyy4zLjNF+SDQXGp/ZrY=' 'sha256-hdo5lgEl9ZlMSnt87D31xEstuIt3dU2gYIhP0SXhIX8=' 'sha256-wcJQ1UvEnfl6ml4KBIA1Wtx4o/Cn5VrV93Q1XQa7Lvs=' 'sha256-t6oewASd7J1vBg5mQtX4hl8bg8FeegYFM3scKLIhYUc=' 'sha256-RCNbEweJRKX4yAGkf4Rt5O9lK3UrR7DoJg1gUN//iQs=' 'sha256-xJX1Yqd3Luu8RL1+MdF6aq6foisSBFx4zhH+uBr9WRs=' 'sha256-4VkQzG4VloYOs7cS7M0++Xe8RvOcK1FRXH/yW0Ft4Dk=' 'sha256-IOWYPccv4+GIAWz50PQ4hgBzwty+G8ckj9XrN5jdx6g='; default-src 'self'; img-src 'self' data: https: about:; script-src 'self'; frame-ancestors 'self'"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Mon, 08 Dec 2025 18:23:42 GMT"
],
"location": [
"/wbm/login/"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
],
"strict_transport_security": [
"max-age=15768000"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"same-origin"
]
}
],
"vary": [
"Accept-Language,Cookie"
],
"x_content_type_options": [
"nosniff",
"nosniff"
],
"x_frame_options": [
"sameorigin"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "/wbm/login/",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Found"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://80.147.76.40:6443"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "80.147.76.40:6443",
"path": "/wbm/login/",
"scheme": "https"
}
},
"status_code": 200,
"title": "Log in - SINEMA Remote Connect"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"sinemarc.imm-maschinenbau.de"
],
"ip_address": [
"80.147.76.40",
"192.168.50.18"
]
}
},
"fingerprint_md5": "2FB392A01277097136516A6A6F24D62C",
"fingerprint_sha1": "6CFCBB5A4B697DCC08210CB3657DBEBB1D004DE1",
"fingerprint_sha256": "FE2989F3BB8F8D78A1019E5DEB6F0B75E86A328F74B30978A0EE370707B20D2E",
"issuer": {
"common_name": [
"CA 228636 SINEMA RC"
]
},
"issuer_dn": "/CN=CA 228636 SINEMA RC",
"jarm": "15d15d15d29d15d00042d42d000000ed3bcba39b97e2d41fffa7e67a75c095",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"sinemarc.imm-maschinenbau.de"
]
},
"subject_alt_name": {
"dns_names": [
"sinemarc.imm-maschinenbau.de"
],
"extended_dns_names": [
{
"domain": "imm-maschinenbau",
"fld": "imm-maschinenbau.de",
"subdomain": "sinemarc",
"tld": "de"
}
]
},
"subject_dn": "/CN=sinemarc.imm-maschinenbau.de",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "5dfb18e33ab02e4bc7f8968178ca6456e3483934fb5f0f98537b7e1fe0599c63",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "d193cecc226cc2d0e6f41735ee703c44658dc5dc3b64eb56681946afbe2bf090",
"validation_level": "DV",
"validity": {
"length_seconds": 31708800,
"not_after": "2026-05-10T11:58:22",
"not_before": "2025-05-08T11:58:22"
},
"version": 2
},
"fingerprint_sha256": "FE2989F3BB8F8D78A1019E5DEB6F0B75E86A328F74B30978A0EE370707B20D2E",
"precert": false,
