Submitted URL: http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
Effective URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Submission: On June 09 via api from US

Summary

This website contacted 60 IPs in 5 countries across 40 domains to perform 301 HTTP transactions. The main IP is 151.101.194.165, located in United States and belongs to FASTLY - Fastly, US. The main domain is www.csoonline.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on April 8th 2019. Valid for: 3 months.
This is the only time www.csoonline.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 86 151.101.194.165 54113 (FASTLY)
1 52.222.162.213 16509 (AMAZON-02)
1 52.222.162.7 16509 (AMAZON-02)
3 23.111.9.35 33438 (HIGHWINDS2)
1 2.18.234.163 16625 (AKAMAI-AS)
3 2a00:1450:400... 15169 (GOOGLE)
1 2.18.234.21 16625 (AKAMAI-AS)
6 35.201.98.64 15169 (GOOGLE)
9 34.226.56.227 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 4 142.0.173.130 7160 (NETDYNAMICS)
1 2a00:1450:400... 15169 (GOOGLE)
20 2a00:1450:400... 15169 (GOOGLE)
1 172.217.22.2 15169 (GOOGLE)
1 199.166.0.26 7415 (ADSAFE-1)
2 2a00:1450:400... 15169 (GOOGLE)
1 35.190.75.210 15169 (GOOGLE)
4 151.101.2.165 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
8 54.154.94.173 16509 (AMAZON-02)
1 52.51.227.120 16509 (AMAZON-02)
1 34.95.92.78 15169 (GOOGLE)
1 52.222.162.202 16509 (AMAZON-02)
6 104.75.173.188 16625 (AKAMAI-AS)
2 52.222.162.189 16509 (AMAZON-02)
1 2.16.186.99 20940 (AKAMAI-ASN1)
2 151.101.2.110 54113 (FASTLY)
1 104.75.174.73 16625 (AKAMAI-AS)
2 6 104.109.56.111 20940 (AKAMAI-ASN1)
1 35.201.117.115 15169 (GOOGLE)
7 2a04:4e42::645 54113 (FASTLY)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 64.74.236.19 22075 (AS-OUTBRAIN)
3 2a00:1450:400... 15169 (GOOGLE)
2 52.218.233.59 16509 (AMAZON-02)
1 1 2606:2800:234... 15133 (EDGECAST)
1 151.101.36.157 54113 (FASTLY)
1 172.217.22.70 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:204... 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
3 151.139.128.10 20446 (HIGHWINDS3)
2 151.101.2.2 54113 (FASTLY)
1 18.207.76.63 14618 (AMAZON-AES)
1 3 35.190.59.101 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
3 70.42.32.51 22075 (AS-OUTBRAIN)
4 34.230.118.21 14618 (AMAZON-AES)
4 34.199.191.3 14618 (AMAZON-AES)
2 35.153.195.133 14618 (AMAZON-AES)
1 54.93.135.33 16509 (AMAZON-02)
3 52.29.21.152 16509 (AMAZON-02)
6 2.18.232.28 16625 (AKAMAI-AS)
38 2a00:1450:400... 15169 (GOOGLE)
19 2a00:1450:400... 15169 (GOOGLE)
18 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
301 60
Apex Domain
Subdomains
Transfer
67 csoonline.com
www.csoonline.com
405 KB
39 googleapis.com
imasdk.googleapis.com
fonts.googleapis.com
1 MB
24 google.com
www.google.com
adservice.google.com
ampcid.google.com
4 KB
19 2mdn.net
s0.2mdn.net
197 KB
19 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
1 KB
16 connatix.com
cdn.connatix.com
cdns.connatix.com
ck.connatix.com
core.connatix.com
rtb.connatix.com
i.connatix.com
v.connatix.com
trk.connatix.com
204 KB
14 staticworld.net
fonts.staticworld.net
idge.staticworld.net
121 KB
11 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
mv.outbrain.com
88 KB
10 blueconic.net
cdn.blueconic.net
idg.blueconic.net
161 KB
8 skimresources.com
s.skimresources.com
p.skimresources.com
r.skimresources.com
t.skimresources.com
16 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
168 KB
8 postrelease.com
jadserve.postrelease.com
5 KB
8 idgesg.net
alt.idgesg.net
130 KB
6 scorecardresearch.com
sb.scorecardresearch.com
5 KB
6 3lift.com
ib.3lift.com
tlx.3lift.com
eb2.3lift.com
58 KB
6 spiffymachine.com
spiffymachine.com
70 KB
4 eloqua.com
secure.p01.eloqua.com
2 KB
3 google-analytics.com
www.google-analytics.com
18 KB
3 consensu.org
admiral.mgr.consensu.org
vendorlist.consensu.org
api.skimlinks.mgr.consensu.org
16 KB
3 fontawesome.com
use.fontawesome.com
106 KB
2 linksynergy.com
automate.linksynergy.com
899 B
2 amazonaws.com
automate-prod.s3.amazonaws.com
170 KB
2 dwin2.com
www.dwin2.com
63 KB
2 gstatic.com
www.gstatic.com
fonts.gstatic.com
105 KB
2 googletagmanager.com
www.googletagmanager.com
68 KB
2 doubleclick.net
securepubads.g.doubleclick.net
ad.doubleclick.net
55 KB
2 google.de
adservice.google.de
ampcid.google.de
528 B
2 adsafeprotected.com
cdn.adsafeprotected.com
pixel.adsafeprotected.com
7 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 twitter.com
platform.twitter.com
321 B
1 typekit.net
p.typekit.net
367 B
1 akamaihd.net
ntvcld-a.akamaihd.net
38 KB
1 soundcloud.com
w.soundcloud.com
3 KB
1 rlcdn.com
api.rlcdn.com
74 B
1 adsrvr.org
match.adsrvr.org
527 B
1 permutive.com
cdn.permutive.com
74 KB
1 googletagservices.com
www.googletagservices.com
10 KB
1 techhive.com
images.techhive.com
5 KB
1 indexww.com
js-sec.indexww.com
31 KB
1 ntv.io
s.ntv.io
78 KB
301 40
Domain Requested by
67 www.csoonline.com 4 redirects www.csoonline.com
38 imasdk.googleapis.com cdns.connatix.com
imasdk.googleapis.com
20 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
19 s0.2mdn.net imasdk.googleapis.com
18 pagead2.googlesyndication.com
9 idg.blueconic.net cdn.blueconic.net
9 idge.staticworld.net www.csoonline.com
s.ntv.io
8 jadserve.postrelease.com s.ntv.io
www.csoonline.com
8 alt.idgesg.net www.csoonline.com
6 images.outbrainimg.com www.csoonline.com
6 sb.scorecardresearch.com 2 redirects www.csoonline.com
6 widgets.outbrain.com www.csoonline.com
widgets.outbrain.com
6 spiffymachine.com www.csoonline.com
spiffymachine.com
5 fonts.staticworld.net www.csoonline.com
4 trk.connatix.com www.csoonline.com
4 rtb.connatix.com cdns.connatix.com
4 secure.p01.eloqua.com 1 redirects www.csoonline.com
3 eb2.3lift.com www.csoonline.com
ib.3lift.com
3 v.connatix.com www.csoonline.com
3 mcdp-nydc1.outbrain.com widgets.outbrain.com
3 r.skimresources.com 1 redirects www.csoonline.com
3 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
www.csoonline.com
3 www.google.com www.csoonline.com
www.gstatic.com
3 use.fontawesome.com www.csoonline.com
2 automate.linksynergy.com www.csoonline.com
2 t.skimresources.com s.skimresources.com
2 p.skimresources.com www.csoonline.com
2 automate-prod.s3.amazonaws.com www.csoonline.com
2 www.dwin2.com www.googletagmanager.com
www.dwin2.com
2 ib.3lift.com www.csoonline.com
ib.3lift.com
2 www.googletagmanager.com www.csoonline.com
www.googletagmanager.com
1 fonts.gstatic.com
1 fonts.googleapis.com spiffymachine.com
1 tlx.3lift.com ib.3lift.com
1 i.connatix.com www.csoonline.com
1 mv.outbrain.com widgets.outbrain.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 core.connatix.com cdns.connatix.com
1 odb.outbrain.com widgets.outbrain.com
1 ck.connatix.com cdns.connatix.com
1 s.skimresources.com www.googletagmanager.com
1 ampcid.google.de www.google-analytics.com
1 ampcid.google.com www.google-analytics.com
1 cdns.connatix.com cdn.connatix.com
1 vendorlist.consensu.org spiffymachine.com
1 tpc.googlesyndication.com spiffymachine.com
1 ad.doubleclick.net spiffymachine.com
1 static.ads-twitter.com www.csoonline.com
1 platform.twitter.com 1 redirects
1 log.outbrainimg.com widgets.outbrain.com
1 p.typekit.net www.csoonline.com
1 cdn.connatix.com www.csoonline.com
1 admiral.mgr.consensu.org spiffymachine.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 ntvcld-a.akamaihd.net www.csoonline.com
1 w.soundcloud.com www.googletagmanager.com
1 api.rlcdn.com js-sec.indexww.com
1 match.adsrvr.org js-sec.indexww.com
1 www.gstatic.com www.google.com
1 cdn.permutive.com www.csoonline.com
1 pixel.adsafeprotected.com cdn.adsafeprotected.com
1 securepubads.g.doubleclick.net www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 www.googletagservices.com www.csoonline.com
1 images.techhive.com www.csoonline.com
1 js-sec.indexww.com www.csoonline.com
1 s.ntv.io www.csoonline.com
1 cdn.adsafeprotected.com www.csoonline.com
1 cdn.blueconic.net www.csoonline.com
301 69
Subject Issuer Validity Valid
idg.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-08 -
2019-07-17
3 months crt.sh
*.blueconic.net
Thawte RSA CA 2018
2017-12-13 -
2019-12-13
2 years crt.sh
*.adsafeprotected.com
COMODO RSA Domain Validation Secure Server CA
2018-08-20 -
2020-09-17
2 years crt.sh
*.fontawesome.com
DigiCert SHA2 Secure Server CA
2018-09-17 -
2019-11-21
a year crt.sh
*.ntv.io
DigiCert SHA2 Secure Server CA
2018-06-12 -
2019-12-11
a year crt.sh
www.google.com
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-05-08 -
2020-03-09
10 months crt.sh
spiffymachine.com
Let's Encrypt Authority X3
2019-05-03 -
2019-08-01
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
*.p01.eloqua.com
DigiCert SHA2 Secure Server CA
2019-01-14 -
2021-03-14
2 years crt.sh
*.google.com
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
*.permutive.com
DigiCert SHA2 Secure Server CA
2018-05-15 -
2019-06-19
a year crt.sh
*.postrelease.com
Amazon
2019-05-15 -
2020-06-15
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.soundcloud.com
GlobalSign Domain Validation CA - SHA256 - G2
2018-04-12 -
2020-06-08
2 years crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.3lift.com
Amazon
2018-07-24 -
2019-08-24
a year crt.sh
a248.e.akamai.net
DigiCert ECC Secure Server CA
2018-10-18 -
2019-10-18
a year crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-10 -
2020-03-21
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
admiral.mgr.consensu.org
COMODO RSA Domain Validation Secure Server CA
2018-05-11 -
2020-05-10
2 years crt.sh
*.connatix.com
Go Daddy Secure Certificate Authority - G2
2018-08-20 -
2019-10-19
a year crt.sh
*.typekit.net
DigiCert SHA2 Secure Server CA
2018-07-20 -
2020-01-03
a year crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-07 -
2020-02-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2018-08-16 -
2019-08-21
a year crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-01 -
2019-09-07
5 months crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-10-23
a year crt.sh
*.linksynergy.com
Thawte RSA CA 2018
2018-03-05 -
2019-07-20
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh

This page contains 48 frames:

Primary Page: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Frame ID: ABE61AA26EC7F8BA4977C7F4CA79B0AF
Requests: 192 HTTP requests in this frame

Frame: https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=31&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html?blogpost=applications%26applications=06-09-2019&ref2=elqNone&tzo=0&ms=921
Frame ID: 1C32A0F11F638CF6E02CC77EB95868FC
Requests: 2 HTTP requests in this frame

Frame: https://admiral.mgr.consensu.org/portal.html
Frame ID: D4A53760A2AFA08B73674E3B3AFCFBD5
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&co=aHR0cHM6Ly93d3cuY3Nvb25saW5lLmNvbTo0NDM.&hl=en&v=v1559543665173&size=normal&cb=k8xi6cck2vmr
Frame ID: 3AFC3726E8B6E42CE2C4DD6902E60C6B
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-23/html/container.html
Frame ID: B76EC05E3FA1B969C607DAC4C2ED1A55
Requests: 1 HTTP requests in this frame

Frame: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Frame ID: B6C5C54A6D270515C4D2DB8C6200E1BF
Requests: 8 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=v1559543665173&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&cb=fk3y2imuruyf
Frame ID: F51E983652DB9A1E473A0195A244A984
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 49AAB4818F8C1D45A87580DD44B300CB
Requests: 1 HTTP requests in this frame

Frame: https://tlx.3lift.com/web/auction?inv_code=tan_CSOOnline_MOAP&referrer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&rev=9f5715f&fe=0&ft=0&cb=2608343677
Frame ID: F283117EB9EA783B51E0957B84E5A4CB
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: AC8BD7F591352AAA6D93F5BCC516B650
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 4DA1A0F07A68A9503D8BC3180EA19248
Requests: 1 HTTP requests in this frame

Frame: https://eb2.3lift.com/sync?cb=91057
Frame ID: C2E8B2F827CFF56E3411902563344F0E
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: CA2BCE1D5109C44D2CD6156AF143B735
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: B972C92EDB13A675F16E70B0B0CEB244
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: AE46E8DE0981F746C8EF40A06A4A9CC3
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 8F85F3F21AC01DDC56EF9BB64F453AB0
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: FCA7C67EFEEE246F74E283CC35FDA641
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 5CD55C51A3DDFC4BC2C0FEB63EA0CFD0
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 07B39E065FAB60FD19C9618896E5D74A
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: B9232851B789E0234E0A589DC5896D1C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: C5D4835A7A06A49E4B51F22674B5BDA8
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 0B79485DB65A67CDA8C74AFA65484B7E
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 7A10F1F0760E923631897CE6AF71F4F7
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: E607AAA5E15AD5A1B0030F6FF136CFD5
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 74266ED547135953D354C2B53FABEDF2
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 574CF89979BE64349A8B81073A016526
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 27163F3C80855E7FDDBE70419A185E9B
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: A937DB649AEDF7F277FA7907DE39C130
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: CA8B71198D8C1127898117EC54017772
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: B765CC4849F00CA63A067CCC47A35D23
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 5209B75C298C4127961DE024A2E4F509
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 739236D08DC71EC45751A3B326328D78
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 534926661646807DDE55DF3BF3B2293E
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 4C95DFA1CD02F4001E5C4C1B22B11389
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 12F669D693FDC202EFB1504CC4FD1B4B
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 747219A8E37C4BD16737ED4A023F791A
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: AF853E443E7CE794292EE38BC1EC0E04
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 3120140DBB0BE0D977C75464884AF62C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: CF477056230F0D111CB336600FED3D30
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: FB76F459490FD7F79827EE85FFC6482C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 4E25A81D59066D6CEC79B9FAE2A0AEE4
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 836D899D8CAA7E216720317C7BB5746D
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 78E6CC4165A3336969804A005A06EBB1
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 3CA5AF295354D487E67E472AA0488B62
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 0AC57C39BCB8496EEEE5359D9AC4194F
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: A6CF48477D4F1D71C1D6E338E5252520
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: E2F5548CB336D4A59A652F607D2889BC
Requests: 3 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Frame ID: 6409166A174BDF0D2BD750CAE132DAEC
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html HTTP 301
    https://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html HTTP 301
    https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Apache-Coyote(\/1\.1)?/i

Overall confidence: 100%
Detected patterns
  • headers via /.*Varnish/i

Overall confidence: 100%
Detected patterns
  • headers server /Apache-Coyote(\/1\.1)?/i

Overall confidence: 100%
Detected patterns
  • env /^Mustache$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^_sf_(?:endpt|async_config)$/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • env /^elq(?:SiteID|Load|CurESite)$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^prettyPrint$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^Typekit$/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Overall confidence: 100%
Detected patterns
  • env /^Recaptcha$/i

