URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-re...
Submission: On September 27 via api from US — Scanned from DE

Summary

This website contacted 12 IPs in 2 countries across 10 domains to perform 82 HTTP transactions. The main IP is 45.79.104.24, located in Fremont, United States and belongs to LINODE-AP Linode, LLC, US. The main domain is www.iicybersecurity.com.
TLS certificate: Issued by R3 on July 28th 2021. Valid for: 3 months.
This is the only time www.iicybersecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
52 www.iicybersecurity.com www.iicybersecurity.com
7 fonts.gstatic.com fonts.googleapis.com
www.google.com
4 www.gstatic.com www.google.com
www.gstatic.com
4 www.google.com www.iicybersecurity.com
www.gstatic.com
www.google.com
4 maps.googleapis.com www.iicybersecurity.com
maps.googleapis.com
2 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
1 api.pinterest.com www.iicybersecurity.com
1 graph.facebook.com www.iicybersecurity.com
1 www.linkedin.com www.iicybersecurity.com
1 clients6.google.com www.iicybersecurity.com
1 iicybersecurity.com www.iicybersecurity.com
1 www.googletagmanager.com www.iicybersecurity.com
1 fonts.googleapis.com www.iicybersecurity.com
0 urls.api.twitter.com Failed www.iicybersecurity.com
82 14
Subject Issuer Validity Valid
iicybersecurity.com
R3
2021-07-28 -
2021-10-26
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
*.google-analytics.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
www.google.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2021-07-18 -
2022-01-18
6 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2021-09-09 -
2021-12-08
3 months crt.sh
*.pinterest.com
DigiCert TLS RSA SHA256 2020 CA1
2021-07-26 -
2022-08-05
a year crt.sh

This page contains 2 frames:

Primary Page: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Frame ID: 02DDC4F80F4B711B03F80B0642E34486
Requests: 73 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Frame ID: D3E3E5E8AEC153A0330C7FE5F921D34D
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Critical authentication bypass vulnerability in Trend Micro ServerProtect allows unauthorized remote user to become Admin | IICS

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/
  • wp-embed\.min\.js\?ver=([\d.]+)

Overall confidence: 100%
Detected patterns
  • //maps\.google(?:apis)?\.com/maps/api/js

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • google-analytics\.com/(?:ga|urchin|analytics)\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • lightbox(?:-plus-jquery)?.{0,32}\.js

Overall confidence: 100%
Detected patterns
  • ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js


Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[\'"][^']+revslider[/\w-]+\.css\?ver=([0-9.]+)[\'"]
  • /revslider/[/\w-]+/js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • /recaptcha/api\.js

Page Statistics

82
Requests

98 %
HTTPS

82 %
IPv6

10
Domains

14
Subdomains

12
IPs

2
Countries

1363 kB
Transfer

3536 kB
Size

10
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

82 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
www.iicybersecurity.com/
58 KB
13 KB
Document
General
Full URL
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
c671932a333fd9b15c33335388ba6fffb821aa5ba52a4e01bf5fa184810511f2

Request headers

Host
www.iicybersecurity.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Mon, 27 Sep 2021 16:15:32 GMT
Server
Apache/2.4.29 (Ubuntu)
X-Pingback
https://www.iicybersecurity.com/xmlrpc.php
Link
<https://www.iicybersecurity.com/?p=7010>; rel=shortlink
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
13003
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.iicybersecurity.com/eethychu/css/dist/block-library/
79 KB
11 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/eethychu/css/dist/block-library/style.min.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
9110fc122dda3067c424d9b8ff7747e2030b0bd9298f69a3683d399ad3373a6a

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:32 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"13abe-5c80bde4db1f2-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
10523
styles.css
www.iicybersecurity.com/pegnuksi/contact-form-7/includes/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/includes/css/styles.css?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
070edfef42e0980783d0acf8fa9ca6a9833b994eca13ffaa94e9a2deb47c92cf

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:32 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"a50-5c71133cbf8cd-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
932
cookie-law-info-public.css
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/cookie-law-info-public.css?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
b8fa20af264fcdd99621fc4e3a770927452b0fe382599e0d890a3bfa31152f80

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"c25-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
955
cookie-law-info-gdpr.css
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/
28 KB
5 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/cookie-law-info-gdpr.css?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
1523ddaa632d195a1240668fb5c6870519e3cdfeabd5a346141bcbb03222e2e7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7045-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4941
rs6.css
www.iicybersecurity.com/pegnuksi/revslider/public/assets/css/
59 KB
13 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/css/rs6.css?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
b86f3cdcccad303cb5300fab4d2774eafc3a2788f07ff1f3cd1953dd0debaa3f