"raw": "MIIFJzCCAw+gAwIBAgIBATANBgkqhkiG9w0BAQsFADAeMRwwGgYDVQQDDBNDQSAyMjg2MzYgU0lORU1BIFJDMB4XDTI1MDUwODExNTgyMloXDTI2MDUxMDExNTgyMlowJzElMCMGA1UEAwwcc2luZW1hcmMuaW1tLW1hc2NoaW5lbmJhdS5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAM2BwLrAB5odkyWYDL9MGFaV51fGoLy2bNDCugstlfv5ZBU9p7yy3E8jGfUXv5SL7BSMnakIrXcePObBll1fevz7BzEMA/ESE2EVs0dythctJ/y6bD1MA6ygGL/xsfrG0ay1ZwYMKEOfTSbFCUM9GPvWTyGG/ZCVOiBbb2Okm+Z9AiGiRtkXJ8Yipc5G3sLVWBT/wwyS4x0FMg8ZUA2mDGeL2FzyZz5jTfopxE734gVYjWwicqb3mjgclwPm+D12eAqXvbms5JCTgAE71tzoYmi4yOxzFv9ELZWMJzReZdrLRcpp2Zgo/zvbxnG5vopIr5nJaN2J3Cpyk7ZqczbPYYkQZp53ENC/yF6Ww6srJisydH3Oytksyns5xX8PlR7YGpAb6+ba7pvT4B+8xIazHYzGbeiz/MN/H1We48/90p4KRDwkWP3yoal5jPj1HZJvL6VQYOsO84ez/MvGY8QWZlzOcmDwjTXCm5OzXJcaJWmPIevW0fXb7mQeoAFTUmbGu9NakZ1B9Xd2b05QQt0SWK5BpiDT9oJA+KDBVGYGUaEwC54ldnyl+BcKt1jwogh2E7+8Q2Clqzg7Kibdt18FixmEK+289sPk+59LnB3U60EnoKp6LFVLyISgs/HQ1kiEsWf/uuzMaUNTyeonyTICtTpqpphHE1LZkMWzP2gCFdWtAgMBAAGjZzBlMAkGA1UdEwQCMAAwCwYDVR0PBAQDAgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMBMDYGA1UdEQEB/wQsMCqHBFCTTCiHBMCoMhKCHHNpbmVtYXJjLmltbS1tYXNjaGluZW5iYXUuZGUwDQYJKoZIhvcNAQELBQADggIBAIikBMZ1U0lgj6gE48lJ/0BSLQvose6wyEW+Ye6FVcVJOu0TnQe3wlsMHdDWZnGpWoVotbaCtBfx4Aw3D+FWC0iQoBdQFu1a1aTuKKMmCKRg4PZSjGE9C06PQMScyjQ1/5C0i4Vy3g0AkoD4snRzdS8HoMXN/u9MqMiWa5IyMGQRTfYwBRUAFoqLZ2hiP5cCJHST4h6KuK63Zmz+EcZtBzzueNLnC3m1HALnuXNyp8thju3rlZjbxbv1ytj00j4TxVjlh+8WdJCRSIpcd5djYdQSyJt0afJgHT/Lfmu7baxRqhSXIp6SWJJ6t+j8FWOtRnEBQ5fwwcTeSAmq6xana71Hw6au4KoDVTm6NrxtpomMhUzgF0m5QeIQmE/zyz3k0UlhIkzbRCzCztIux4rDy/F9DQ8ywuR3cKOFhDCT67gHCQ5M12UwsFgUsTnhh6W4lcDHoBQlpQ2+rze0AceKUDsQlzxU+fuphZN5Cs3CNzGZcNUqKdTIrEVuDNzxPvoH3X14FRgXbiW/QTv6bD64otxR+XYvsY/T5Ux8SO8LSEHV7YGcnvckm6TgZgB4O9aAzoPrOMMipBwB47WNgWRMWcChRZp5QBL78do22Hq+O6CqQpMaYIitNqk0xiOaQiutHHjekuo0Qwu6+M7EahSelopI6v5hp7Ok4wMel5bthZI9",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://80.147.76.40:6443/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-09T16:51:10.848Z"
}
],
"services_hash": "3f080afebbc5efa3b10c12cd014b0eb1d304d101902dfe5a0cce094338f6f318",
"last_updated_at": "2025-12-14T09:55:11.956Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0070": {
"id": "CVE-1999-0070",
"references": [
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
],
"score": 5,
"services": [
"6443/http"
],
"severity": "medium",
"summary": "test-cgi program allows an attacker to list files on the server.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-1999-1199": {
"id": "CVE-1999-1199",
"references": [
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 10,
"services": [
"6443/http"
],
"severity": "high",
"summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"6443/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"6443/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
}
}
}