Page Statistics

301
Requests

100 %
HTTPS

32 %
IPv6

40
Domains

69
Subdomains

60
IPs

5
Countries

4005 kB
Transfer

12093 kB
Size

21
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html HTTP 301
    https://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html HTTP 301
    https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 80
  • https://www.csoonline.com/elqNow/elqBlank.htm HTTP 301
  • https://www.csoonline.com/blank/template
Request Chain 81
  • https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306 HTTP 302
  • https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306&elqCookie=1
Request Chain 138
  • https://platform.twitter.com/oct.js HTTP 301
  • https://static.ads-twitter.com/oct.js
Request Chain 141
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20bash%20CVE-2014-6271%20%7C%20CSO%20Online&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20bash%20CVE-2014-6271%20%7C%20CSO%20Online&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c9=
Request Chain 142
  • https://www.csoonline.com/.well-known/pubvendors.json HTTP 302
  • https://www.csoonline.com/
Request Chain 157
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
Request Chain 312
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=10001&ns_st_cl=149000&ns_st_hc=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_796512&ns_st_pt=10001&ns_st_dpt=10001&ns_st_ipt=10001&ns_st_et=10001&ns_st_det=10001&ns_st_upc=10001&ns_st_dupc=10001&ns_st_iupc=10001&ns_st_upa=10001&ns_st_dupa=10001&ns_st_iupa=10001&ns_st_lpc=10001&ns_st_dlpc=10001&ns_st_lpa=10001&ns_st_dlpa=10001&ns_st_pa=10001&ns_ts=1560093218257&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=Qualcomm%20found%20to%20violate%20antitrust%20laws...%20What%27s%20next%3F%20%7C%20TECH(feed)&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=10001&ns_st_cl=149000&ns_st_hc=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_796512&ns_st_pt=10001&ns_st_dpt=10001&ns_st_ipt=10001&ns_st_et=10001&ns_st_det=10001&ns_st_upc=10001&ns_st_dupc=10001&ns_st_iupc=10001&ns_st_upa=10001&ns_st_dupa=10001&ns_st_iupa=10001&ns_st_lpc=10001&ns_st_dlpc=10001&ns_st_lpa=10001&ns_st_dlpa=10001&ns_st_pa=10001&ns_ts=1560093218257&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=Qualcomm%20found%20to%20violate%20antitrust%20laws...%20What%27s%20next%3F%20%7C%20TECH(feed)&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c8=&c9=&cs_ucfr=0

301 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request remote-exploit-in-bash-cve-2014-6271.html
www.csoonline.com/article/2687265/
Redirect Chain
  • http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
  • https://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
  • https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
143 KB
36 KB
Document
General
Full URL
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d76f75487d3b73df1fbbbadac2b16dd48ed8cc7becbc6cbba2d52d2b1fae18b5

Request headers

:method
GET
:authority
www.csoonline.com
:scheme
https
:path
/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
Apache-Coyote/1.1
content-type
text/html;charset=UTF-8
content-encoding
gzip
via
1.1 varnish 1.1 varnish
accept-ranges
bytes
date
Sun, 09 Jun 2019 15:13:25 GMT
age
0
x-served-by
cache-sjc3139-SJC, cache-hhn1520-HHN
x-cache
MISS, MISS
x-cache-hits
0, 0
x-timer
S1560093203.081071,VS0,VE1966
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
content-length
36455

Redirect headers

status
301
server
Apache-Coyote/1.1
location
/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
content-encoding
gzip
content-type
text/html; charset=UTF-8
via
1.1 varnish 1.1 varnish
accept-ranges
bytes
date
Sun, 09 Jun 2019 15:13:23 GMT
age
0
x-served-by
cache-sjc3147-SJC, cache-hhn1520-HHN
x-cache
MISS, MISS
x-cache-hits
0, 0
x-timer
S1560093203.790332,VS0,VE283
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
content-length
26
jquery-1.10.2.min.js
www.csoonline.com/www/js/jquery/
91 KB
32 KB
Script
General
Full URL
https://www.csoonline.com/www/js/jquery/jquery-1.10.2.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b52e06f854795718703ef9723b47a9a23edcbe2ae53ff261926d8d6059056cfe

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
94522
x-cache
HIT, HIT
status
200
content-length
32845
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:42 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.064543,VS0,VE0
etag
W/"93639-1559760042000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 04:46:01 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 609
jquery_cookie.js
www.csoonline.com/www/js/jquery/
2 KB
1 KB
Script
General
Full URL
https://www.csoonline.com/www/js/jquery/jquery_cookie.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
02d2940a00290f3a9e4955de7821626688c0cacde8c97c762838e6b40ab22926

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
64792
x-cache
HIT, HIT
status
200
content-length
908
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:42 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.064580,VS0,VE0
etag
W/"1946-1559760042000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 22:58:39 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
apollo-locales.js
www.csoonline.com/www/js/
3 KB
1 KB
Script
General
Full URL
https://www.csoonline.com/www/js/apollo-locales.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8b1573c4fc9682b0e729494658d82956868649906f78848bb78280616229667b

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281616
x-cache
HIT, HIT
status
200
content-length
1039
x-via-fastly
Verdad
x-served-by
cache-sjc3134-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.071635,VS0,VE0
etag
W/"2996-1559760056000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:15 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
idg.js
cdn.blueconic.net/
124 KB
38 KB
Script
General
Full URL
https://cdn.blueconic.net/idg.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.213 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-213.fra54.r.cloudfront.net
Software
Apache /
Resource Hash
e9eca1449dd137bb21c358bb8acdcfe2374833a63b300f7ce6b1d5f33a0204c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:07:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
age
385
x-cache
Hit from cloudfront
status
200
content-length
38115
x-xss-protection
1; mode=block
last-modified
Wed, 29 May 2019 09:38:50 GMT
server
Apache
etag
"1eebc-58a038c835328-gzip"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
via
1.1 09f4ecc806a7e34780fd19a93b984724.cloudfront.net (CloudFront)
cache-control
public, max-age=600, s-maxage=500
x-amz-cf-pop
FRA54
accept-ranges
bytes
x-robots-tag
noindex, nofollow
x-amz-cf-id
MmrGv2R63IB80K9Sj0YjqDpHIgR5cluMg576R97oKriczXTDBoEulA==
init_device.js
www.csoonline.com/www/js/
585 B
473 B
Script
General
Full URL
https://www.csoonline.com/www/js/init_device.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4f4ed0e81c2f0016d06ae816dd872edc04e97612c9d36f2f3f4475f2954e7fcc

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
262426
x-cache
HIT, HIT
status
200
content-length
304
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.071899,VS0,VE0
etag
W/"585-1559760056000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 00:19:36 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
iasPET.1.js
cdn.adsafeprotected.com/
17 KB
5 KB
Script
General
Full URL
https://cdn.adsafeprotected.com/iasPET.1.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.7 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-7.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
47a9439c6214c7cb46bc9d103ac240a0e51ba09c40faa5449f14f41fbe77ef13

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 08 Jun 2019 17:52:06 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 May 2019 17:51:00 GMT
Server
AmazonS3
Age
76918
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 b541956a3e11a8d6bd72d74e925ca434.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA54
Connection
keep-alive
X-Amz-Cf-Id
KxzaisgqeYlMNmDJtUTI6TG8FYaS6hUaegdiGdYZmbyt4cj3xGndXg==
gpt_includes.js
www.csoonline.com/www/js/ads/
17 KB
5 KB
Script
General
Full URL
https://www.csoonline.com/www/js/ads/gpt_includes.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
792699905f1c4310fd453876a05c779ea30db04fefc662341e2c0cc1d6b5112e

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281389
x-cache
HIT, HIT
status
200
content-length
5040
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:34 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072313,VS0,VE0
etag
W/"17764-1559760034000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:09 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
thm_pre.js
www.csoonline.com/www.idge/js/
22 KB
5 KB
Script
General
Full URL
https://www.csoonline.com/www.idge/js/thm_pre.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c5bad5ad4873ebdc3a15f122c0682a17bce8bc83d3b3466a3285feba4f09b43c

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281389
x-cache
HIT, HIT
status
200
content-length
5020
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:37:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072247,VS0,VE0
etag
W/"23032-1559759876000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:04 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
gpt_starter.js
www.csoonline.com/www/js/ads/
325 B
427 B
Script
General
Full URL
https://www.csoonline.com/www/js/ads/gpt_starter.js?1234
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c7d10c776205fd870156fb3289d42a6fb2e8b10c44d5ee438bba0b54aa2da17a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
585364
x-cache
HIT, HIT
status
200
content-length
235
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:46:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072310,VS0,VE0
etag
W/"325-1559069216000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 05 Jun 2019 04:05:38 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
ias_gpt_launcher.js
www.csoonline.com/www/js/ads/
1 KB
799 B
Script
General
Full URL
https://www.csoonline.com/www/js/ads/ias_gpt_launcher.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0afbd1c3e2da712bb4843aed36d9341b9ff3203b38826ffdf2bee00d2b4673c1

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281389
x-cache
HIT, HIT
status
200
content-length
555
x-via-fastly
Verdad
x-served-by
cache-sjc3133-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:30 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072351,VS0,VE0
etag
W/"1196-1559760030000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:04 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
inline-header-mobile.css
www.csoonline.com/www.idge/css/
29 KB
6 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/inline-header-mobile.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
da1ab34f6c36d69460101faad0bd273d36a8bc4aa7a01bb7cb577b40f64d6fad

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281617
x-cache
HIT, HIT
status
200
content-length
5898
x-via-fastly
Verdad
x-served-by
cache-sjc3125-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:52 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.064615,VS0,VE0
etag
W/"29803-1559759932000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
inline-header.css
www.csoonline.com/www.idge.cso/css/
60 KB
8 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.cso/css/inline-header.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
40a7af2e330fed46165c350c441e05c58c9363e06ce0251caf2192fd249fd201

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281616
x-cache
HIT, HIT
status
200
content-length
8088
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:20 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.064664,VS0,VE0
etag
W/"60997-1559759900000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
normalize.css
www.csoonline.com/www.idge/css/
3 KB
2 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/normalize.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c9a8b2ad4d5b895b2f293eb6e8d9f6226904d4a660fe197833311e3f61411d21

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
581617
x-cache
HIT, HIT
status
200
content-length
1307
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:44:38 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.071576,VS0,VE0
etag
W/"3152-1559069078000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Sun, 09 Jun 2019 07:39:35 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
prettify.css
www.csoonline.com/www.idge/css/
595 B
478 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/prettify.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
00e441f817788168d15166b9a82eab1ddb74c0f7edbaa80d02e7831725d1862e

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
553526
x-cache
HIT, HIT
status
200
content-length
306
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:44:40 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.071627,VS0,VE0
etag
W/"595-1559069080000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Sun, 09 Jun 2019 15:27:57 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2841
select2.css
www.csoonline.com/www.idge.ans/js/select2-3.5.0/
15 KB
3 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.ans/js/select2-3.5.0/select2.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f91649026d2a05a646860a4be36a5388d5c78b4afc03f5ecd49adcad3c4449c3

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
506190
x-cache
HIT, HIT
status
200
content-length
2782
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:44:10 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072336,VS0,VE0
etag
W/"15679-1559069050000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Fri, 07 Jun 2019 10:03:33 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
article.css
www.csoonline.com/www/css/
212 KB
32 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www/css/article.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
13f1b00173946b42d16add7f01d587f145caa84efd4f94c02573143536a78d05

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281590
x-cache
HIT, HIT
status
200
content-length
32614
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:42 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072238,VS0,VE0
etag
W/"217370-1559759922000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
insider-promo-styles.css
www.csoonline.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/insider-promo-styles.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
43c6ec467d4dca55df0498b80753aa9e9b6696d6c8f7dc7080d20c42cef039c4

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281389
x-cache
HIT, HIT
status
200
content-length
1644
x-via-fastly
Verdad
x-served-by
cache-sjc3147-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072252,VS0,VE0
etag
W/"7411-1559759936000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:04 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
article.css
www.csoonline.com/www.idge.cso/css/
44 KB
7 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.cso/css/article.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
674bacc340798e45b0f36e114f073eb3dec917b4e405d46a5066c73052c46a8a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281296
x-cache
HIT, HIT
status
200
content-length
6978
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:20 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072248,VS0,VE0
etag
W/"44945-1559759900000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:04 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
ss-social.css
www.csoonline.com/www.idge/css/webfonts/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/webfonts/ss-social.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c2787f84ac525e6b202f56eb25ef03f40017d11100280dd6f3866cadb4d1f50c

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
234662
x-cache
HIT, HIT
status
200
content-length
885
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:54 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072315,VS0,VE0
etag
W/"3417-1559759934000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 08:02:21 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
ss-standard.css
www.csoonline.com/www.idge/css/webfonts/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/webfonts/ss-standard.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b59054e128a42511aa22399d02cd8365ac1c66a6efe6f4f11cfe1ae16284db0c

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
429277
x-cache
HIT, HIT
status
200
content-length
2472
x-via-fastly
Verdad
x-served-by
cache-sjc3132-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:47:00 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072350,VS0,VE0
etag
W/"11639-1559587620000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 01:58:40 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
all.css
use.fontawesome.com/releases/v5.6.1/css/
52 KB
13 KB
Stylesheet
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
453893f7daa3d8fe9716f8c6d0f36f8ade8cacfc0093e164f4f998b46427959e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 17:44:03 GMT
server
NetDNA-cache/2.2
access-control-allow-origin
*
etag
W/"b8085bf2c839791244bd95f56fb93c01"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
text/css
status
200
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
xyb0fnv.js
fonts.staticworld.net/
18 KB
7 KB
Script
General
Full URL
https://fonts.staticworld.net/xyb0fnv.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
5a9c4b424254849d034541d05afd282527236eba23a7d28b2cff1e4b7fb54772

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
server
nginx
age
380
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript;charset=utf-8
status
200
cache-control
public, max-age=600
x-cache-hits
1
accept-ranges
bytes
x-timer
S1560093205.105371,VS0,VE1
content-length
7184
via
1.1 varnish
x-served-by
cache-hhn1520-HHN
select2.js
www.csoonline.com/www.idge.ans/js/select2-3.5.0/
77 KB
19 KB
Script
General
Full URL
https://www.csoonline.com/www.idge.ans/js/select2-3.5.0/select2.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f88f33a736ef0e7d27d78a7b2cdadb674ac192db9aede3a42c65ea1fd4386114

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
166278
x-cache
HIT, HIT
status
200
content-length
19734
x-via-fastly
Verdad
x-served-by
cache-sjc3144-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:12 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072390,VS0,VE0
etag
W/"79220-1559760012000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 13:00:23 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
alc_hashes.js
www.csoonline.com/www/js/utils/
25 KB
9 KB
Script
General
Full URL
https://www.csoonline.com/www/js/utils/alc_hashes.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
758d5a5cd2e6e37758716fc0806f90e90f8d07a7c41897c6df34ee80ef1d1269

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
86563
x-cache
HIT, HIT
status
200
content-length
9333
x-via-fastly
Verdad
x-served-by
cache-sjc3147-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:46 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072407,VS0,VE0
etag
W/"25212-1559760046000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 06:54:28 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1176, 2
insider_reg_api.js
www.csoonline.com/www/js/insider/
59 KB
22 KB
Script
General
Full URL
https://www.csoonline.com/www/js/insider/insider_reg_api.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
3a116c532905a517755fd4b3299f1d96d0847c9080816a97a494a0220ceed983

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281616
x-cache
HIT, HIT
status
200
content-length
21913
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:50 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072449,VS0,VE0
etag
W/"60909-1559760050000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
jquery.maskedinput-1.4.min.js
www.csoonline.com/www/js/insider/
4 KB
2 KB
Script
General
Full URL
https://www.csoonline.com/www/js/insider/jquery.maskedinput-1.4.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d61ee6f4c7b8572833d3bdad303493033c896a58ca134680319e3c4bef8756bb

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
243974
x-cache
HIT, HIT
status
200
content-length
1831
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:50 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072468,VS0,VE0
etag
W/"4139-1559760050000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 05:25:08 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
elqCfg.js
www.csoonline.com/www/js/analytics/eloqua/
2 KB
1 KB
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/eloqua/elqCfg.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
44dc64c082736ee986d3dda3134211b2b5361c6624d9c4acc187a79a8a8d6d6d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
503876
x-cache
HIT, HIT
status
200
content-length
938
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:47:00 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072487,VS0,VE0
etag
W/"2489-1559069220000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 04 Jun 2019 22:56:11 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
elqImg.js
www.csoonline.com/www/js/analytics/eloqua/
730 B
529 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/eloqua/elqImg.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
df6aa193b8808f4bdc6f38cf7d878dedd8e0aca737e2cf325fb5a967c372bcb8

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
20851
x-cache
HIT, HIT
status
200
content-length
367
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:34 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072629,VS0,VE0
etag
W/"730-1559760034000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 11:19:29 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
elqFCS.js
www.csoonline.com/www/js/analytics/eloqua/
1 KB
706 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/eloqua/elqFCS.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8cbde677cfad8b6a5531f472f6e79236392fd06ed3cd4acb9ef31612cbb6a66e

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
262426
x-cache
HIT, HIT
status
200
content-length
517
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:36 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072639,VS0,VE0
etag
W/"1143-1559760036000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 00:19:36 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
elqScr.js
www.csoonline.com/www/js/analytics/eloqua/
334 B
501 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/eloqua/elqScr.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9c857aafeb3aca95b2b9d1db13c1c7f5e1924aaf8d93e0e512bbd5d73ee3d98e