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"ea95-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12635
css
fonts.googleapis.com/
22 KB
2 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
18eb06d833f08634df8949c59e7ee975cdbd4b5e327a9466692d7182a61d613d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Mon, 27 Sep 2021 16:15:32 GMT
server
ESF
date
Mon, 27 Sep 2021 16:15:32 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Mon, 27 Sep 2021 16:15:32 GMT
libs.css
www.iicybersecurity.com/oacoaloo/assets/css/
250 KB
37 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
c714efc42fb4a67de94b848cb4880480375095305fd12f2e40d9a97e47f4378d

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3e73e-5ab70d268b416-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
38007
roneous-theme-styles.css
www.iicybersecurity.com/ethajaph/wp-less-cache/
233 KB
34 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/ethajaph/wp-less-cache/roneous-theme-styles.css?ver=1632759308
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
2c1c5a592257746b76d75527a9c53fe64cdfc0a62bf4e9fa455aef53d5b39614

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Sep 2021 16:15:08 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3a583-5ccfc669a2a8d-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
34948
style.css
www.iicybersecurity.com/oacoaloo/
36 KB
8 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/oacoaloo/style.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
960d73d1dbfaa48b13984fa02add3ef3675a3bb1375a6a9b5751adfd23569781

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"910c-5ab70d2685657-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
7516
jquery.min.js
www.iicybersecurity.com/eethychu/js/jquery/
87 KB
31 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
bd4de6a3fc0fb68d6f76ba7b93514b96a92e585c295b5351c31ad92a4b0777ea

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"15db1-5c80bde4e5dd2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
30908
jquery-migrate.min.js
www.iicybersecurity.com/eethychu/js/jquery/
11 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/jquery/jquery-migrate.min.js?ver=3.3.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
029e0a2e809fd6b5dbe76abe8b7a74936be306c9a8c27c814c4d44aa54623300

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 10 Dec 2020 00:41:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"2bd8-5b6116e091160-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4169
cookie-law-info-public.js
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/js/
34 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7739eefcdee8afcb00fbe9a35cc795fff0cff7092b10d56c4190484d42892433

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"8960-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
8168
rbtools.min.js
www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/
117 KB
44 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/rbtools.min.js?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
9556bca5ad5eb24439887d7339fcb687088776bbaa995553aa489c9607cf9e19

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1d25a-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
45119
rs6.min.js
www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/
319 KB
82 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/rs6.min.js?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
60f59e08903c3d0b70e928af542ded081c10a790b6c198c7026788b77f4256ac

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4fd58-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
js
www.googletagmanager.com/gtag/
97 KB
39 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-44744673-1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
bff70dab0644f5d171ee53cb8b4aaa78c7682350512387d041cb645ec6a1db7a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:15:33 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
39312
x-xss-protection
0
last-modified
Mon, 27 Sep 2021 15:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Mon, 27 Sep 2021 16:15:33 GMT
logo.png
iicybersecurity.com/wp-content/uploads/2020/03/
5 KB
5 KB
Image
General
Full URL
https://iicybersecurity.com/wp-content/uploads/2020/03/logo.png
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0ab9dc77e667874d502a0b9ea66071de365d73057e950432b9b7fef7c4f2267e

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1387-5ab70d2978464"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4999
js
maps.googleapis.com/maps/api/
142 KB
46 KB
Script
General
Full URL
https://maps.googleapis.com/maps/api/js?key=AIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&callback=initMap
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
mafe /
Resource Hash
fa44a10aa3bbc8c9eedd47b0455257296d72e6a158d40ac08b6884396632729a
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:15:33 GMT
content-encoding
gzip
vary
Accept-Language
server
mafe
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1800
cross-origin-resource-policy
cross-origin
server-timing
gfet4t7; dur=20
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
47425
x-xss-protection
0
expires
Mon, 27 Sep 2021 16:45:33 GMT
332.app.js
www.iicybersecurity.com/pegnuksi/click-to-chat-for-whatsapp/new/inc/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/click-to-chat-for-whatsapp/new/inc/assets/js/332.app.js?ver=3.4
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5064759a0360c16691dd45b9f71ffa942c37296d549f671dacd12eb97711e06c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 23 Sep 2021 20:32:47 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1131-5ccaf88aa9f75-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1531
regenerator-runtime.min.js
www.iicybersecurity.com/eethychu/js/dist/vendor/
6 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e87a1c5e24f9a7c7dcb437417f0b05b0a3c12947ce32d65c990c988a8b5ed4d7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1906-5c80bde4f28f2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2398
wp-polyfill.min.js
www.iicybersecurity.com/eethychu/js/dist/vendor/
16 KB
6 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
293913879d30bab7499013e935009f5183facbddd63bfc9656a859622590b80b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4056-5c80bde4f57d2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6031
index.js
www.iicybersecurity.com/pegnuksi/contact-form-7/includes/js/
13 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/includes/js/index.js?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
eea0b9621509f98be77c5af1e9b5c952a675bda2b27c419876364017069e0c19