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
508295
x-cache
HIT, HIT
status
200
content-length
252
x-via-fastly
Verdad
x-served-by
cache-sjc3133-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:47:00 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072687,VS0,VE0
etag
W/"334-1559069220000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 04 Jun 2019 21:22:10 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
elqIDG.js
www.csoonline.com/www/js/analytics/eloqua/
812 B
546 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/eloqua/elqIDG.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
6e574a88a303d27876368be887fc6415d1928a18e7f81c0e2f6e992f32455e66

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
360064
x-cache
HIT, HIT
status
200
content-length
384
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:40 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072673,VS0,VE0
etag
W/"812-1559587720000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 07:04:37 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
ads.js
www.csoonline.com/www/js/ads/
19 B
207 B
Script
General
Full URL
https://www.csoonline.com/www/js/ads/ads.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
6a0f6cf6b4648c192d81b5fc7b70cb2f6819ef4a799e421e8626cae9697aa85a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
272043
x-cache
HIT, HIT
status
200
content-length
39
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:32 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072808,VS0,VE0
etag
W/"19-1559760032000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 21:35:38 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
load.js
s.ntv.io/serve/
269 KB
78 KB
Script
General
Full URL
https://s.ntv.io/serve/load.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.163 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-163.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
8a4f5012d1a688b1dadd281385cda711366c623f66fc4f29f449f0d0aa8bbd74

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:25 GMT
Content-Encoding
gzip
x-amz-request-id
E8C334D446C095F2
x-amz-server-side-encryption
AES256
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
x-amz-id-2
qUsWhcUfLxBETJFdfKFPc7VxYtLERguJ03FGH4p5j8GPQYm2B7CcvAJcWs5Uzj2peFZ74zxqqAo=
Last-Modified
Fri, 07 Jun 2019 00:36:57 GMT
Server
AmazonS3
ETag
"6085666cf34305ab10dd7a10505769f7"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
api.js
www.google.com/recaptcha/
762 B
545 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
bcb8ec500ddaf5cb57b8b4ea9e8374459c8d89edefdcabe38681ce37ec4ad119
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
448
x-xss-protection
1; mode=block
expires
Sun, 09 Jun 2019 15:13:25 GMT
183980-47728333013839.js
js-sec.indexww.com/ht/p/
103 KB
31 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183980-47728333013839.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9d6aa23598ba820181e6f464186ccdd385506e5871595ffcc80d3a48d6609562

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:25 GMT
Content-Encoding
gzip
Last-Modified
Sun, 09 Jun 2019 15:10:15 GMT
Server
Apache
ETag
"903f92-19ab8-58ae57606ea09"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
30946
Expires
Sun, 09 Jun 2019 16:13:25 GMT
oc-header.css
www.csoonline.com/www/css/
15 KB
3 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www/css/oc-header.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
91820d5453e2e3b84ae6e95af2a59a908e1075f57cb186004a1bfbdeb7ab0058

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281296
x-cache
HIT, HIT
status
200
content-length
2988
x-via-fastly
Verdad
x-served-by
cache-sjc3125-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:38 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072745,VS0,VE0
etag
W/"15601-1559759918000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:05 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
oc-header.css
www.csoonline.com/www.idge.cso/css/
1 KB
734 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.cso/css/oc-header.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
907b3888689f0c5f1b1e63e911624457626a85dfa61cb832288179c22cbb1a4d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281615
x-cache
HIT, HIT
status
200
content-length
540
x-via-fastly
Verdad
x-served-by
cache-sjc3148-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:18 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072771,VS0,VE0
etag
W/"1321-1559759898000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:16 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
CSO-logo-nameplate.svg
alt.idgesg.net/images/furniture/cso/
4 KB
5 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cso/CSO-logo-nameplate.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
37aa2df6eabbf801c05c6c35dc8314f9e284868f1a6ef2cb2732d2d33daff9f3

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
J7_zC4ZmBAKw_gubpezt0MRF7dQSpkU9
via
1.1 varnish, 1.1 varnish
age
3857
x-amz-meta-origin-date-iso8601
2019-03-20T14:31:00.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
4328
x-amz-id-2
Gbw7GkCZUPtULfdaZgNSN7KkrPhOpWSoqZElGhyRc/oKeIhhXiFkF6pmdl2IS9f2juR0MYrV7Sw=
x-served-by
cache-jfk8129-JFK, cache-hhn1520-HHN
last-modified
Wed, 20 Mar 2019 14:31:18 GMT
server
AmazonS3
x-timer
S1560093205.457119,VS0,VS0,VE0
etag
"bfed2d4c9019f149b8d0f1ce2174b10b"
x-amz-request-id
098DD9C2D9D479FC
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 3
CIO-logo-blk-wht-no-tag.svg
alt.idgesg.net/images/furniture/cio/
980 B
1 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cio/CIO-logo-blk-wht-no-tag.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
df8087f58aadffcf6759d2849839b08e847025a442e7f6bd6af7ac0acdbed2ce

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
bhW0dIHnh8_NGc1z16f4zcrft0BFTgNb
via
1.1 varnish, 1.1 varnish
age
4484
x-amz-meta-origin-date-iso8601
2018-11-02T18:11:01.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
980
x-amz-id-2
6xz4oKZlOu499MJsROyMzRBBVA30Z0MoRxTTyPHyJzWSl4UfZFOwAtKIYV9/Qh9qY5+2loHAh8g=
x-served-by
cache-jfk8133-JFK, cache-hhn1520-HHN
last-modified
Fri, 02 Nov 2018 20:21:48 GMT
server
AmazonS3
x-timer
S1560093205.457085,VS0,VS0,VE0
etag
"bccef4d6a8fa4d9d64f2ac7ee0d19487"
x-amz-request-id
253971C172121259
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 123
Computerworld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/computerworld/
2 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/Computerworld_logo-white-no-tag.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c80b8e38e93a84d8bcf76639294cabc7f0bad535d4a896660004734cc5d1c61a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
R2CU5MklK2AqLAfnWoUIB37ZDYKnQWhh
via
1.1 varnish, 1.1 varnish
age
5622
x-amz-meta-origin-date-iso8601
2018-11-02T18:24:47.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
1970
x-amz-id-2
o9fab6nWbvJ/LB6OP1Sg6sgYqDlSMaeAuE1lcEIquCfpJd2q3+LOEC99Lrs9Do9tEmM7rV7M+SA=
x-served-by
cache-jfk8135-JFK, cache-hhn1520-HHN
last-modified
Fri, 02 Nov 2018 20:25:21 GMT
server
AmazonS3
x-timer
S1560093205.457074,VS0,VS0,VE1
etag
"7a6da09ff6f6cadafa0efb1f23092c4f"
x-amz-request-id
3E7DFFFA88B4F70A
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 1
NetworkWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/networkworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/networkworld/NetworkWorld_logo-white-no-tag.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cce1a9282d617a8475100f0a0505c83464852a4ec34ff854792d8af13dccb8aa

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
stYFwwJhU_K5wdqG2YDDTO_Y2rQjmQ4H
via
1.1 varnish, 1.1 varnish
age
1293
x-amz-meta-origin-date-iso8601
2018-11-02T18:14:57.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
2641
x-amz-id-2
ptyDDThJ/mhhEnawqOS86Ju4QxhfHQdLtyhP2bwcM/TNj2KQlMigS4e+t/0bVH1JUZr9LC/nPnY=
x-served-by
cache-jfk8132-JFK, cache-hhn1520-HHN
last-modified
Fri, 02 Nov 2018 20:26:11 GMT
server
AmazonS3
x-timer
S1560093205.457113,VS0,VS0,VE0
etag
"e83d03b426e2cff512d1e2f8b00be3c6"
x-amz-request-id
B28D21E2C9B1AC5D
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
7, 2
InfoWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/infoworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/infoworld/InfoWorld_logo-white-no-tag.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
17bb8b5dfa44693e301a436b03b03ef05ed0a581e6e036aef2756a5c03034356

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
iCWBp9tPxAaqtQ9G1uBiqNqsBKm09VdU
via
1.1 varnish, 1.1 varnish
age
4540
x-amz-meta-origin-date-iso8601
2018-11-02T18:22:02.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
2598
x-amz-id-2
WV6zGIEm4H5CfsZUb3Dv3yP3lfVb7RBfPwzEEmBeanPni9yexnM1bGZLst6ZdCkzwCtoLiaa89I=
x-served-by
cache-jfk8129-JFK, cache-hhn1520-HHN
last-modified
Fri, 02 Nov 2018 20:25:44 GMT
server
AmazonS3
x-timer
S1560093205.458518,VS0,VS0,VE0
etag
"dd990c1b71bf205702dbce78f3709d65"
x-amz-request-id
9095ECAF1DD75F58
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 5
content-ribbon.css
www.csoonline.com/www/css/
2 KB
722 B
Stylesheet
General
Full URL
https://www.csoonline.com/www/css/content-ribbon.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fd66d8dc41c06a99c3877934b3af8d38de72f3a94db252c0b9474bec35014491

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281590
x-cache
HIT, HIT
status
200
content-length
522
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:36 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.072864,VS0,VE0
etag
W/"1829-1559759916000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
dave_lewis-headshot_150x150-100258241-byline.jpg
images.techhive.com/images/article/2014/03/
5 KB
5 KB
Image
General
Full URL
https://images.techhive.com/images/article/2014/03/dave_lewis-headshot_150x150-100258241-byline.jpg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7f50b51f0ef7f4478d639ec9ab59169e420fed17d4792eb84e3589e989730c03

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
CF6kIks9qWMUcktb_.0Hp8BTs1HB_Baa
via
1.1 varnish, 1.1 varnish
age
0
x-cache
HIT, MISS
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
5072
x-amz-id-2
xIauLBybM0ZoBouszg/22XDHeJG7ofPy3OEBxv3sN3n+qfxkr8oU5cMdoZV/2W/2sy6ABZP3/LI=
x-served-by
cache-jfk8134-JFK, cache-hhn1520-HHN
last-modified
Mon, 20 May 2019 23:58:10 GMT
server
AmazonS3
x-timer
S1560093205.430952,VS0,VS0,VE102
etag
"17f7c43db48fd9bbe3cf7de4eddef5a3"
x-amz-request-id
62D09474ACADAC29
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 0
twitter.svg
idge.staticworld.net/images/
1 KB
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/twitter.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
464e7cde418a559c5035942d1ab154d5d906f378f256a0dd39848d197df6180d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
mIV1aQJqOkkgyHLgPXYdWBvfLAAcgw1y
via
1.1 varnish, 1.1 varnish
age
3519
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
1128
x-amz-id-2
b2+I5LSStbNzAFWcTvXdnoOCEOMT71vxd+VHkp3TQWNkwFg99Qe42lWR71xeNeSw5w7NzvHFZyc=
x-served-by
cache-jfk8149-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:11 GMT
server
AmazonS3
x-timer
S1560093205.458540,VS0,VS0,VE0
etag
"5c2cee17abf8296b156fa142e69516df"
x-amz-request-id
585ED1411B406E87
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 18
facebook.svg
idge.staticworld.net/images/
817 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/facebook.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
676aa6d4090a54ea6893484095f55c80659fb8538db100cdb8ce1dc82bab42b8

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
z0fEqr9qBUOYVzkAEhE7W.44xxx.2BcQ
via
1.1 varnish, 1.1 varnish
age
4967
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
817
x-amz-id-2
PAo7jP/TPINy3/PF5IcELqQrx5WV1YGhkTAK2yydftTzCGKFrombJzrjwPr5ITwj91fXoiLIoJU=
x-served-by
cache-jfk8127-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1560093205.458555,VS0,VS0,VE0
etag
"e54119fb283fa31d7980c946d19e701f"
x-amz-request-id
CE0402E6E84346E9
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
11, 22
linkedin.svg
idge.staticworld.net/images/
786 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/linkedin.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
03643efcf63e8fbfe6571cd0f1a4ce49f8575a7bee74f2e9fd7fab344e474e48

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
dIfJAJb7rR9o.DnrV3iep_mz2NuSUCHZ
via
1.1 varnish, 1.1 varnish
age
5051
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
786
x-amz-id-2
mSXpZxKOZMfj/yDum+1w6ZNVCooRoNcPZ0J2JPeJGSjedAMmx3NAPIM5wHuPCQ/dVBxUqevo7EE=
x-served-by
cache-jfk8141-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1560093205.458611,VS0,VS0,VE0
etag
"b828f13d2d6015e831f675f1ca0c1908"
x-amz-request-id
0624126ACD2B7708
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
7, 495
reddit.svg
idge.staticworld.net/images/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/images/reddit.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
47c749c888c850505d68f2745651928d8aec9a6802d6a8b20869fa114af92277

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
X1o6g.mfoioyv5Lswf3F9n.2ID0CCWF9
via
1.1 varnish, 1.1 varnish
age
5304
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
1556
x-amz-id-2
VK11onnxji7+3toOJKOH4TgoaPOCoHlyKxrG5TG1f6d55lVoTbs7bXKvog1e0VnrBo7EV78/RvQ=
x-served-by
cache-jfk8150-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1560093205.471232,VS0,VS0,VE0
etag
"8159d85ae759a8d251edb65b4dcd285d"
x-amz-request-id
54AAF5C5501FF204
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 24
mail.svg
idge.staticworld.net/images/
631 B
889 B
Image
General
Full URL
https://idge.staticworld.net/images/mail.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
83d86c9e7359ed844c0e7682abcd5cdb65222d421c61156f17791ac6c2650274

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
W1fLolU3CaghgVscFveqAiphPY036Sqp
via
1.1 varnish, 1.1 varnish
age
1817
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
631
x-amz-id-2
r5roK5O/FxPND9NPbsxDtu/9FdSwqszeLGaGlDe10C3wMMFi3JuOkmsdQrG6cv8Nwg8pXi94UL0=
x-served-by
cache-jfk8123-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1560093205.471312,VS0,VS0,VE0
etag
"c8fc97e05e008a042825f64ee7d414d1"
x-amz-request-id
9A0E6EC9FD5786B8
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
29, 8
print.svg
idge.staticworld.net/images/
782 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/print.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b197985c0bef8bc365381bd16e15dccf184eb33d0abf0afdb4f567da2000fb2

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
.7Gmo7QCRJqJTxCocIfBynAqOGj25mL.
via
1.1 varnish, 1.1 varnish
age
6363
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
782
x-amz-id-2
mVzOi+RHspq7jQMPALTsbZf2lcNHfh0kG/si5fUH1RQ3cJ9935Y/yQLTT+zqgHXOda2wec6yD9o=
x-served-by
cache-jfk8148-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1560093205.471320,VS0,VS0,VE0
etag
"a9f65e3b5eddc5c537118a146a3333c7"
x-amz-request-id
46D6EC99850912FE
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
12, 21
stickyLb.js
www.csoonline.com/www/js/ads/
4 KB
2 KB
Script
General
Full URL
https://www.csoonline.com/www/js/ads/stickyLb.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f6bbd3540733be952a2921b2e4716d3b5190d5897510efcf9baa09649a1eaedf

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
430164
x-cache
HIT, HIT
status
200
content-length
1257
x-via-fastly
Verdad
x-served-by
cache-sjc3148-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:36 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.241366,VS0,VE0
etag
W/"3657-1559587716000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 01:42:24 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2248
embedder-jwp.js
www.csoonline.com/www/js/video/
2 KB
828 B
Script
General
Full URL
https://www.csoonline.com/www/js/video/embedder-jwp.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f0b97fc49950832323730d508911fa12bd098eca0670ccb3a18ada5af3a34699

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281590
x-cache
HIT, HIT
status
200
content-length
640
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:54 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.255019,VS0,VE0
etag
W/"1760-1559760054000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
3, 2
sponsored-links.css
www.csoonline.com/www.idge/css/
2 KB
720 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/sponsored-links.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
7db36b8d785d5d811ee1d82db5eeea2045f34a14d7dc70dc6c9f20053a26c23c

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281296
x-cache
HIT, HIT
status
200
content-length
556
x-via-fastly
Verdad
x-served-by
cache-sjc3151-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:58 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.076922,VS0,VE0
etag
W/"2117-1559759938000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:10 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
sponsored-links.css
www.csoonline.com/www.idge.cso/css/
643 B
410 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.cso/css/sponsored-links.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
e969bb16ae7b47a2ca815d51402b844ff2da906270adad2d56878b5d788ecb98

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281616
x-cache
HIT, HIT
status
200
content-length
275
x-via-fastly
Verdad
x-served-by
cache-sjc3134-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:18 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.076969,VS0,VE0
etag
W/"643-1559759898000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
foot.css
www.csoonline.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/foot.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a917566e751e5fb831c9d4381f464c7dcf95d8a0f59f4b217bc1cb94b4a28de4

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281616
x-cache
HIT, HIT
status
200
content-length
1582
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:54 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.077002,VS0,VE0
etag
W/"7242-1559759934000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:44 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
3, 3
foot.css
www.csoonline.com/www.idge.cso/css/
2 KB
752 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge.cso/css/foot.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
3845d649bd2d5144b1fd77e816050954f99a21042479354512ca8213d0d30f80

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281296
x-cache
HIT, HIT
status
200
content-length
610
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:18 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.076979,VS0,VE0
etag
W/"1999-1559759898000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:05 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
jquery-ui.js
www.csoonline.com/www/js/jquery/
292 KB
69 KB
Script
General
Full URL
https://www.csoonline.com/www/js/jquery/jquery-ui.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
66b5ca68288cc2506f1c5709fe38cebccca428406a7ce96e392718203666d503

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
347360
x-cache
HIT, HIT
status
200
content-length
70949
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:50 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.273763,VS0,VE0
etag
W/"299210-1559587730000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 10:43:01 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
jquery.dfp.min.js
www.csoonline.com/www/js/jquery/
4 KB
2 KB
Script
General
Full URL
https://www.csoonline.com/www/js/jquery/jquery.dfp.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
053d5c873a012d89c7a079d097426cfddb18b28494a55c51eff89e0294540dfd

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
64778
x-cache
HIT, HIT
status
200
content-length
1757
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:40 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.274908,VS0,VE0
etag
W/"4433-1559760040000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 22:58:40 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
shortstack_nav.js
www.csoonline.com/www.idge/js/mule/
2 KB
649 B
Script
General
Full URL
https://www.csoonline.com/www.idge/js/mule/shortstack_nav.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fb6b1425ff73fe62d725a3981ac08d9f57e16e14d5ae321c617e21e1d7403d1f

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
90811
x-cache
HIT, HIT
status
200
content-length
480
x-via-fastly
Verdad
x-served-by
cache-sjc3151-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:41:10 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.294997,VS0,VE0
etag
W/"2129-1559760070000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 05:42:46 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
tracking.js
www.csoonline.com/www/js/analytics/
1 KB
685 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/tracking.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
607bfd152e5c762ba0f0502f653c7bbb546ad7955e792a9840d4ae28a8219423

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
268576
x-cache
HIT, HIT
status
200
content-length
538
x-via-fastly
Verdad
x-served-by
cache-sjc3140-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:36 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295189,VS0,VE0
etag
W/"1075-1559760036000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 22:33:14 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
3, 3
autocomplete.js
www.csoonline.com/www/js/
1 KB
780 B
Script
General
Full URL
https://www.csoonline.com/www/js/autocomplete.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c7e1ddc2de3256e9b1db3c3733f38a74a9cdcbf1c424d559519f85cfe0e321ba

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
268513
x-cache
HIT, HIT
status
200
content-length
627
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:44 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295223,VS0,VE0
etag
W/"1254-1559760044000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 22:33:14 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
social_sidecar.js
www.csoonline.com/www.idge/js/
3 KB
1 KB
Script
General
Full URL
https://www.csoonline.com/www.idge/js/social_sidecar.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
e361531fa141864a28133b1d0174d3082ccc117fb347d7a913877faac08b9df0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
73339
x-cache
HIT, HIT
status
200
content-length
1150
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:41:12 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295471,VS0,VE0
etag
W/"3094-1559760072000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:48:55 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
jquery.colorbox-min.js
www.csoonline.com/www.idge/js/jquery/plugins/
11 KB
5 KB
Script
General
Full URL
https://www.csoonline.com/www.idge/js/jquery/plugins/jquery.colorbox-min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f370d6bd05df8e6a5b671f06e038c4d85d95dc5446fdeb8f8762e817882a8322

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
22926
x-cache
HIT, HIT
status
200
content-length
4634
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:41:04 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295498,VS0,VE0
etag
W/"11081-1559760064000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 10:09:38 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
article.js
www.csoonline.com/www.idge/js/
2 KB
764 B
Script
General
Full URL
https://www.csoonline.com/www.idge/js/article.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
786653b773ea8e89e055b1380faa96769ed8bc605d6cfda8332f2c21408040cc

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281590
x-cache
HIT, HIT
status
200
content-length
623
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:41:12 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295549,VS0,VE0
etag
W/"1721-1559760072000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:45 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
prettify.js
www.csoonline.com/www/js/
14 KB
7 KB
Script
General
Full URL
https://www.csoonline.com/www/js/prettify.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
03fe6ca60cfaf61cba3353a0b460ed2912b07b09858e1f01ef55e0cff50e0ec7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
333097
x-cache
HIT, HIT
status
200
content-length
6531
x-via-fastly
Verdad
x-served-by
cache-sjc3134-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:44 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295664,VS0,VE0
etag
W/"14584-1559587724000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 00:36:55 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
responsive-tables.js
www.csoonline.com/www.idge/js/jquery/
1 KB
728 B
Script
General
Full URL
https://www.csoonline.com/www.idge/js/jquery/responsive-tables.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a739dbffc4a907c1f133b4b26e0daf544ea743218bba5704a910313b0ef3ac10

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
347195
x-cache
HIT, HIT
status
200
content-length
541
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:49:12 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295826,VS0,VE0
etag
W/"1363-1559587752000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 10:44:35 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
jquery.tablesorter.min.js
www.csoonline.com/www.idge/js/jquery/
16 KB
5 KB
Script
General
Full URL
https://www.csoonline.com/www.idge/js/jquery/jquery.tablesorter.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
55e8d16bb1a291b0524928dd3bd20c191a14d8a947e4b141271f9c595c7bb451

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
558882
x-cache
HIT, HIT
status
200
content-length
4808
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:48:14 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295866,VS0,VE0
etag
W/"16373-1559069294000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 04 Jun 2019 21:22:10 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
jquery.lazyload.min.js
www.csoonline.com/www/js/jquery/
3 KB
1 KB
Script
General
Full URL
https://www.csoonline.com/www/js/jquery/jquery.lazyload.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
267179
x-cache
HIT, HIT
status
200
content-length
1300
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:42 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.295867,VS0,VE0
etag
W/"3396-1559760042000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 12:15:09 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
2, 2
global.js
www.csoonline.com/www.idge/js/
7 KB
3 KB
Script
General
Full URL
https://www.csoonline.com/www.idge/js/global.js?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
869ff0ba952924c539c2858fbfb032e6caf14f0a8805be73156ca21debd6ea2d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281389
x-cache
HIT, HIT
status
200
content-length
2405
x-via-fastly
Verdad
x-served-by
cache-sjc3127-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:41:02 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296124,VS0,VE0
etag
W/"7636-1559760062000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 19:02:05 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
5, 2
ss-social.js
www.csoonline.com/www/js/webfonts/
4 KB
2 KB
Script
General
Full URL
https://www.csoonline.com/www/js/webfonts/ss-social.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
af34f58ea2fc346a5f7028ad8b721a9bb31405cf283471a37dab53bad10a6a36

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
585185
x-cache
HIT, HIT
status
200
content-length
1766
x-via-fastly
Verdad
x-served-by
cache-sjc3151-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:47:10 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296169,VS0,VE0
etag
W/"3950-1559069230000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 05 Jun 2019 04:06:35 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
ss-standard.js
www.csoonline.com/www/js/webfonts/
11 KB
4 KB
Script
General
Full URL
https://www.csoonline.com/www/js/webfonts/ss-standard.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
bdfe5b167ff906b96e1f8f028ac8f5e41af7a1892d0cc3a275d28057ba79c0a9

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
535907
x-cache
HIT, HIT
status
200
content-length
3898
x-via-fastly
Verdad
x-served-by
cache-sjc3134-SJC, cache-hhn1520-HHN
last-modified
Tue, 28 May 2019 18:47:10 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296096,VS0,VE0
etag
W/"10818-1559069230000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Wed, 05 Jun 2019 04:05:38 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
brandAnalytics.js
www.csoonline.com/www/js/analytics/
2 KB
631 B
Script
General
Full URL
https://www.csoonline.com/www/js/analytics/brandAnalytics.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9844fb443bd322af1d908116fa890abdbed6b8b6fe73fba91c9beb8408318aad

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
339950
x-cache
HIT, HIT
status
200
content-length
461
x-via-fastly
Verdad
x-served-by
cache-sjc3127-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:40 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296047,VS0,VE0
etag
W/"2516-1559587720000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Mon, 10 Jun 2019 22:41:41 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 3
jquery.lazyload-ad.js
www.csoonline.com/www/js/ads/
10 KB
3 KB
Script
General
Full URL
https://www.csoonline.com/www/js/ads/jquery.lazyload-ad.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4e6b5fc328bac95eec2e30afa8a58224c9accc6d70daf0e864d75c4c6d07fe94

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
353979
x-cache
HIT, HIT
status
200
content-length
3089
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-hhn1520-HHN
last-modified
Mon, 03 Jun 2019 18:48:38 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296098,VS0,VE0
etag
W/"9912-1559587718000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Tue, 11 Jun 2019 08:46:09 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
liveRamp.js
www.csoonline.com/www/js/utils/
907 B
603 B
Script
General
Full URL
https://www.csoonline.com/www/js/utils/liveRamp.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
650ae71f579feb5002cf59bb44ead1b0fbec98923fe09a9dbfdde2b865f664ef

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
85242
x-cache
HIT, HIT
status
200
content-length
465
x-via-fastly
Verdad
x-served-by
cache-sjc3134-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:40:48 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296179,VS0,VE0
etag
W/"907-1559760048000"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 07:22:27 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
spiffymachine.com/v2/0/
74 KB
23 KB
Script
General
Full URL
https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
9a519b487d9753d903deb5d65ca0faa0c6fa0d572a89b71a4ced7e354447ad9d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-datacenter
gce-europe-west1
etag
6d98d40f27da20f66fc9de3c1b4c790809cfdf12956765b5c5a82b0a35a3d930
vary
Accept-Encoding
x-hostname
hank
content-type
application/javascript
status
200
cache-control
private, must-revalidate, max-age=21600
timing-allow-origin
*
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
66 KB
13 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A25%2B00%3A00&ts=1560093205203
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
a2da03e31d3f31b5fc134e1ac2ca24b5fe80b47b5eed6eda1d47a5b5116e8191
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
12522
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
gpt.js
www.googletagservices.com/tag/js/
31 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/www/js/ads/gpt_starter.js?1234
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
50b96fc0cfd363b826c43a068f6c92e6d4ebd8c537570b674d48813a5dfdfa14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"191 / 651 of 1000 / last-modified: 1559942344"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10443
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:25 GMT
inline-header.css
www.csoonline.com/www.idge/css/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/inline-header.css?v=20190605114146
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
1a5fbcd5baebb9fbf16b08afd53bbc22b5b24e52382f8fe45f117f53f17ff1f9

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
281615
x-cache
HIT, HIT
status
200
content-length
1770
x-via-fastly
Verdad
x-served-by
cache-sjc3123-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:58 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.254971,VS0,VE0
etag
W/"8803-1559759938000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Wed, 12 Jun 2019 18:59:45 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
print.css
www.csoonline.com/www.idge/css/
2 KB
938 B
Stylesheet
General
Full URL
https://www.csoonline.com/www.idge/css/print.css
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a5e5c781317ce492049cb1f9e1deec67c47bbe5dbd03ec12f688cf7a221a79f2

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
232010
x-cache
HIT, HIT
status
200
content-length
733
x-via-fastly
Verdad
x-served-by
cache-sjc3132-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:38:58 GMT
server
Apache-Coyote/1.1
x-timer
S1560093205.296166,VS0,VE0
etag
W/"1871-1559759938000"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
expires
Thu, 13 Jun 2019 08:42:49 GMT
cache-control
max-age=604800
accept-ranges
bytes
x-cache-hits
1, 2
svrGP.aspx
secure.p01.eloqua.com/visitor/v200/
49 B
373 B
Image
General
Full URL
https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=1856&ref2=elqNone&tzo=0&ms=280
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.130 , United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sun, 09 Jun 2019 15:13:27 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1
template
www.csoonline.com/blank/ Frame 1C32
Redirect Chain
  • https://www.csoonline.com/elqNow/elqBlank.htm
  • https://www.csoonline.com/blank/template
11 B
255 B
Document
General
Full URL
https://www.csoonline.com/blank/template
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/www/js/analytics/eloqua/elqFCS.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
636159b35205da4142a43bc02d2849d77d3ac07a0946211585cde15a9c6ff21f

Request headers

:method
GET
:authority
www.csoonline.com
:scheme
https
:path
/blank/template
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
cookie
last_visit_bc=1560093205170; BCRevision_1560093205190=%7B%22method%22%3A%22setProperties%22%2C%22param%22%3A%7B%22properties%22%3A%7B%22language%22%3A%5B%22en%22%5D%2C%22currentscreenwidth%22%3A%5B1600%5D%2C%22currentscreenheight%22%3A%5B1200%5D%2C%22currentresolution%22%3A%5B%221600x1200%22%5D%2C%22entrypage%22%3A%5B%22https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html%22%5D%2C%22new_visit_bc%22%3A%5B%22true%22%5D%7D%2C%22sources%22%3A%7B%22listenerinteractiontype%22%3A%5B%22language%22%2C%22currentscreenwidth%22%2C%22currentscreenheight%22%2C%22currentresolution%22%2C%22entrypage%22%5D%2C%22newvisitlistener%22%3A%5B%22new_visit_bc%22%5D%7D%7D%2C%22requestId%22%3A%22rev_1560093205190%22%7D; BCRevision_1560093205191=%7B%22method%22%3A%22addProperties%22%2C%22param%22%3A%7B%22properties%22%3A%7B%22resolution%22%3A%5B%221600x1200%22%5D%7D%2C%22sources%22%3A%7B%22listenerinteractiontype%22%3A%5B%22resolution%22%5D%7D%7D%2C%22requestId%22%3A%22rev_1560093205191%22%7D; aiia=true
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
server
Apache-Coyote/1.1
content-type
text/html;charset=UTF-8
content-encoding
gzip
cache-control
max-age=14400
x-fastly-ttl
14400.000
x-fastly-stale
432000.000
via
1.1 varnish 1.1 varnish
accept-ranges
bytes
date
Sun, 09 Jun 2019 15:13:25 GMT
age
22415
x-served-by
cache-sjc3135-SJC, cache-hhn1520-HHN
x-cache
HIT, HIT
x-cache-hits
4, 2
x-timer
S1560093205.464201,VS0,VE0
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
content-length
23

Redirect headers

status
301
server
Apache-Coyote/1.1
location
/blank/template
content-encoding
gzip
content-type
text/html; charset=UTF-8
cache-control
max-age=14400
x-fastly-ttl
14400.000
x-fastly-stale
432000.000
via
1.1 varnish 1.1 varnish
accept-ranges
bytes
date
Sun, 09 Jun 2019 15:13:25 GMT
age
24941
x-served-by
cache-sjc3129-SJC, cache-hhn1520-HHN
x-cache
HIT, HIT
x-cache-hits
2, 7
x-timer
S1560093205.298461,VS0,VE0
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
content-length
20
svrGP.aspx
secure.p01.eloqua.com/visitor/v200/
Redirect Chain
  • https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306
  • https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306&elqCookie=1
79 B
505 B
Script
General
Full URL
https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306&elqCookie=1
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.130 , United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
Software
/
Resource Hash
9777efb15beb5bd9927a30454bd69769e5ceca210f00aa52bd319d680bee8c21
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Date
Sun, 09 Jun 2019 15:13:27 GMT
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
105
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sun, 09 Jun 2019 15:13:27 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=70&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html&ms=306&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
332
Expires
-1
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019053001.js
securepubads.g.doubleclick.net/gpt/
148 KB
54 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019053001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
8bd06a157f6234495a2a93e0ad4166ebe82bf9d69a20831eadd196aad3f152b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 May 2019 13:05:09 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
55383
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:25 GMT
pub
pixel.adsafeprotected.com/services/
865 B
1 KB
XHR
General
Full URL
https://pixel.adsafeprotected.com/services/pub?anId=8879&slot=%7Bid:gpt-skin,ss:%5B1.1%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&slot=%7Bid:inread,ss:%5B1.1,2.1%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&slot=%7Bid:gpt-overlay,ss:%5B640.480%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&slot=%7Bid:topleaderboard,ss:%5B970.90,970.250,728.90%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&slot=%7Bid:topimu,ss:%5B300.600,300.250,160.600%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&slot=%7Bid:oc_ad_1,ss:%5B7.7%5D,p:/8456/IDG.G_B2B_CSOOnline.com/security_section,t:display%7D&wr=1600.1200&sr=1600.1200&sessionId=65d2f59c-2954-f890-b595-bac10a78058c&url=https%253A%252F%252Fwww.csoonline.com%252Farticle%252F2687265%252Fremote-exploit-in-bash-cve-2014-6271.html
Requested by
Host: cdn.adsafeprotected.com
URL: https://cdn.adsafeprotected.com/iasPET.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.26 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.pixel.adsafeprotected.com
Software
nginx /
Resource Hash
895830e74284179aba9c4c58787d60e5043c2d9fd61389261e9d111ad3419bf4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:25 GMT
X-Server-Name
app25ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Origin
https://www.csoonline.com
Access-Control-Expose-Headers
X-Server-Name
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Server
nginx
9d91b3528a586c6f12a6c3bc71fa817e
idg.blueconic.net/plugin/plugin/
86 KB
21 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/plugin/9d91b3528a586c6f12a6c3bc71fa817e
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
7e3f61a257e65e8c82601c44a52bcb4598c58cba6c36fa23041cc16af61792f3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
server
-
etag
9d91b3528a586c6f12a6c3bc71fa817e
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
x-robots-tag
noindex, nofollow
content-length
21240
x-xss-protection
1; mode=block
expires
Mon, 08 Jun 2020 15:13:25 GMT
557208579be275e9a4d7cd7439f286aa
idg.blueconic.net/plugin/library/
271 KB
82 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/library/557208579be275e9a4d7cd7439f286aa
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
aa4c0e3bbcf82ab51f6f7cdc71783569bdeed8357000ac3e7433fbee8e1e89b1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
server
-
etag
557208579be275e9a4d7cd7439f286aa
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
x-robots-tag
noindex, nofollow
content-length
83276
x-xss-protection
1; mode=block
expires
Mon, 08 Jun 2020 15:13:25 GMT
LB-Zone-1
idg.blueconic.net/DG/DEFAULT/rest/rpc/json/
1 KB
1 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json/LB-Zone-1?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=&bctempid=649f1906-1075-476e-9e72-38db5b01a4ba&overruleReferrer=&time=2019-06-09T15%3A13%3A25%2B00%3A00&ts=1560093205774
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
6eb4e5504eb9654aa6e2e14f07d640404bca9be42530631016c1edf90aa73541
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
613
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
navkAE1sQ1XzN61QwCJFGhJGKD9rOZyNZvL_VWNdpyc1eOuYjZWDqpgksk7gCioYMW7mG_SYqa3
spiffymachine.com/v2/0/
114 KB
35 KB
Script
General
Full URL
https://spiffymachine.com/v2/0/navkAE1sQ1XzN61QwCJFGhJGKD9rOZyNZvL_VWNdpyc1eOuYjZWDqpgksk7gCioYMW7mG_SYqa3
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
ea1a2a0de916894ba85ed6500751ac2eceaf9bfdc7bda25988ea42c97ef08ca5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
x-datacenter
gce-europe-west1
etag
7ad89d64442c9c4394334c44a6d0de1c924eedcf826aae924b65d3e03002705e
vary
Accept-Encoding
access-control-allow-methods
POST, OPTIONS
content-type
application/javascript
status
200
cache-control
private, must-revalidate, max-age=21600
access-control-allow-credentials
true
access-control-allow-headers
DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Cookie
x-hostname
hank
timing-allow-origin
*
access-control-allow-origin
*
svrGP.aspx
secure.p01.eloqua.com/visitor/v200/ Frame 1C32
0
0
Document
General
Full URL
https://secure.p01.eloqua.com/visitor/v200/svrGP.aspx?pps=31&siteid=1856&ref=https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html?blogpost=applications%26applications=06-09-2019&ref2=elqNone&tzo=0&ms=921
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/www/js/analytics/eloqua/elqFCS.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.130 , United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Host
secure.p01.eloqua.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Accept-Encoding
gzip, deflate, br
Cookie
ELOQUA=GUID=334B966E1E64423A8F9DA3EB86DC8B2E; ELQSTATUS=OK
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