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"32bb-5c71133cbf8cd-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
4071
api.js
www.google.com/recaptcha/
884 B
1019 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?render=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&ver=3.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
5e375155e6aed9bb32e8b86f7e52bec152d096f697765b83a2e1491b5ad3f0a7
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:15:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
585
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:15:33 GMT
index.js
www.iicybersecurity.com/pegnuksi/contact-form-7/modules/recaptcha/
2 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/modules/recaptcha/index.js?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ccdcf774bd0fc2383fb9d2b780148d17b2ceb3dbc355db13cc17edfdc1f511f3

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"739-5c71133cc086d-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
847
bootstrap.js
www.iicybersecurity.com/oacoaloo/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/bootstrap.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
89acc3906884f18f7de7794414158ba7681b88da7c9524b328e58505c80a287c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"8fce-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
9741
imagesloaded.min.js
www.iicybersecurity.com/eethychu/js/
5 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/imagesloaded.min.js?ver=4.1.4
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ff4bd34aa98a0214833619d3d751838db015722dfbbec15cd14dadc66cd67869

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 11 Aug 2020 21:22:52 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"15fd-5aca0ac7d5435-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1834
masonry.min.js
www.iicybersecurity.com/eethychu/js/
24 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/masonry.min.js?ver=4.2.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e00add38134eac2fb8e8e9c09cbfff7bbe57952b210322eb2eecb0a21fc055eb

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 11 Aug 2020 21:22:52 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"5e4a-5aca0ac7d63d5-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
7382
jquery.equalheights.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
941 B
793 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.equalheights.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d82a3e63d5c360dc3e6af602df56cc4f7aee557bb74df4b21ceafdbd94d3106b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3ad-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
444
jquery.smooth-scroll.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.smooth-scroll.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
a66d3e11ff45a67ab99c2d2660007aa5161df3a413e52ec0a686fafce8b23e46

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"dad-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
1481
owl.carousel.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
40 KB
11 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/owl.carousel.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e2992dc5aab651772418f2ec8c8ca41de86d50c4eb6a7afee08b51b6c7dcee17

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9ee5-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
10683
jquery.flexslider.min.js
www.iicybersecurity.com/pegnuksi/js_composer/assets/lib/flexslider/
30 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/js_composer/assets/lib/flexslider/jquery.flexslider.min.js?ver=6.7.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
23cf1b7e88d0a1380682288aa82eb327f78221b2097868f45e11620b3c7a9b60

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 14 Sep 2021 18:32:27 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"77d6-5cbf8cdc26277-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
7374
jquery.social-share-counter.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
4 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.social-share-counter.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
1cdd566186e2e2c2e47e2326c41b9a5c5defbabbca9ed5d9314efa2ff4ac8da4

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"e39-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
1157
flickrPhotoStream.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
862 B
863 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/flickrPhotoStream.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
317d8920b17ba0ce71276796cc066c8b6cd68f9c4cfe455d0d13517556aa34fa

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"35e-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
514
jquery.parallax.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.parallax.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d52085ad6f664ac587e6da61da45b73ea1f27525e217b25c8771ae5b260fa002

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"d86-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1323
waypoint.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
8 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/waypoint.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
a0e3b40e1e73a113883274b72a3f81ba2315bd515973437f2f0e8c81433ed52c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1f5b-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
2594
jquery.counterup.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
1 KB
928 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.counterup.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e650648b3bc4f57300bf192a919da1194479dd069f4c4ed439a2605cb755a738

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"439-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
579
lightbox.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
8 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/lightbox.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5dfae2b18d90cc17e4c8d5b2968f3375b9f8365f056022a59d3ec4f5cc74f0d2