Cache-Control
private,no-cache, no-store
Pragma
no-cache
Content-Type
text/html; charset=utf-8
Content-Encoding
gzip
Expires
-1
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Content-Type-Options
nosniff
Strict-Transport-Security
max-age=31536000;
Date
Sun, 09 Jun 2019 15:13:27 GMT
Content-Length
82
gtm.js
www.googletagmanager.com/
135 KB
37 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
915bbf4d9813c1f5637c3392d57c41b34c84c967bd08e49971597a498449c12c
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
br
last-modified
Fri, 07 Jun 2019 16:50:32 GMT
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
37379
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:25 GMT
f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
cdn.permutive.com/
363 KB
74 KB
Script
General
Full URL
https://cdn.permutive.com/f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.75.210 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
210.75.190.35.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
b8a851a5e971d557236e49266f8bd0951149fb66f7212f6e32729a925baffc01

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:10:43 GMT
content-encoding
gzip
age
162
status
200
x-guploader-uploadid
AEnB2UoYl6Bo7kIm48YdL8wsZYpzPUYvo4dVT2sIj7GDJz0glT-5BtGoX_Llr1EDA4cvOEmvsSKJmsO_wQIK0qZaZILWnEC6QA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
1
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
75452
last-modified
Wed, 05 Jun 2019 07:33:17 GMT
server
UploadServer
etag
"01bd53be36e15205bd8f1f62994af50a"
vary
Accept-Encoding
x-goog-hash
crc32c=+SiMhg==, md5=Ab1TvjbhUgW9jx9imUr1Cg==
x-goog-generation
1559719997350895
cache-control
max-age=300, public
x-goog-stored-content-length
75452
accept-ranges
bytes
content-type
application/javascript
expires
Sun, 09 Jun 2019 15:15:43 GMT
CSO-logo-nav.svg
alt.idgesg.net/images/furniture/cso/
2 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cso/CSO-logo-nav.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9eb5f4aaf681528b1c83e13a0e9302e9f05132372e35dbc96c95485198028d56

Request headers

Referer
https://www.csoonline.com/www.idge.cso/css/oc-header.css?v=20190605114146
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
1AZpuIKi8PcjBsPZ3lrXz_o5ZjbADhP.
via
1.1 varnish, 1.1 varnish
age
4349
x-amz-meta-origin-date-iso8601
2019-03-20T14:28:52.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
2222
x-amz-id-2
by8jPjIwRD7+wV7eJzT7fki2J3hnmRbTJobtJJAwKU+Rm7nEpM3wAul91SlwQpvIXMPinkyKE3k=
x-served-by
cache-jfk8147-JFK, cache-hhn1520-HHN
last-modified
Wed, 20 Mar 2019 14:29:23 GMT
server
AmazonS3
x-timer
S1560093206.943601,VS0,VS0,VE1
etag
"a826e9631dda67c762e2f43ab9fbe6a6"
x-amz-request-id
1CBC3C68CEA1A7E2
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 1
insider-logo-updated.svg
idge.staticworld.net/images/
3 KB
3 KB
Image
General
Full URL
https://idge.staticworld.net/images/insider-logo-updated.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
90e7f8120f6d2e856e3a487abe2551c75bea54bee192a5a9b8afa4a0216eefa6

Request headers

Referer
https://www.csoonline.com/www.idge/css/inline-header-mobile.css?v=20190605114146
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
CqyWtbm.VH6O14ZU_g_VPqkHhNPzIAa5
via
1.1 varnish, 1.1 varnish
age
1335
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
3102
x-amz-id-2
0tboOpt2QDbf6qvs02andLXvk4ERLMhDrp8uzFI3dvSpS7S6vbtHy4epW3085vfJx5Byra3oTd8=
x-served-by
cache-jfk8140-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1560093206.943625,VS0,VS0,VE0
etag
"6f2e6c9e8e4cba254e168d6355376522"
x-amz-request-id
EB422A270F8DC84A
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
4, 2
hamburger-v2.svg
alt.idgesg.net/images/furniture/
610 B
888 B
Image
General
Full URL
https://alt.idgesg.net/images/furniture/hamburger-v2.svg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
413215e01c47f149df91c6d2281bc5288980420466333b3190d2807c1a5a6966

Request headers

Referer
https://www.csoonline.com/www/css/oc-header.css?v=20190605114146
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
1fnsULWZsCA3r7yvlAPj1P80IHmK7W6x
via
1.1 varnish, 1.1 varnish
age
4593
x-amz-meta-origin-date-iso8601
2018-12-17T19:19:51.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
610
x-amz-id-2
skjByU/tOtIuErtOr/T6gbd8t15V2TCgFwHDgicCe3ft0pdLdo5SXTUpiHqp0Ybg7Wi7oN7FmLc=
x-served-by
cache-jfk8142-JFK, cache-hhn1520-HHN
last-modified
Mon, 17 Dec 2018 19:20:57 GMT
server
AmazonS3
x-timer
S1560093206.945322,VS0,VS0,VE0
etag
"cf32478c18a5e4e5ee7de7180fb12c18"
x-amz-request-id
387096853531382C
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 4
cso-mm-bkg.jpg
alt.idgesg.net/images/furniture/cso/
112 KB
113 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cso/cso-mm-bkg.jpg
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d53cd484b96d000c8bfda0b49ebcc546be2c6a8933430da3ecf24f0fe3f76aae

Request headers

Referer
https://www.csoonline.com/www.idge.cso/css/oc-header.css?v=20190605114146
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
z.UxHLyxIu67E8JA0sD5tuFQKnS1H0IO
via
1.1 varnish, 1.1 varnish
age
2240291
x-amz-meta-origin-date-iso8601
2019-03-21T19:21:07.000Z
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:25 GMT
content-length
115091
x-amz-id-2
UhM1lUkxFhVyYn+tVFbqKdXfXxXGyP7MtCW0O6LYCzJ3wcNzLGvvoVzBVLMsN9YaOCHIE1mjt4s=
x-served-by
cache-jfk8140-JFK, cache-hhn1520-HHN
last-modified
Thu, 21 Mar 2019 19:21:26 GMT
server
AmazonS3
x-timer
S1560093206.945399,VS0,VS0,VE0
etag
"c7b5ace92ebba7c6a0d2f98e69f1067c"
x-amz-request-id
DB90CC2F823B1636
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
2, 10784
ss-standard.woff
www.csoonline.com/www.idge/css/webfonts/
26 KB
27 KB
Font
General
Full URL
https://www.csoonline.com/www.idge/css/webfonts/ss-standard.woff
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d2aae940b6d023c99cbd656bbd0868f51bcf4a93455efef42cc95d8a4c7bceca

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/www.idge/css/webfonts/ss-standard.css
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
4486
x-cache
HIT, HIT
status
200
content-length
27089
x-via-fastly
Verdad
x-served-by
cache-sjc3144-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:37:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093206.946467,VS0,VE0
etag
W/"27096-1559759876000"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
x-cache-hits
1, 2
53bda1f76f9c39acaa206f8f94dedecab98fb76d-l.woff2
fonts.staticworld.net/k/
24 KB
24 KB
Font
General
Full URL
https://fonts.staticworld.net/k/53bda1f76f9c39acaa206f8f94dedecab98fb76d-l.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
ed4b59c842945fa6d990f7d9a750c87a92f7ba60f7f19f8d18af145853c35c1a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
via
1.1 varnish
server
nginx
age
297375
x-cache
HIT
content-type
application/font-woff2
status
200
cache-control
public, max-age=604800
x-cache-hits
3
accept-ranges
bytes
x-timer
S1560093206.980519,VS0,VE0
access-control-allow-origin
*
content-length
24568
x-served-by
cache-hhn1535-HHN
11d2ee7f5263f1d47690006c1c14df1ec3ec3232-l.woff2
fonts.staticworld.net/k/
23 KB
23 KB
Font
General
Full URL
https://fonts.staticworld.net/k/11d2ee7f5263f1d47690006c1c14df1ec3ec3232-l.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
dfd9e061f289eeaf739ed0e3f756905b4c61dfb2403c1a5c8feb47134aa43dad

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
via
1.1 varnish
server
nginx
age
394050
x-cache
HIT
content-type
application/font-woff2
status
200
cache-control
public, max-age=604800
x-cache-hits
113
accept-ranges
bytes
x-timer
S1560093206.980468,VS0,VE0
access-control-allow-origin
*
content-length
23500
x-served-by
cache-hhn1535-HHN
fa-regular-400.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
15 KB
15 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-regular-400.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e5c1d9e7bdeaf3372dee724d175d25aca879ed52ae9afd018f503e9d74e09b50

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
last-modified
Wed, 12 Dec 2018 17:44:23 GMT
server
NetDNA-cache/2.2
access-control-allow-origin
*
etag
"569693c9f5d42d769c7f87b90856219a"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
status
200
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
14868
ss-social-circle.woff
www.csoonline.com/www.idge/css/webfonts/
10 KB
10 KB
Font
General
Full URL
https://www.csoonline.com/www.idge/css/webfonts/ss-social-circle.woff
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8982bee74ee4a24031eea6ffe2cf2a3a41b3eee01490dfb4b8a641ef69dc923f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/www.idge/css/webfonts/ss-social.css
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
content-encoding
gzip
age
2230
x-cache
HIT, HIT
status
200
content-length
9695
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:37:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093206.946701,VS0,VE0
etag
W/"9732-1559759876000"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
x-cache-hits
1, 2
fa-solid-900.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
77 KB
78 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-solid-900.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
08aa3a5ee68a21d5771a70b20495b6da1c0f996c46982cd1b0447ad2db730d11

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:25 GMT
last-modified
Wed, 12 Dec 2018 17:44:35 GMT
server
NetDNA-cache/2.2
access-control-allow-origin
*
etag
"59ea9019c9b9bc4d83ab9783e830735c"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
status
200
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
79072
recaptcha__en.js
www.gstatic.com/recaptcha/api2/v1559543665173/
263 KB
92 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/api2/v1559543665173/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
e8e5fe8177578150e8faf71219cfe439c2391501f077c8015ec03d694c9ea3ae
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 05 Jun 2019 21:06:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 03 Jun 2019 17:45:00 GMT
server
sffe
age
324428
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
93780
x-xss-protection
0
expires
Thu, 04 Jun 2020 21:06:18 GMT
t
jadserve.postrelease.com/
11 KB
3 KB
Script
General
Full URL
https://jadserve.postrelease.com/t?ntv_url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&ntv_mvi
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
1e5021cae459e8ef32a85e19388afaa5cc28bdfa655250e79e7c143bde60e7f0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
text/javascript;charset=UTF-8
content-length
2792
expires
Mon, 1 Jan 1990 12:00:00 GMT
70eb6864ef9e702ce9ed95c93a9cdaabb1c939cc-l.woff2
fonts.staticworld.net/k/
24 KB
24 KB
Font
General
Full URL
https://fonts.staticworld.net/k/70eb6864ef9e702ce9ed95c93a9cdaabb1c939cc-l.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
551c004633e25f9dd42ff8e4af57138e73e1a06349e8296ed7180046c0452ae3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
via
1.1 varnish
server
nginx
age
129698
x-cache
HIT
content-type
application/font-woff2
status
200
cache-control
public, max-age=604800
x-cache-hits
3
accept-ranges
bytes
x-timer
S1560093206.100416,VS0,VE0
access-control-allow-origin
*
content-length
24108
x-served-by
cache-hhn1535-HHN
1e9931ac822394ca58763bb9c2b176c55b16fb81-l.woff2
fonts.staticworld.net/k/
23 KB
23 KB
Font
General
Full URL
https://fonts.staticworld.net/k/1e9931ac822394ca58763bb9c2b176c55b16fb81-l.woff2
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
ef756e21b4660483b0d200e15873d899d783fc49abccebcf5d2ebc5d7e6f8e31

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
via
1.1 varnish
server
nginx
age
430935
x-cache
HIT
content-type
application/font-woff2
status
200
cache-control
public, max-age=604800
x-cache-hits
116
accept-ranges
bytes
x-timer
S1560093206.166973,VS0,VE0
access-control-allow-origin
*
content-length
23704
x-served-by
cache-hhn1535-HHN
ss-social-regular.woff
www.csoonline.com/www.idge/css/webfonts/
16 KB
17 KB
Font
General
Full URL
https://www.csoonline.com/www.idge/css/webfonts/ss-social-regular.woff
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
3d5629a5cbadabfd67e7c99b9e71569f356ebf7fddabd5b3c24e37b49a48c605

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/www.idge/css/webfonts/ss-social.css
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
age
7049
x-cache
HIT, HIT
status
200
content-length
16796
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-hhn1520-HHN
last-modified
Wed, 05 Jun 2019 18:37:56 GMT
server
Apache-Coyote/1.1
x-timer
S1560093206.165386,VS0,VE0
etag
W/"16804-1559759876000"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
x-cache-hits
3, 2
rid
match.adsrvr.org/track/
109 B
527 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=187051
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183980-47728333013839.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.51.227.120 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-51-227-120.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ae3078287ab358b32099b25670d8ab8967334be92bc6ad5db4873a20ba3bf6a2

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Tue, 09 Jul 2019 15:13:26 GMT
identity
api.rlcdn.com/api/
0
74 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183980-47728333013839.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.92.78 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
78.92.95.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

status
202
date
Sun, 09 Jun 2019 15:13:26 GMT
via
1.1 google
alt-svc
clear
content-length
0
gtm.js
www.googletagmanager.com/
106 KB
31 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-5WC9SK&l=dataLayer
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
9e9bcbffd3a29d35c0f069229501c57f28370104c55571004f5a8557572ab2b5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
br
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
32034
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:26 GMT
api.js
w.soundcloud.com/player/
5 KB
3 KB
Script
General
Full URL
https://w.soundcloud.com/player/api.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.202 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-202.fra54.r.cloudfront.net
Software
am/2 /
Resource Hash
78d83d68ccf7a24aca085486bfc291760424279b6f5308092af4fe600b9d1e19
Security Headers
Name Value
Strict-Transport-Security max-age=600