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1e58-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
2365
jquery.mb.YTPlayer.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
32 KB
9 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.mb.YTPlayer.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
db98beb8c3fab7b72638342f3c30a3e41648d4cea10f0575660125f7f51009c4

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7ec4-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
8655
jquery.countdown.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
5 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.countdown.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
198ff864d1599605eaf550c5a0ae7fb0e0e4d7203d86cdcee7c48ef5e9c41a5b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1262-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
2174
fluidvids.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
1 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/fluidvids.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
add71095551eac2fcc2a1a7fe3e341b7e33e01bbcabc8630bbff93d54bfa8db0

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"535-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
739
gmap3.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
25 KB
9 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/gmap3.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
79946018dbc2b6ae5a2c88aeb9361e364d933888f1522bf8e25ea78fbf6480aa

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"6293-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
8946
modernizr.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/modernizr.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
cbf24261cc3548e1f2244975225fd004c8493c9166f8567520668af4b0a14b67

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"c02-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
1487
jquery.throttle.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
736 B
811 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.throttle.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0942374c8462dbb3f61b544b75d8c9b00a238a8bcb6f255c3c9e46147a0673d2

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"2e0-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
462
jQuery.shuffle.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
10 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jQuery.shuffle.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8b41881e704914f121b6eadd12e5b0da41541fabc933ebd93f5a86fd1ea3454e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"27c3-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
3814
scripts.js
www.iicybersecurity.com/oacoaloo/assets/js/
31 KB
6 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/scripts.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d9013df478068e0eba8d9e987b3899fe4fdd3ee33a247e1fbbd1e3f1c319872a

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7ad4-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=91
Content-Length
6162
wp-embed.min.js
www.iicybersecurity.com/eethychu/js/
1 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/wp-embed.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5be614bce53f767993a5f5f14a6badd6aae6bf3af7cbdbf4d31520de49e27991

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Thu, 04 Feb 2021 08:33:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"592-5ba7e8e3e40e0-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
765
wp-emoji-release.min.js
www.iicybersecurity.com/eethychu/js/
18 KB
5 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/wp-emoji-release.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
def5de6254be138b8b35d680d1fdd8b07827d03b8626daebfeeb4157ec330ea7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4705-5c80bde4e1f52-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
4930
hv-WlzNxIFoO84YdfUsTPA.woff2
fonts.gstatic.com/s/biryani/v6/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/biryani/v6/hv-WlzNxIFoO84YdfUsTPA.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e36d75efe076b2a4b04828750686a3fdb68949057cfcb0dc28604308a01f2f30
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Fri, 24 Sep 2021 09:23:20 GMT
x-content-type-options
nosniff
age
283933
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14104
x-xss-protection
0
last-modified
Tue, 01 Sep 2020 04:54:41 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Sat, 24 Sep 2022 09:23:20 GMT
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v18/
19 KB
20 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v18/JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2b26a74f3c0e529bc8fccfa6b1db8e083e738992266359fde1a5bd0aaa81cbc3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 07:30:39 GMT
x-content-type-options
nosniff
age
31494
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19844
x-xss-protection
0
last-modified
Tue, 10 Aug 2021 00:20:10 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Sep 2022 07:30:39 GMT
5aU69_a8oxmIdGl4BA.woff2
fonts.gstatic.com/s/hind/v11/
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU69_a8oxmIdGl4BA.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d7a3280717b1f82f46bee459863720a03de43b16dc8097ba1b133440e5fe0edc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sun, 26 Sep 2021 14:40:57 GMT
x-content-type-options
nosniff
age
92076
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16264
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:03 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 26 Sep 2022 14:40:57 GMT
5aU19_a8oxmIfNJdERySjQ.woff2
fonts.gstatic.com/s/hind/v11/
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU19_a8oxmIfNJdERySjQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e2f1a473a1649fe316dbddc5cf8f45c525d62b8373d1be395272864c0cf1e60f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 15:11:31 GMT
x-content-type-options
nosniff
age
3842
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16268
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:02 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Sep 2022 15:11:31 GMT
themify.woff
www.iicybersecurity.com/oacoaloo/assets/fonts/
55 KB
55 KB
Font
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/fonts/themify.woff
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0db5c5a1475eb7a3e5028983ea1e642d1b2c00faff6a250a37502b0f3832a4a7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://www.iicybersecurity.com
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Connection
keep-alive
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"db2c-5ab70d268c3b6"
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
56108
securitytesting.jpg
www.iicybersecurity.com/ethajaph/2020/09/
44 KB
44 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/09/securitytesting.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8095b1e12d6f13e06c23fe6338328405067b018c17abc8c65870f335fca8904e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Last-Modified
Fri, 18 Sep 2020 19:11:08 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"b037-5af9b436120fc"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
45111
amdfeatured.jpg
www.iicybersecurity.com/ethajaph/2021/09/
22 KB
22 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/amdfeatured.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
166086cca30cbcba6f836f448729d121ad85c723984bf948efb4694a3f9ca3db