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:12:27 GMT
Via
sssr, 1.1 616f617776e843142ab5d87231cb3526.cloudfront.net (CloudFront)
Age
59
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
P3P
policyref="https://w.soundcloud.com/player/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV TAI PSAo PSDo OUR STP CNT"
Connection
keep-alive
Content-Encoding
gzip
Last-Modified
Thu, 06 Jun 2019 08:47:56 GMT
Server
am/2
ETag
W/"1298-1735702576"
Strict-Transport-Security
max-age=600
Content-Type
application/javascript
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
X-Amz-Cf-Id
Wsum8N_A_2gvC_CoUimU2BL_-r1lWk2aLHgAVaEHRCK4D0FWHdyXBA==
outbrain.js
widgets.outbrain.com/
97 KB
35 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1560093205107
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
3ad611984f050907751d5fd6c001c180f64861ab947d86bbe39022b198fc5883

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:26 GMT
Content-Encoding
gzip
Last-Modified
Thu, 06 Jun 2019 09:51:37 GMT
Server
Apache
ETag
"261fe3a668a637ad6036b3ebb3035cf8:1559814697"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
34918
cso-logo-idg.svg
idge.staticworld.net/cso/
4 KB
4 KB
Image
General
Full URL
https://idge.staticworld.net/cso/cso-logo-idg.svg
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ef7755857c07a98436dce7c81f0071da4925b63aa320f6a600eafdc08d620f5f

Request headers

Referer
https://www.csoonline.com/www.idge.cso/css/foot.css?v=20190605114146
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
oZFBpEq1ZhNl2KLvmAO7EkSd4kjPfufK
via
1.1 varnish, 1.1 varnish
age
3275
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:26 GMT
content-length
3923
x-amz-id-2
gtQV/xgHoPMNZuCwL6MijCMtcvF71G5qxF/llqvTXCacdNNekpStjA/FIuNXCTE8+yl8j+iNEOw=
x-served-by
cache-jfk8136-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:09:02 GMT
server
AmazonS3
x-timer
S1560093206.379153,VS0,VS0,VE0
etag
"52e975d0aa09163968fbd12cf29e4088"
x-amz-request-id
600DFC2E54A91E83
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 1
ttj
ib.3lift.com/
4 KB
2 KB
Script
General
Full URL
https://ib.3lift.com/ttj?inv_code=tan_CSOOnline_MOAP
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-189.fra54.r.cloudfront.net
Software
/
Resource Hash
0e68c06565b75491023352c396e76fa438b9093e6bc6a98e6688a23335854e7f

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 9 Jun 2019 03:17:14 GMT
Content-Encoding
gzip
X-Amz-Cf-Pop
FRA54
ETag
"d84c11cf2494b2c91152a02859a68227"
X-Cache
Hit from cloudfront
Content-Type
application/javascript; charset=utf-8
Via
1.1 1463b274b31e0310acc7c754b8b5a550.cloudfront.net (CloudFront)
Cache-Control
public, max-age=900
Connection
keep-alive
Content-Length
1736
X-Amz-Cf-Id
xA5C34jIsQENK4CLzKMHFHYnXkBED83ZNhIwgupvF_vvDvmssae-FA==
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_ui=0b750de8-31da-4b7a-b385-e9bec36fc833&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ntv_ht=FiL9XAA&ntv_at=303,302&ntv_a=AAAAAAAAAAd-oQA&ord=1560093206370&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_ui=0b750de8-31da-4b7a-b385-e9bec36fc833&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ntv_ht=FiL9XAA&ntv_at=806&ntv_a=AAAAAAAAAAYwIMA&ntv_sat=5&ord=1560093206380&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
E9F8AABBD03A46738A93918DE68A8883.png
ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/
38 KB
38 KB
Image
General
Full URL
https://ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/E9F8AABBD03A46738A93918DE68A8883.png
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.99 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-99.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a72557f379934ceccb097162886f22990bf0910ba0e285e46e6378d8a904fd09

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:26 GMT
X-Cache-Hits
1
Content-Disposition
inline; filename="E9F8AABBD03A46738A93918DE68A8883.webp"
Connection
keep-alive
Content-Length
38422
X-Served-By
cache-iad2137-IAD
Last-Modified
Thu, 21 Mar 2019 13:53:11 GMT
X-Timer
S1559425891.219681,VS0,VE1
ETag
"b87ceb77ff83286cd90bddc6fde3423a"
Content-Type
image/webp
Access-Control-Allow-Origin
*
Cache-Control
public, private, max-age=30868627
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
Expires
Sun, 31 May 2020 21:50:33 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46&ntv_ui=97a32dd2-ebc9-40d7-bc5f-688384728795&ntv_a=YaAEA4_4zA7HgQA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=720212878&ntv_ht=FiL9XAA&ntv_tad=16&ntv_az=GRTbGya1MJ4HrIr3&ntv_al=XWw_ZV1sP2Q=&ntv_ak=zME3mIyYN5jMwTeY&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_ui=6fb00e7c-7dfb-46cd-8f51-6e1839beaedc&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ntv_ht=FiL9XAA&ntv_at=303&ntv_a=AAAAAAAAAAYwIMA&ord=1560093206385&ntv_dpl=1011,1016,1001,1019,1005,1006,1007&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_ui=6fb00e7c-7dfb-46cd-8f51-6e1839beaedc&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ntv_ht=FiL9XAA&ntv_at=808&ntv_a=AAAAAAAAAAYwIMA&ntv_sat=5&ord=1560093206385&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:26 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
pub.531979.min.js
www.dwin2.com/
215 KB
63 KB
Script
General
Full URL
https://www.dwin2.com/pub.531979.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-5WC9SK&l=dataLayer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.110 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
de42e064ccc64d63d2872ae0b70cf646c6d223bf21b6585b3c7399542e39b7b5

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
age
4189
x-cache
HIT, HIT
status
200
content-length
63931
x-served-by
cache-lcy19250-LCY, cache-hhn1543-HHN
last-modified
Sun, 09 Jun 2019 11:13:41 GMT
server
nginx
x-timer
S1560093206.427504,VS0,VE0
etag
"5cfce9e5-f9bb"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Sun, 09 Jun 2019 15:03:36 GMT
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
21, 21
init.js
www.dwin2.com/
55 B
235 B
Script
General
Full URL
https://www.dwin2.com/init.js?t=1560093206465
Requested by
Host: www.dwin2.com
URL: https://www.dwin2.com/pub.531979.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.110 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
b9b7a6409fe8b5947364399f4945e658f388f58012d739f4ce91f5ba834f80e2

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
age
2408
x-cache
HIT, HIT
status
200
content-length
73
x-served-by
cache-lcy19223-LCY, cache-hhn1543-HHN
last-modified
Mon, 08 Apr 2019 14:32:05 GMT
server
nginx
x-timer
S1560093207.808523,VS0,VE0
etag
"5cab5b65-37"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
expires
Fri, 10 May 2019 13:46:15 GMT
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
1, 463
d3d3LmNzb29ubGluZS5jb20=
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/d3d3LmNzb29ubGluZS5jb20=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.174.73 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-174-73.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=17611
Date
Sun, 09 Jun 2019 15:13:26 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Sun, 09 Jun 2019 20:06:57 GMT
bundle.js
ib.3lift.com/rev/9f5715fe1bd113122fc90049735b31f8d442ff01/dist/
166 KB
55 KB
Script
General
Full URL
https://ib.3lift.com/rev/9f5715fe1bd113122fc90049735b31f8d442ff01/dist/bundle.js
Requested by
Host: ib.3lift.com
URL: https://ib.3lift.com/ttj?inv_code=tan_CSOOnline_MOAP
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-189.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
58e12f6361b0e25f9ce4750d5c9ac860c000ac94d9e333c64145522efda5ea70

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 05 Jun 2019 16:38:17 GMT
Content-Encoding
gzip
Last-Modified
Wed, 05 Jun 2019 16:37:31 GMT
Server
AmazonS3
Age
340510
ETag
"6531f2b57a3e77c23f695f21f9051d6a"
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 1463b274b31e0310acc7c754b8b5a550.cloudfront.net (CloudFront)
Cache-Control
max-age=31536000, immutable
X-Amz-Cf-Pop
FRA54
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55852
X-Amz-Cf-Id
h4SSjQRYxV5vRcQkAJ4UusbMYQfkVX3nE2n1FM-Hua2o_TqpCONGgQ==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.56.111 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-56-111.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:26 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Mon, 10 Jun 2019 15:13:26 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
1 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=649f1906-1075-476e-9e72-38db5b01a4ba&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A26%2B00%3A00&ts=1560093206877
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
edecdf5af4c0eb41b65610c84b6f2eaa2590a999d98d4d7ef0df06bf799d8f6a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
861
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
1 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=649f1906-1075-476e-9e72-38db5b01a4ba&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A26%2B00%3A00&ts=1560093206890
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
ae1b78352b46c0943fe27a3c417fd30d8dcdba1d2bf5e0f27a0c3155637a1564
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
861
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
94 B
976 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=649f1906-1075-476e-9e72-38db5b01a4ba&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A26%2B00%3A00&ts=1560093206912
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
032c385d86d8b49e46c9216be5c4b2625918907ba209750d0ad00080801c49fa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
105
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
portal.html
admiral.mgr.consensu.org/ Frame D4A5
0
0
Document
General
Full URL
https://admiral.mgr.consensu.org/portal.html
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/navkAE1sQ1XzN61QwCJFGhJGKD9rOZyNZvL_VWNdpyc1eOuYjZWDqpgksk7gCioYMW7mG_SYqa3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.117.115 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
115.117.201.35.bc.googleusercontent.com
Software
nginx /
Resource Hash

Request headers

:method
GET
:authority
admiral.mgr.consensu.org
:scheme
https
:path
/portal.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
server
nginx
date
Sun, 09 Jun 2019 15:13:27 GMT
content-type
text/html
last-modified
Wed, 16 May 2018 16:27:21 GMT
vary
Accept-Encoding
x-hostname
jeremy
content-encoding
gzip
via
1.1 google
alt-svc
clear
connatix.renderer.infeed.min.js
cdn.connatix.com/min/
957 B
1 KB
Script
General
Full URL
https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
cb3a7287129d3521fd77f5b82007499c22db663601fdd977b6a15b4676ce17e3

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 varnish
server
Varnish
age
0
x-cache
HIT
content-type
application/javascript
status
200
cache-control
no-cache, no-store, must-revalidate, max-age=0
x-cache-hits
0
accept-ranges
bytes
x-timer
S1560093207.034102,VS0,VE0
content-length
957
retry-after
0
x-served-by
cache-fra19121-FRA
p.gif
p.typekit.net/
35 B
367 B
Image
General
Full URL
https://p.typekit.net/p.gif?s=1&k=xyb0fnv&ht=sh&h=www.csoonline.com&f=25310.25312.25314.25318&a=620309&js=1.18.24&app=typekit&e=js&_=1560093207053
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19f::19fd , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
nginx /
Resource Hash
9b9265c69a5cc295d1ab0d04e0273b3677db1a6216ce2ccf4efc8c277ed84b39

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:27 GMT
Last-Modified
Thu, 12 Jul 2018 18:17:46 GMT
Server
nginx
ETag
"5b479b4a-23"
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
35
Expires
Wed, 05 Dec 2018 15:10:09 GMT
anchor
www.google.com/recaptcha/api2/ Frame 3AFC
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&co=aHR0cHM6Ly93d3cuY3Nvb25saW5lLmNvbTo0NDM.&hl=en&v=v1559543665173&size=normal&cb=k8xi6cck2vmr
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/api2/v1559543665173/recaptcha__en.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-JvzobmtDLdH98BEpB9m7qQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&co=aHR0cHM6Ly93d3cuY3Nvb25saW5lLmNvbTo0NDM.&hl=en&v=v1559543665173&size=normal&cb=k8xi6cck2vmr
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sun, 09 Jun 2019 15:13:27 GMT
content-security-policy
script-src 'report-sample' 'nonce-JvzobmtDLdH98BEpB9m7qQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
9958
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
343 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1560093207103&sessionId=e88e2ecd-dd34-5539-dd86-559669bcadc1&url=www.csoonline.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.19 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:27 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
ad0f621cb5f5a815529309422135a22
Content-Length
4
Expires
0
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8f88cb7a1cd4134f5d616b9fca90b9069fa16c162b7ae66ba1b500c490b41dd2
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 21 May 2019 23:53:44 GMT
server
Golfe2
age
6052
date
Sun, 09 Jun 2019 13:32:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17595
expires
Sun, 09 Jun 2019 15:32:35 GMT
minified_logic.js
automate-prod.s3.amazonaws.com/
16 KB
17 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/minified_logic.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.218.233.59 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-us-west-2-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
ca51e0a28d0a5a6056e312625cf15051dd1aab76d64107af6ac2a393448e0028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
Last-Modified
Mon, 11 Jun 2018 15:27:35 GMT
Server
AmazonS3
x-amz-request-id
AE14ED25B2DE31D8
ETag
"9cc4261239704356e7381ce6c6e9526e"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
max-age=315360000, no-transform, public
Accept-Ranges
bytes
Content-Length
16396
x-amz-id-2
MokvdvLeOjW6HAM4+ccSIMhJP1HCD2wnrpZ6uxiwqvySIEpgrG/GJXWg8A0NifVVoX3DyzNuWUo=
oct.js
static.ads-twitter.com/
Redirect Chain
  • https://platform.twitter.com/oct.js
  • https://static.ads-twitter.com/oct.js
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/oct.js
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.157 Amsterdam, Netherlands, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
age
85791
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-ams21028-AMS
last-modified
Tue, 23 Jan 2018 19:05:33 GMT
x-timer
S1560093207.330807,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes

Redirect headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:27 GMT
Server
ECS (fcn/40D6)
Content-Length
0
Location
https://static.ads-twitter.com/oct.js
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Akyhk
ad.doubleclick.net/ddm/adj/Bqxov/
11 B
422 B
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/Bqxov/Akyhk
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.70 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f6.1e100.net
Software
cafe /
Resource Hash
f1e945400c04241ef089d71de3b0cf7e202431ac4685ada318714fe07ee9dcb0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
14
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-23/html/ Frame B76E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-23/html/container.html
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-23/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1479
date
Fri, 31 May 2019 18:00:41 GMT
expires
Sat, 30 May 2020 18:00:41 GMT
last-modified
Tue, 10 Apr 2018 14:51:09 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
767566
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20b...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20bash%20CVE-2014-6271%20%7C%20CSO%20Online&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c9=
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.56.111 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-56-111.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:27 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Application%20Security&c6=Article%3A%20News&c15=2687265&ns__t=1560093207237&ns_c=UTF-8&cv=3.1e&c8=Remote%20exploit%20vulnerability%20in%20bash%20CVE-2014-6271%20%7C%20CSO%20Online&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c9=
Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:27 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
www.csoonline.com/
Redirect Chain
  • https://www.csoonline.com/.well-known/pubvendors.json
  • https://www.csoonline.com/
145 KB
29 KB
Fetch
General
Full URL
https://www.csoonline.com/
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0f3ff65c6f02d9010a10c930ca16e6ed93fad3a35d308a1d3847c5e6ac631c03

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
server
Apache-Coyote/1.1
age
698
x-served-by
cache-sjc3147-SJC, cache-hhn1520-HHN
vary
Accept-Encoding,Cookie
x-cache
HIT, HIT
content-type
text/html;charset=UTF-8
status
200
accept-ranges
bytes
x-timer
S1560093207.286302,VS0,VE1
content-length
29467
via
1.1 varnish, 1.1 varnish
x-via-fastly
Verdad
x-cache-hits
1, 1

Redirect headers

date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 varnish
server
Varnish
x-timer
S1560093207.247485,VS0,VE0
x-served-by
cache-hhn1520-HHN
status
302
x-cache
HIT
location
https://www.csoonline.com
retry-after
0
accept-ranges
bytes
content-length
0
x-via-fastly
Verdad
x-cache-hits
0
vendorlist.json
vendorlist.consensu.org/
80 KB
15 KB
Fetch
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/navkAE1sQ1XzN61QwCJFGhJGKD9rOZyNZvL_VWNdpyc1eOuYjZWDqpgksk7gCioYMW7mG_SYqa3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:9000:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5e9ea707a3d475708008836f6202aed222ee8ea7399770c2a7c0b189fd6d3543

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Fri, 07 Jun 2019 06:53:26 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
26724
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 06 Jun 2019 16:00:23 GMT
server
AmazonS3
access-control-max-age
86400
access-control-allow-methods
GET
x-amz-version-id
MfmuvyXO2DAxy3jDsN1qzKdH8j2xPW0e
via
1.1 4ba0e9deb9465045a3261b8712935964.cloudfront.net (CloudFront)
cache-control
max-age=259200
x-amz-cf-pop
FRA53
content-type
application/json; charset=utf-8
x-amz-cf-id
Kt_haE4KBoQBhQwPBa-l5RjkVVkoV1tMsdZYsexuHhfa2k16t_nyMw==
connatix.renderer.infeed.min_dc.js
cdns.connatix.com/p/1506/min/ Frame B6C5
708 KB
184 KB
Script
General
Full URL
https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Requested by
Host: cdn.connatix.com
URL: https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
7406bb93452c0a0d21079779d11fd3a36ae5b8a019c0f1446e725c753995d89a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
age
175076
x-cache
HIT, HIT
status
200
content-length
187724
via
1.1 varnish, 1.1 varnish
x-served-by
cache-dca17739-DCA, cache-fra19121-FRA
last-modified
Fri, 07 Jun 2019 14:34:20 GMT
x-timer
S1560093207.298064,VS0,VE0
etag
"428ebf54473679ec212d375a3f29763c"
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes
x-cache-hits
1, 12276
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
934 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:00:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
766
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
856
x-xss-protection
0
expires
Sun, 09 Jun 2019 16:00:41 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
428 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.csoonline.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
105 B
673 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=No%20profile%20present%20and%20will%20not%20be%20created.&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A27%2B00%3A00&ts=1560093207372
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
0e7e85bedd51d57664518e33941b37ec94c5c5061bebb6db0becbea8b877bdab
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
114
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
357 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.csoonline.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
bframe
www.google.com/recaptcha/api2/ Frame F51E
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=v1559543665173&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&cb=fk3y2imuruyf
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/api2/v1559543665173/recaptcha__en.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-zCw93DNS75MoJxlSSBsoWg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=v1559543665173&k=6LczmkcUAAAAANEO7J277KwH6Kzp6BEQjPTWP4S4&cb=fk3y2imuruyf
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sun, 09 Jun 2019 15:13:27 GMT
content-security-policy
script-src 'report-sample' 'nonce-zCw93DNS75MoJxlSSBsoWg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1118
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
111346X1569475.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/111346X1569475.skimlinks.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
12d999a6c33d75d8f6e172bd7319c74ffda408238f5a2e034600a2493c181b3a

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
last-modified
Wed, 29 May 2019 11:09:43 GMT
server
AmazonS3
x-amz-request-id
F6E09990168DFABC
etag
"27369783961d422a0a828a86b9d4d1e5"
x-hw
1560093207.cds034.lo4.hn,1560093207.cds101.lo4.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
14572
x-amz-id-2
5La/nTNWJ0qAy1uBjb5BD/o20rcb7ugGa3CtQxqwXjpm7eW/0VCGfm5uCsk+LgA/6EIPfZklimU=
collect
www.google-analytics.com/r/
35 B
111 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j76&a=687205559&t=pageview&_s=1&dl=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&ul=en-us&de=UTF-8&dt=Remote%20exploit%20vulnerability%20in%20bash%20CVE-2014-6271%20%7C%20CSO%20Online&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGBAAEAjAAQC~&jid=1340058734&gjid=717569436&cid=723992339.1560093207&uid=&tid=UA-300704-9&_gid=1488924528.1560093207&_r=1&gtm=2wg5t2WR6LD2P&cg1=application%20security&cg2=news&cg3=Dave%20Lewis&cg4=article&cg5=us&cd1=false&cd2=&cd3=&cd4=notapplicable&cd5=Sun%2C%2009%20Jun%202019%2015%3A13%3A26%20GMT&cd6=Sun%2C%2009%20Jun%202019%2015%3A13%3A26%20GMT&cd7=0&cd8=1&cd9=production&cd10=cso%20online&cd11=US&cd12=enterprise&cd13=false&cd14=&cd15=Web&cd16=&cd17=application%20security&cd18=3295&cd19=security&cd20=3295%2C2206&cd21=&cd22=&cd23=&cd24=&cd25=&cd26=news&cd27=2687265&cd28=article&cd29=Dave%20Lewis&cd30=cso&cd31=false&cd32=&cd33=&cd34=&cd35=&cd36=&cd37=false&cd38=1&cd39=2014-09-24&cd40=2014-09-24&cd41=1718&cd42=1718&cd43=false&cd44=true&cd45=Brick%20of%20Enlightenment&cd46=false&cd47=&cd48=&cd49=&cd50=&cd51=&cd52=&cd53=962&cd54=941&cd55=&cd56=&cd79=us&cd80=global&cd81=false&cd82=false&cd84=&z=712167093
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:27 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
g
ck.connatix.com/
46 B
103 B
Script
General
Full URL
https://ck.connatix.com/g?callback=cnxJSONP_2fe030e54a1adbb939751560093207499
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
fcc2e5c091392d65ffd3b0b8bd11a2d3fd8b0049903fa9b3b12ba64dd174f403

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 varnish
server
Varnish
age
0
x-cache
HIT
status
200
cache-control
no-cache, no-store, must-revalidate, max-age=0
x-cache-hits
0
accept-ranges
bytes
x-timer
S1560093208.523600,VS0,VE0
content-length
46
retry-after
0
x-served-by
cache-fra19121-FRA
get
odb.outbrain.com/utils/
31 KB
12 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&idx=0&version=01020806&apv=false&sig=lwoTwT63&format=html&rand=50076&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&va=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
76a6df6a987d607a1f28f904c1345ffcc4bd8b181f940c351530d1eb9bc02887
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
5b49c63c347cd5bb47d223859fbda2c
content-length
11474
x-served-by
cache-jfk8121-JFK, cache-hhn1533-HHN
pragma
no-cache
x-timer
S1560093208.553984,VS0,VE173
date
Sun, 09 Jun 2019 15:13:27 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.21
accept-ranges
bytes, bytes
x-cache-hits
0, 0
pls
core.connatix.com/ Frame B6C5
5 KB
2 KB
Script
General
Full URL
https://core.connatix.com/pls?callback=jQuery321024285361330741995_1560093207494&token=f073f8b0-983a-43af-97ea-148dc87d9994&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&page_guid=3a91b0a920f95d797b441560093207528&spp=1&_=1560093207495
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.207.76.63 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-18-207-76-63.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
18c04d9780f6893da3d093124f2b559cf0da945ba1974d225752fd6b3d37fc6b

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
server
nginx/1.12.2
access-control-allow-origin
*
px.gif
p.skimresources.com/
43 B
436 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=0.27839318384818834
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
status
200
x-guploader-uploadid
AEnB2UrCm66CnZNqiVr3RkAFHl53pAfLv1LsbL8nP_1w_O4AARLOT7h5-Zzvq6w1S4c1jvTzysI-yF3GeQCZ7FMSxMCu9QJYXA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1560093207.cds034.lo4.hn,1560093207.cds101.lo4.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=0.27839318384818834
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
status
200
x-guploader-uploadid
AEnB2UrCm66CnZNqiVr3RkAFHl53pAfLv1LsbL8nP_1w_O4AARLOT7h5-Zzvq6w1S4c1jvTzysI-yF3GeQCZ7FMSxMCu9QJYXA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1560093207.cds034.lo4.hn,1560093207.cds101.lo4.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Origin
null
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://www.csoonline.com
location
//r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.csoonline.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
/
r.skimresources.com/api/
144 B
456 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DCYCTB1SEJZ7P58ZAJQBHKSM&persistence=1&checksum=f3d933c010e3f8d4ea5275836158ac27c74113b76ca343b0b35649a355812016
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
1c3f20ee2ffa18c23f0d6c63c02ab23f051c3ec0d07aa80c2f54d08b11b8a5b0
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.csoonline.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
iab
api.skimlinks.mgr.consensu.org/
772 B
638 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569475.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

date
Sun, 09 Jun 2019 15:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.csoonline.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
page
t.skimresources.com/api/v2/
22 B
91 B
Other
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569475.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 google
x-content-type-options
nosniff
alt-svc
clear
server
Python/3.7 aiohttp/3.5.4
access-control-allow-origin
https://www.csoonline.com
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
status
200
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
content-length
22
link
t.skimresources.com/api/v2/
22 B
385 B
Other
General
Full URL
https://t.skimresources.com/api/v2/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569475.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:27 GMT
via
1.1 google
x-content-type-options
nosniff
alt-svc
clear
server
Python/3.7 aiohttp/3.5.4
access-control-allow-origin
https://www.csoonline.com
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
status
200
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
content-length
22
ob_smartFeedLogo.min.svg
widgets.outbrain.com/images/widgetIcons/
7 KB
7 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_smartFeedLogo.min.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8050f05c230d74be333b63cef230e786094e9100f55fa19c6c0831e95870768d

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:27 GMT
Last-Modified
Tue, 28 May 2019 08:36:00 GMT
Server
Apache
ETag
"f370d19306add072a726e7f4ade8dc57:1559032560"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
7090
achoice.svg
widgets.outbrain.com/images/widgetIcons/
3 KB
2 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/achoice.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:27 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 May 2019 08:35:52 GMT
Server
Apache
ETag
"9d26fa4e7238ed94f1d0d92afb453b3e:1559032552"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
1368
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=d9ee56810068a24144afdad5b2a2a8aa_28429_1560093207677&tm=909&eT=0&wRV=01020806&pVis=1&lsd=b93c16f4-7d70-42f0-b527-3666ff110b36&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.51 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
93464883aefcedb8a49c5f97c8c98424
Content-Length
30
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 49AA
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_stg=3737546005~rv=70~id=3e76e1ef215e1e27dc401f1bda1fe7ce; obuid=b93c16f4-7d70-42f0-b527-3666ff110b36; recs_f729303ef6a61a2a065efc43189b1d7b=0B1925901673A1121390614A2176453099A1774583762A2227393577A1998452725ACD1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

Server
Apache
ETag
"6b509be85ace906a41dfa1c05fce6ae4:1559067430"
Last-Modified
Tue, 28 May 2019 18:17:10 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Sun, 09 Jun 2019 15:13:27 GMT
Content-Length
3716
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
streamFeed.js
widgets.outbrain.com/nanoWidget/01020806/module/
33 KB
12 KB
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/01020806/module/streamFeed.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
70f4516b80065013b90b2b41ac6e11767d420f7438f87f1c774fa853b4f675a5

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:27 GMT
Content-Encoding
gzip
Last-Modified
Thu, 06 Jun 2019 09:50:32 GMT
Server
Apache
ETag
"baca5d3ab04e377dec6dc15a36cad31b:1559814632"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11666
get
mv.outbrain.com/Multivac/api/
39 KB
10 KB
Script
General
Full URL
https://mv.outbrain.com/Multivac/api/get?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&version=01020806&apv=true&sig=lwoTwT63&format=html&rand=85150&lsd=b93c16f4-7d70-42f0-b527-3666ff110b36&lsdt=1560093207734&osLang=en-US&va=true&cmpStat=1&scrW=1600&scrH=1200&t=MV9kOWVlNTY4MTAwNjhhMjQxNDRhZmRhZDViMmEyYThhYV8w&winW=1600&winH=1200&adblck=false&secured=true&feedIdx=0&lastIdx=0&lastCardIdx=0&fAB=no_abtest
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/01020806/module/streamFeed.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
4d08b1fc63ad38f844d84f9893103ab6181a956605f6e49765ac43c349cc7762

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
e9f1712da10238eba9abd1a049f0622c
content-length
9837
x-served-by
cache-jfk8133-JFK, cache-hhn1533-HHN
pragma
no-cache
x-timer
S1560093208.849504,VS0,VE320
vary
Accept-Encoding, User-Agent
content-type
application/json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.33
accept-ranges
bytes, bytes
x-cache-hits
0, 0
g
rtb.connatix.com/
209 B
340 B
Script
General
Full URL
https://rtb.connatix.com/g?c_pw=400&c_ph=225&c_tk=C018218D-4AD0-4E01-8158-045425E65946&c_bu=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_ivt=0&connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&notServed=false&xplr=false&c_s=false&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&gdpr=1&med_id=796512&request_guid=8aa394be68ef95cdef021560093208001&req_no=0&v=1&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&callback=cnxJSONP_7ab2606a3326c0efc3001560093208001
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.118.21 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-118-21.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
3e1e592f525ca27ef80c91d293a81e27e226cbeabd2168cb9595b55c7ed9c3f4

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Content-Encoding
gzip
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
161
1.jpg
i.connatix.com/s3/connatix-uploads/eff923d9-d0fa-43b9-948a-cebe31928778/
14 KB
15 KB
Image
General
Full URL
https://i.connatix.com/s3/connatix-uploads/eff923d9-d0fa-43b9-948a-cebe31928778/1.jpg?mode=stretch&connatiximg=true&scale=both&height=225&width=400
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
df8771a652630a4dce9e94cd2696eb76a1fd3c4fd7bc24269879f0ba8bc793c5

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:28 GMT
via
1.1 varnish, 1.1 varnish
age
378576
x-cache
MISS, HIT
content-type
image/jpeg
status
200
cache-control
max-age=31557600
x-cache-hits
0, 1
accept-ranges
bytes
x-timer
S1560093208.028545,VS0,VE0
access-control-allow-origin
*
content-length
14768
x-served-by
cache-sjc3137-SJC, cache-fra19121-FRA
1_360_1.mp4
v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/
192 KB
0
Media
General
Full URL
https://v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/1_360_1.mp4
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

x-amz-version-id
tEux2prdZPrc1D6lFJ4bAeh_fu9rL47D
via
1.1 varnish, 1.1 varnish
etag
"edc794a75290dade95c49bdde0d28522"
age
1417827
x-cache
HIT, HIT
status
206
Content-Length
9205583
x-served-by
cache-sjc3140-SJC, cache-fra19121-FRA
Content-Range
bytes 0-9205582/9205583
last-modified
Fri, 24 May 2019 03:18:35 GMT
x-timer
S1560093208.044148,VS0,VE1
date
Sun, 09 Jun 2019 15:13:28 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_360_1.mp4
v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/
64 KB
0
Media
General
Full URL
https://v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/1_360_1.mp4
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

x-amz-version-id
tEux2prdZPrc1D6lFJ4bAeh_fu9rL47D
via
1.1 varnish, 1.1 varnish
etag
"edc794a75290dade95c49bdde0d28522"
age
1417827
x-cache
HIT, HIT
status
206
Content-Length
9205583
x-served-by
cache-sjc3140-SJC, cache-fra19121-FRA
Content-Range
bytes 0-9205582/9205583
last-modified
Fri, 24 May 2019 03:18:35 GMT
x-timer
S1560093208.061696,VS0,VE1
date
Sun, 09 Jun 2019 15:13:28 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
r
trk.connatix.com/ Frame B6C5
0
153 B
Image
General
Full URL
https://trk.connatix.com/r?connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&videoID=796512&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&spp=1
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.191.3 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-191-3.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
0
1_360_1.mp4
v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/
832 KB
0
Media
General
Full URL
https://v.connatix.com/eff923d9-d0fa-43b9-948a-cebe31928778/1_360_1.mp4
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::645 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=196608-

Response headers

x-amz-version-id
tEux2prdZPrc1D6lFJ4bAeh_fu9rL47D
via
1.1 varnish, 1.1 varnish
etag
"edc794a75290dade95c49bdde0d28522"
age
1417827
x-cache
HIT, HIT
status
206
Content-Length
9008975
x-served-by
cache-sjc3140-SJC, cache-fra19121-FRA
Content-Range
bytes 196608-9205582/9205583
last-modified
Fri, 24 May 2019 03:18:35 GMT
x-timer
S1560093208.090196,VS0,VE1
date
Sun, 09 Jun 2019 15:13:28 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate.linksynergy.com/wakeup/
0
336 B
XHR
General
Full URL
https://automate.linksynergy.com/wakeup/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.195.133 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-195-133.compute-1.amazonaws.com
Software
nginx/1.9.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
PUT
Origin
https://www.csoonline.com
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.9.8
Access-Control-Allow-Methods
PUT, OPTIONS
Content-Type
application/json
Access-Control-Allow-Origin
https://www.csoonline.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
Content-Type
Content-Length
0
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate-prod.s3.amazonaws.com/info/
152 KB
153 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/info/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.218.233.59 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-us-west-2-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
94d2f2702c0702d05899daeb179f102ff3b070747a6fd22f80c7b891b3cb4e69