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Last-Modified
Fri, 17 Sep 2021 21:21:33 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"58c6-5cc3783fffa75"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
22726
security.jpg
www.iicybersecurity.com/ethajaph/2020/08/
21 KB
21 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/08/security.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
45c14f0262696685f9dccedef8d781cd44dc3d6dc0fe401fe9bc5a840381d96b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Last-Modified
Wed, 19 Aug 2020 21:24:49 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"5215-5ad41a2373a7f"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
21013
securityjune2020.jpg
www.iicybersecurity.com/ethajaph/2020/08/
42 KB
42 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/08/securityjune2020.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
07317d1a9f27bdd457dbd86c288b1420af98fbebd17cd82a38eadcd1743e24c0

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:33 GMT
Last-Modified
Wed, 12 Aug 2020 23:04:14 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"a7bf-5acb634db58dc"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
42943
nitropro.jpg
www.iicybersecurity.com/ethajaph/2020/09/
20 KB
21 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/09/nitropro.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
50cf64cbf67db17697da4487d38cd90e75bf5a291b8b6622a53ea1e972a4f75f

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Thu, 17 Sep 2020 21:01:24 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"51d8-5af88afd7b545"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
20952
cisco2021feat.jpg
www.iicybersecurity.com/ethajaph/2021/02/
20 KB
20 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/02/cisco2021feat.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ce46512c5890da6de4d03a7e9269875510a9b19df69c422fa1cc4347257d7166

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Wed, 24 Feb 2021 23:32:34 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4e98-5bc1d731472e6"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
20120
jblfeatured.jpg
www.iicybersecurity.com/ethajaph/2021/09/
25 KB
26 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/jblfeatured.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
387edece1bc2828455e0ebe9361cff22e3e1bf41ced3f0dad05c2b66255aabd7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Tue, 07 Sep 2021 18:43:43 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"64f8-5cb6c25203b1a"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
25848
bluetoothfeat.jpg
www.iicybersecurity.com/ethajaph/2021/09/
29 KB
29 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/bluetoothfeat.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
4d42e3ff28ff44318c4108d98e46dc1fe7a9bb316e9a9814e3c2e5494fe72b23

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Thu, 02 Sep 2021 18:05:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"724c-5cb0706b5700c"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=90
Content-Length
29260
analytics.js
www.google-analytics.com/
48 KB
20 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-44744673-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd222137f245c06ddb4c4d44db41f12138dad6cf8ef5d4d4a5e500f38f0c8c62
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 11 Aug 2021 00:32:57 GMT
server
Golfe2
age
5013
date
Mon, 27 Sep 2021 14:52:00 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19747
expires
Mon, 27 Sep 2021 16:52:00 GMT
collect
www.google-analytics.com/j/
1 B
212 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=701033382&t=pageview&_s=1&dl=https%3A%2F%2Fwww.iicybersecurity.com%2Fcritical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&ul=en-us&de=UTF-8&dt=Critical%20authentication%20bypass%20vulnerability%20in%20Trend%20Micro%20ServerProtect%20allows%20unauthorized%20remote%20user%20to%20become%20Admin%20%7C%20IICS&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAUABAAAAAC~&jid=2096483426&gjid=366999682&cid=277166708.1632759334&tid=UA-44744673-1&_gid=1784157780.1632759334&_r=1&gtm=2ou9m0&z=153083436
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.iicybersecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 27 Sep 2021 16:15:33 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.iicybersecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
recaptcha__de.js
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/
342 KB
134 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?render=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&ver=3.0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8c490e04a2be43d25df6263307477469d6ef82a318809f800bedda65c4803b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.iicybersecurity.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:11:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
257
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
136719
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:11:16 GMT
anchor
www.google.com/recaptcha/api2/ Frame D3E3
39 KB
20 KB
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
0f6136cbab79113e9fbdd4591150c7dd36b1176037b77d04f63f568353082a17
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-JXXksl6lmhi7VM25FGz8EA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.iicybersecurity.com/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy-report-only
require-corp; report-to="recaptcha"
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Mon, 27 Sep 2021 16:15:34 GMT
content-security-policy
script-src 'report-sample' 'nonce-JXXksl6lmhi7VM25FGz8EA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
20230
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
5aU19_a8oxmIfMJaERySjQ.woff2
fonts.gstatic.com/s/hind/v11/
15 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU19_a8oxmIfMJaERySjQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
47ee68145b529d601247e82604b9c3de7a0b44a0e1d95d9470424271994f548e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 07:11:39 GMT
x-content-type-options
nosniff
age
32635
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15848
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:04 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Sep 2022 07:11:39 GMT
rpc
clients6.google.com/ Frame
0
0
Preflight
General
Full URL
https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ
Protocol
H2
Server
2a00:1450:4001:813::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type
Origin
https://www.iicybersecurity.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=UTF-8
referrer-policy
no-referrer
content-length
1564
date
Mon, 27 Sep 2021 16:15:34 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36008190408014543642_1632759333494&_=1632759333495
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

count.json
urls.api.twitter.com/1/urls/
0
0

/
graph.facebook.com/
250 B
674 B
Script
General
Full URL
https://graph.facebook.com/?id=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html/&callback=jQuery36008190408014543642_1632759333498&_=1632759333499
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:20e:face:b00c:0:2 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
bb21a2135d1ab2b01ce3ffc1c9ea8d5b23e9cb271fe2bc27f0d1c753c743a90a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
www-authenticate
OAuth "Facebook Platform" "invalid_request" "(#2) Service temporarily unavailable"
x-fb-rev
1004458260
alt-svc
h3=":443"; ma=3600, h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
193
x-fb-rlafr
0
pragma
no-cache
x-fb-debug
ExTAsfLJc3/P5HQfnhB7s7+0GH210HYbvwJO2TB1U1IWO1pDFCwExmLKSTzf0jhI5nfJ9xzkSJp4XPpb8A1GIA==
x-fb-trace-id
FGCpIHEqzdi
date
Mon, 27 Sep 2021 16:15:34 GMT
vary
Origin, Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
AUm4RVD4yqXfcLP9MxCmNse
cache-control
no-store
facebook-api-version
v4.0
expires
Sat, 01 Jan 2000 00:00:00 GMT
count.json
api.pinterest.com/v1/urls/
220 B
514 B
Script
General
Full URL
https://api.pinterest.com/v1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36008190408014543642_1632759333500&_=1632759333501
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.193 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-193.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6e5301083304fee01e736485fe7639bac6ca42c864a6c034fe0b1c9a237c78b3
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:15:34 GMT
x-content-type-options
nosniff
x-cdn
akamai
akamai-grn
0.c5247e68.1632759334.2cd4659e
content-type
application/javascript
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
x-envoy-upstream-service-time
2
x-pinterest-rid
5930003068290441
content-length
220
expires
Mon, 27 Sep 2021 16:30:34 GMT
rpc
clients6.google.com/
0
0

loading.gif
www.iicybersecurity.com/oacoaloo/assets/img/lightbox/
2 KB
3 KB
Image
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/img/lightbox/loading.gif
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ccd39b8ba77b46e92151135ac4749d1fa2e03fb5bc30b475c9ca11b8c95ef64e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Cookie
_ga=GA1.2.277166708.1632759334; _gid=GA1.2.1784157780.1632759334; _gat_gtag_UA_44744673_1=1; cookielawinfo-checkbox-necessary=yes; cookielawinfo-checkbox-non-necessary=no
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:15:34 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9f1-5ab70d268c3b6"
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
2545
styles__ltr.css
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/ Frame D3E3
52 KB
26 KB
Stylesheet
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5fe20047c1cc1be61a786d56c5c02b96453b9c60656d6c8429a1add79017e47f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:11:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
257
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
25732
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/css
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:11:17 GMT
recaptcha__de.js
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/ Frame D3E3
342 KB
134 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8c490e04a2be43d25df6263307477469d6ef82a318809f800bedda65c4803b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:11:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
258
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
136719
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:11:16 GMT
logo_48.png
www.gstatic.com/recaptcha/api2/ Frame D3E3
2 KB
2 KB
Image
General
Full URL
https://www.gstatic.com/recaptcha/api2/logo_48.png
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Fri, 24 Sep 2021 13:18:13 GMT
x-content-type-options
nosniff
age
269841
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2228
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
image/png
cache-control
public, max-age=604800
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Fri, 01 Oct 2021 13:18:13 GMT
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v18/ Frame D3E3
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.google.com/
Origin
https://www.google.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 20 Sep 2021 19:58:13 GMT
x-content-type-options
nosniff
age
591441
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15344
x-xss-protection
0
last-modified
Mon, 16 Oct 2017 17:32:55 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Sep 2022 19:58:13 GMT
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v18/ Frame D3E3
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.google.com/
Origin
https://www.google.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 21 Sep 2021 01:35:26 GMT
x-content-type-options
nosniff
age
571208
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15552
x-xss-protection
0
last-modified
Mon, 16 Oct 2017 17:33:02 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Sep 2022 01:35:26 GMT
webworker.js
www.google.com/recaptcha/api2/ Frame D3E3
102 B
204 B
Other
General
Full URL
https://www.google.com/recaptcha/api2/webworker.js?hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
392ed442867566d8cbd08f7e0d9a379c49177a9c96186ad0d1eba1a316721267
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:15:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
cross-origin-embedder-policy-report-only
require-corp; report-to="recaptcha"
x-frame-options
SAMEORIGIN
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
112
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:15:34 GMT
reload
www.google.com/recaptcha/api2/ Frame D3E3
29 KB
16 KB
XHR
General
Full URL
https://www.google.com/recaptcha/api2/reload?k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
6902c9e815f89c90b9e1f7efd88257a992fe17a9eefe3727d9f34e3974f04f63
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=3zeoqqcgign4
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
application/x-protobuffer

Response headers

date
Mon, 27 Sep 2021 16:15:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
application/json; charset=utf-8
cache-control
private, max-age=0
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16349
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:15:35 GMT
common.js
maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/
83 KB
31 KB
Script
General
Full URL
https://maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/common.js
Requested by
Host: maps.googleapis.com
URL: https://maps.googleapis.com/maps/api/js?key=AIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&callback=initMap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
65f065d8408432842271dab54c2b2938ddcfe0cd0466139af9e0fcf5f89dd4df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 22 Sep 2021 18:32:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
423795
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/maps-api-js
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31127
x-xss-protection
0
last-modified
Mon, 20 Sep 2021 21:29:58 GMT
server
sffe
vary
Accept-Encoding, Origin
report-to
{"group":"maps-api-js","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/maps-api-js"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="maps-api-js"
expires
Thu, 22 Sep 2022 18:32:23 GMT
util.js
maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/
294 KB
90 KB
Script
General
Full URL
https://maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/util.js
Requested by
Host: maps.googleapis.com
URL: https://maps.googleapis.com/maps/api/js?key=AIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&callback=initMap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54bc11342d941c2dca37e01a11ab4c1b05aa6da56cd221bc77616629330809da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 22 Sep 2021 18:32:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
423795
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/maps-api-js
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91919
x-xss-protection
0
last-modified
Mon, 20 Sep 2021 21:29:58 GMT
server
sffe
vary
Accept-Encoding, Origin
report-to
{"group":"maps-api-js","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/maps-api-js"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="maps-api-js"
expires
Thu, 22 Sep 2022 18:32:23 GMT
AuthenticationService.Authenticate
maps.googleapis.com/maps/api/js/
62 B
209 B
Script
General
Full URL
https://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate?1shttps%3A%2F%2Fwww.iicybersecurity.com%2Fcritical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&4sAIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&callback=_xdc_._kbcvbj&key=AIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&token=50006
Requested by
Host: maps.googleapis.com
URL: https://maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/common.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
mafe /
Resource Hash
1353fa5d61abb44e25064de765e1ef9254dd1e98b5ef822b7322fd35fab7992b
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 27 Sep 2021 16:15:38 GMT
content-encoding
gzip
server
mafe
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment
server-timing
gfet4t7; dur=35
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
63
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
urls.api.twitter.com
URL
https://urls.api.twitter.com/1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36008190408014543642_1632759333496&_=1632759333497
Domain
clients6.google.com
URL
https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ

Verdicts & Comments Add Verdict or Comment

74 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| onbeforexrselect boolean| originAgentCluster object| _wpemojiSettings undefined| $ function| jQuery object| Cli_Data object| cli_cookiebar_settings object| log_object object| CLI_Cookie object| CLI object| cliBlocker string| CLI_ACCEPT_COOKIE_NAME string| CLI_PREFERNCE_COOKIE number| CLI_ACCEPT_COOKIE_EXPIRE boolean| CLI_COOKIEBAR_AS_POPUP object| gsapVersions object| tpGS object| punchgs object| RSANYID object| RSANYID_sliderID function| gtag object| dataLayer function| setREVStartSize function| initMap object| ht_ctc_chat_var object| google object| module$exports$mapsapi$util$event object| module$contents$mapsapi$overlay$overlayView_OverlayView object| google_tag_manager object| google_tag_data string| GoogleAnalyticsObject function| ga object| gaplugins object| gaGlobal object| gaData object| runtime object| regeneratorRuntime function| setImmediate function| clearImmediate object| wpcf7 object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client object| wpcf7_recaptcha object| recaptcha function| EvEmitter function| imagesLoaded function| jQueryBridget function| getSize function| matchesSelector object| fizzyUIUtils function| Outlayer function| Masonry object| jsparallax function| jsparallax_init function| onYouTubePlayerAPIReady object| ytp object| fluidvids object| Modernizr object| wp_data object| wp object| closure_lm_371511 object| twemoji string| currentText string| categoryCookie object| categoryCookieValue object| cli_chkbox_elm string| cli_chkbox_data_id string| cli_chkbox_data_id_trimmed function| addWheelListener string| selector

10 Cookies

Domain/Path Name / Value
www.google.com/recaptcha Name: _GRECAPTCHA
Value: 09AH-MKGU_CyOihjk0E3HZpV7I-lbQSEgRjgXEzE-830qsAtSs19O9r6HVL2jN_Yjh5Srbe2JHGVDzK9Vt-JLXgnI
.iicybersecurity.com/ Name: _ga
Value: GA1.2.277166708.1632759334
.iicybersecurity.com/ Name: _gid
Value: GA1.2.1784157780.1632759334
.iicybersecurity.com/ Name: _gat_gtag_UA_44744673_1
Value: 1
www.iicybersecurity.com/ Name: cookielawinfo-checkbox-necessary
Value: yes
www.iicybersecurity.com/ Name: cookielawinfo-checkbox-non-necessary
Value: no
.linkedin.com/ Name: bcookie
Value: "v=2&b160536f-fd56-4223-8426-254945103632"
.www.linkedin.com/ Name: bscookie
Value: "v=1&20210927161534534b4c90-6cb8-49ef-85c8-920da35e6862AQEVTeSb6cF6r0Kq6bAmCVaQQO_7Gpiu"
.linkedin.com/ Name: li_gc
Value: MTswOzE2MzI3NTkzMzQ7MjswMjHpir+p5O5R8GcvJHnkdqJZYkhziy18eJDT6eAKLXVi3g==
.linkedin.com/ Name: lidc
Value: "b=OGST08:s=O:r=O:a=O:p=O:g=2134:u=1:x=1:i=1632759334:t=1632845734:v=2:sig=AQFyfG2R0ru3a5ICRxgMCOxwclN4O1-I"

4 Console Messages

Source Level URL
Text
network error URL: https://urls.api.twitter.com/1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36008190408014543642_1632759333496&_=1632759333497
Message:
Failed to load resource: net::ERR_NAME_NOT_RESOLVED
javascript error URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Message:
Access to XMLHttpRequest at 'https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ' from origin 'https://www.iicybersecurity.com' has been blocked by CORS policy: Response to preflight request doesn't pass access control check: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ
Message:
Failed to load resource: net::ERR_FAILED
network error URL: https://www.linkedin.com/countserv/count/share?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36008190408014543642_1632759333494&_=1632759333495
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api.pinterest.com
clients6.google.com
fonts.googleapis.com
fonts.gstatic.com
graph.facebook.com
iicybersecurity.com
maps.googleapis.com
urls.api.twitter.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.gstatic.com
www.iicybersecurity.com
www.linkedin.com
clients6.google.com
urls.api.twitter.com
184.30.24.193
2620:1ec:21::14
2a00:1450:4001:801::2003
2a00:1450:4001:813::200e
2a00:1450:4001:828::2003
2a00:1450:4001:829::200a
2a00:1450:4001:830::2004
2a00:1450:4001:830::2008
2a00:1450:4001:831::200e
2a03:2880:f01c:20e:face:b00c:0:2
45.79.104.24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