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:29 GMT
Last-Modified
Sun, 09 Jun 2019 08:11:40 GMT
Server
AmazonS3
x-amz-request-id
F55674BC958B184B
ETag
"6e7825e781336e5cc05e0170108daacf"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
text/plain
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Accept-Ranges
bytes
Content-Length
156088
x-amz-id-2
ji+362a/T5DzU5bLfbfbyuQpVufe2z0D7ym8roDB66qxHMode7zOgkCYHT2mBy9/alRwjYXODZw=
auction
tlx.3lift.com/web/ Frame F283
47 B
504 B
Script
General
Full URL
https://tlx.3lift.com/web/auction?inv_code=tan_CSOOnline_MOAP&referrer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&rev=9f5715f&fe=0&ft=0&cb=2608343677
Requested by
Host: ib.3lift.com
URL: https://ib.3lift.com/rev/9f5715fe1bd113122fc90049735b31f8d442ff01/dist/bundle.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.135.33 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-135-33.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
77d081b5cbccdf90ac8e9ca88b9519798bf17c7b3d2c4b6eebb6ca254eb8381d
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:28 GMT
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
application/javascript; charset=utf-8
content-length
47
x-xss-protection
0
expires
Thu, 15 Oct 1992 20:10:00 GMT
sce
eb2.3lift.com/
37 B
139 B
Image
General
Full URL
https://eb2.3lift.com/sce?inv_code=tan_CSOOnline_MOAP&rev_hash=9f5715f&e=Error%3A%20Error%20getting%20gdpr%20vendorConsentData%3A%20__cmp%20getConsentData%20timeout&block=checkGdprCmp&lvl=2&dc=&cb=11288
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.21.152 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-29-21-152.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Sun, 09 Jun 2019 15:13:28 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
37
content-type
image/gif
clr
trk.connatix.com/ Frame B6C5
0
153 B
Image
General
Full URL
https://trk.connatix.com/clr?c_vid=796512&id_cl=a4804a8c03a4c7ce52ca1560093208157&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&spp=1
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.191.3 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-191-3.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
0
vwt
trk.connatix.com/ Frame B6C5
0
153 B
Image
General
Full URL
https://trk.connatix.com/vwt?c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&id_cl=a4804a8c03a4c7ce52ca1560093208157&c_vid=796512&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&spp=1
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.191.3 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-191-3.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
0
vwt
trk.connatix.com/ Frame B6C5
0
153 B
Image
General
Full URL
https://trk.connatix.com/vwt?connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&c_vid=796512&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&spp=1
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.191.3 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-191-3.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
0
p
sb.scorecardresearch.com/ Frame B6C5
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=149000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_796512&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1560093208256&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=2&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=Qualcomm%20found%20to%20violate%20antitrust%20laws...%20What%27s%20next%3F%20%7C%20TECH(feed)&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c8=&c9=&cs_ucfr=0
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.56.111 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-56-111.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:28 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
l
mcdp-nydc1.outbrain.com/
4 B
376 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=4b8b8cdfcfb285cb66a538ec18dfada5_28429_1560093207951&tm=1494&eT=0&wRV=01020806&pVis=0&lsd=b93c16f4-7d70-42f0-b527-3666ff110b36&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.51 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
aa27e6ab49437a153e5940a49870aab
Content-Length
30
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=e9ebaf558a8f34bfd6a178014b918817_28429_1560093208116&tm=1495&eT=0&wRV=01020806&pVis=1&lsd=b93c16f4-7d70-42f0-b527-3666ff110b36&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1560093205107
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.51 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
a0a2e2811ea7f2438a5df9b94bcaf96e
Content-Length
30
eyJpdSI6ImI3MjU5MThhMzM4ZTEwZDM2YWIxMjY2Yzk1NTFiYTA4MmMwMDNlOGI4ZWUyMzU0MDk4MmQxNGQ1M2YwZTQzMTQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
23 KB
23 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImI3MjU5MThhMzM4ZTEwZDM2YWIxMjY2Yzk1NTFiYTA4MmMwMDNlOGI4ZWUyMzU0MDk4MmQxNGQ1M2YwZTQzMTQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
968c476f2f09e32d4527551e13c3465f989a99814dc2bbe4d7398c3e0215996a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 24 May 2019 13:13:05 GMT
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
378db4fe4eb0226caaae4d6ae3946e23
Timing-Allow-Origin
*
Content-Length
23503
eyJpdSI6IjkyZDFhOGVhZDhmOWE4MDQxMjQ2ZDdiOTIyNjQ1NjZhYzcyY2JlOTI2ZWI1MjU2Y2VmMTM3YjUxMTQ0NmVjMjUiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
images.outbrainimg.com/transform/v3/
1 KB
2 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjkyZDFhOGVhZDhmOWE4MDQxMjQ2ZDdiOTIyNjQ1NjZhYzcyY2JlOTI2ZWI1MjU2Y2VmMTM3YjUxMTQ0NmVjMjUiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
97fcd922e5c4c070fba458eee6dd50c3133431ab01e93041ac5c8840634f9261
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 11 May 2019 22:32:09 -04:00
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1457961
Connection
keep-alive
X-TraceId
cccbb43376fcbc07c2bdb8332549c5f5
Timing-Allow-Origin
*
Content-Length
1522
eyJpdSI6ImQ2OTcxZmZjZjFkMWIzZGNmNzFkMDkwYjUxOTk2ZDgxYTVlMTAxZTU3YTJjOTRkYzE0MjYyNDVkNzFlMGRlYzQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
44 KB
44 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ2OTcxZmZjZjFkMWIzZGNmNzFkMDkwYjUxOTk2ZDgxYTVlMTAxZTU3YTJjOTRkYzE0MjYyNDVkNzFlMGRlYzQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
704fcd64605ce7809d92601dccaaf612b1e9fedbf78ad9bca78a4c2f5657d562
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 21 May 2019 14:54:35 -04:00
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2232197
Connection
keep-alive
X-TraceId
8fcd3f760b493ea9193ebb4c536c98b1
Timing-Allow-Origin
*
Content-Length
45074
eyJpdSI6IjNiM2RlNTZmYWQwNjZiNWIxNzZkZTBmZDgwZTAwYzhmOTU5MjljMTRlODUyZDkzMjM5NjhiNjEzYjJlNTI1NjMiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
61 KB
61 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjNiM2RlNTZmYWQwNjZiNWIxNzZkZTBmZDgwZTAwYzhmOTU5MjljMTRlODUyZDkzMjM5NjhiNjEzYjJlNTI1NjMiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2e0c0b22dc0d2f84def070f050cac64768aa76e1acc64415458fde9173e17083
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 06 Jun 2019 20:02:14 GMT
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2222319
Connection
keep-alive
X-TraceId
58bbf749806db5667ee624872919b541
Timing-Allow-Origin
*
Content-Length
62363
eyJpdSI6IjgzZjVlYTUyMjBlNWExNWY1NGZiMDZlM2U3YWJhNmRkNjFiYzM2NzJjNGY1ZWRkZTljNmU3YWU4MzRkMWVkOTgiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
25 KB
26 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjgzZjVlYTUyMjBlNWExNWY1NGZiMDZlM2U3YWJhNmRkNjFiYzM2NzJjNGY1ZWRkZTljNmU3YWU4MzRkMWVkOTgiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9b75756e2bef84c6856a35559bb3d0f15bfe7f6e19572f169174b1cd916262b3
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 20 May 2019 16:01:05 GMT
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=956737
Connection
keep-alive
X-TraceId
b111b216e0947abe1e3217168db79043
Timing-Allow-Origin
*
Content-Length
25815
eyJpdSI6IjZmNzRhMWY4YWIxYTAwM2I1N2QxNDM1Y2JlOTI5NjhlMWE1MjBiOWI4ZTkyZDgxN2VkZWJhYzJmZmQ2Nzk4NWYiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZmNzRhMWY4YWIxYTAwM2I1N2QxNDM1Y2JlOTI5NjhlMWE1MjBiOWI4ZTkyZDgxN2VkZWJhYzJmZmQ2Nzk4NWYiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
029b39c2ac3558edf6336ffd1a260636815f88be07213e8ac49db050285d5f11
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 31 May 2019 10:31:56 GMT
Date
Sun, 09 Jun 2019 15:13:28 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2182710
Connection
keep-alive
X-TraceId
e80943bd4b8dc02cc245db5896557e61
Timing-Allow-Origin
*
Content-Length
11060
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.75.173.188 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-173-188.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
Last-Modified
Tue, 28 May 2019 08:36:02 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1559032563"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame AC8B
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:28 GMT
g
rtb.connatix.com/
179 B
331 B
Script
General
Full URL
https://rtb.connatix.com/g?c_pw=400&c_ph=225&c_tk=C018218D-4AD0-4E01-8158-045425E65946&c_bu=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_ivt=0&connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&notServed=false&xplr=false&c_s=false&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&gdpr=1&med_id=796512&request_guid=9ce78cbd494b8465810f1560093208344&req_no=1&v=2&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&callback=cnxJSONP_ebb1ec0d800f8105068c1560093208345
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.118.21 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-118-21.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
0a3b3a6b3b361e61755844148dc20b54fac68d6abc8158f78d6965f4a228b8bf

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:28 GMT
Content-Encoding
gzip
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
152
r
eb2.3lift.com/
37 B
139 B
Image
General
Full URL
https://eb2.3lift.com/r?inv_code=tan_CSOOnline_MOAP&aid=36562579049911598760&rev_hash=9f5715f&rr=auction&domain=www.csoonline.com&ref=https%253A%252F%252Fwww.csoonline.com%252Farticle%252F2687265%252Fremote-exploit-in-bash-cve-2014-6271.html&pr=un&cb=44762
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.21.152 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-29-21-152.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Sun, 09 Jun 2019 15:13:28 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
37
content-type
image/gif
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=386,387,388,389&ntv_r1=4259&ntv_r2=4259&ntv_r3=4259&ntv_r4=4481&ntv_pl=787043&ntv_it
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:28 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate.linksynergy.com/wakeup/
19 B
563 B
XHR
General
Full URL
https://automate.linksynergy.com/wakeup/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.csoonline.com
URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.195.133 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-195-133.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
90ac357d2d308c8bb95d1b9ee610fb203fddfe3ea02c74a0140983d435a96694
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com

Response headers

Date
Sun, 09 Jun 2019 15:13:28 GMT
Server
nginx/1.12.2
X-Frame-Options
SAMEORIGIN
Access-Control-Allow-Methods
PUT, OPTIONS
P3p
CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA"
Access-Control-Allow-Origin
https://www.csoonline.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Access-Control-Allow-Headers
Content-Type
Content-Length
19
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 4DA1
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485920
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame AC8B
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:28 GMT
integrator.js
adservice.google.com/adsid/ Frame AC8B
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
iduJGWuiE8tSaiFK31v8L3KNjrboXzvXURGXIzKbPdZXltKl6oAaAbbhPP1FaqHYUHw3DqXiQ
spiffymachine.com/v2/0/
216 B
346 B
Fetch
General
Full URL
https://spiffymachine.com/v2/0/iduJGWuiE8tSaiFK31v8L3KNjrboXzvXURGXIzKbPdZXltKl6oAaAbbhPP1FaqHYUHw3DqXiQ
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
7fc9e76a113a4cf9d3730e8439304e652431ce3a3deadcc15897c4e877ad3b92

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
x-datacenter
gce-europe-west1
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, OPTIONS
content-type
application/json; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-hostname
hank
timing-allow-origin
*
access-control-allow-headers
DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Cookie
content-length
216
expires
Sun, 09 Jun 2019 15:13:27 GMT
sync
eb2.3lift.com/ Frame C2E8
0
0
Document
General
Full URL
https://eb2.3lift.com/sync?cb=91057
Requested by
Host: ib.3lift.com
URL: https://ib.3lift.com/rev/9f5715fe1bd113122fc90049735b31f8d442ff01/dist/bundle.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.21.152 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-29-21-152.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

:method
GET
:authority
eb2.3lift.com
:scheme
https
:path
/sync?cb=91057
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
cookie
tluid=7157235142152232974; tlcookieable=1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
date
Sun, 09 Jun 2019 15:13:28 GMT
content-type
text/html; charset=utf-8
content-length
531
set-cookie
sync=CgkIcxDG4rTmsy0KCgjmARDG4rTmsy0KCQgJEMbitOazLQoKCKkBEMbitOazLQoJCDoQxuK05rMtCgoIvQEQxuK05rMtCgoIjgEQxuK05rMtCgoI3gEQxuK05rMtCgkIHxDG4rTmsy0KCQhfEMbitOazLQ==; Max-Age=7776000; Expires=Sat, 7 Sep 2019 15:13:28 GMT; Path=/sync; Domain=.3lift.com tluid=7157235142152232974; Max-Age=7776000; Expires=Sat, 7 Sep 2019 15:13:28 GMT; Path=/; Domain=.3lift.com
content-encoding
gzip
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
cache-control
no-cache, no-store, must-revalidate
truncated
/ Frame AC8B
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame AC8B
0
60 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=3012986619564821&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame CA2B
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:29 GMT
buuNHsWobJn26HA2xzXYkoED9J30nWQD_ahSOMbnuiQnfisHOUN78COUchGhED8iT4chGkD0A
spiffymachine.com/v2/0/
44 KB
11 KB
Fetch
General
Full URL
https://spiffymachine.com/v2/0/buuNHsWobJn26HA2xzXYkoED9J30nWQD_ahSOMbnuiQnfisHOUN78COUchGhED8iT4chGkD0A
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
48f3e43edd8eb525b3de5c342677b7918b1a3b305a3ba2e1cac6dce4cb8837aa

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-datacenter
gce-europe-west1
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, OPTIONS
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-allow-credentials
true
x-hostname
hank
timing-allow-origin
*
access-control-allow-headers
DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Cookie
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame B972
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485921
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame CA2B
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:29 GMT
integrator.js
adservice.google.com/adsid/ Frame CA2B
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
css
fonts.googleapis.com/
767 B
446 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400,600
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/navkAE1sQ1XzN61QwCJFGhJGKD9rOZyNZvL_VWNdpyc1eOuYjZWDqpgksk7gCioYMW7mG_SYqa3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
2939d607a8ad67edbc7ade28075844c18c904d4b2b87145db848382a50af0214
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Sun, 09 Jun 2019 15:13:29 GMT
server
ESF
access-control-allow-origin
*
date
Sun, 09 Jun 2019 15:13:29 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:29 GMT
CSO-logo-black-for-ins.png
idge.staticworld.net/ins/
5 KB
5 KB
Image
General
Full URL
https://idge.staticworld.net/ins/CSO-logo-black-for-ins.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.165 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bfcd89614e4c5a8445a83d1aefa355494827569b86214432a2e44a99b26b25a7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
u1yWaZ4dYi5AEZBMvpCz64gUZ2EGejr9
via
1.1 varnish, 1.1 varnish
age
1598702
x-cache
HIT, HIT
status
200
date
Sun, 09 Jun 2019 15:13:29 GMT
content-length
5196
x-amz-id-2
GyakT49hM2UCIX5ETJXSsePeuuHUX9KU4K7au9WCY7zzCGSTxTf3T5/wjEU3KOOrjZdZTJvwdvc=
x-served-by
cache-jfk8143-JFK, cache-hhn1520-HHN
last-modified
Tue, 27 Mar 2018 00:10:11 GMT
server
AmazonS3
x-timer
S1560093209.349268,VS0,VS0,VE1
etag
"9968b8136eeba2f2485b2162cd66d371"
x-amz-request-id
1CDF18FCBC272808
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
1, 1
iduJGWuiE8tSaiFK31v8L3KNjrboXzvXURGXIzKbPdZXltKl6oAaAbbhPP1FaqHYUHw3DqXiQ
spiffymachine.com/v2/0/
214 B
272 B
Fetch
General
Full URL
https://spiffymachine.com/v2/0/iduJGWuiE8tSaiFK31v8L3KNjrboXzvXURGXIzKbPdZXltKl6oAaAbbhPP1FaqHYUHw3DqXiQ
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
83a91c3fa17b734f4a8a7bb189d295b8b0795f8ae9235c5f470cd110eaf54900

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
x-datacenter
gce-europe-west1
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, OPTIONS
content-type
application/json; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-hostname
hank
timing-allow-origin
*
access-control-allow-headers
DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Cookie
content-length
214
expires
Sun, 09 Jun 2019 15:13:28 GMT
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v15/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v15/S6uyw4BMUTPHjx4wXiWtFCc.woff2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:400,600
Origin
https://www.csoonline.com

Response headers

date
Mon, 03 Jun 2019 02:10:52 GMT
x-content-type-options
nosniff
last-modified
Mon, 25 Mar 2019 20:13:00 GMT
server
sffe
age
565357
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
14044
x-xss-protection
0
expires
Tue, 02 Jun 2020 02:10:52 GMT
truncated
/ Frame CA2B
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame CA2B
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=420706121&id=ima_html5&c=253476596004005&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame AE46
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:29 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 8F85
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485921
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame AE46
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:29 GMT
integrator.js
adservice.google.com/adsid/ Frame AE46
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame AE46
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame AE46
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=2696088337764887&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame FCA7
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:30 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 5CD5
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485922
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame FCA7
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:30 GMT
integrator.js
adservice.google.com/adsid/ Frame FCA7
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame FCA7
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame FCA7
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=420706122&id=ima_html5&c=2051600130645014&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_ui=0b750de8-31da-4b7a-b385-e9bec36fc833&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ntv_ht=FiL9XAA&ntv_at=808&ntv_a=AAAAAAAAAAYwIMA&ntv_sat=5&ord=1560093210634&ntv_it
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.94.173 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-94-173.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:30 GMT
server
nginx/1.12.1
access-control-allow-origin
*
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 07B3
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:30 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame B923
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485922
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 07B3
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:30 GMT
integrator.js
adservice.google.com/adsid/ Frame 07B3
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 07B3
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 07B3
0
49 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=420706134&id=ima_html5&c=4185528853621486&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame C5D4
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:31 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 0B79
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485923
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame C5D4
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:31 GMT
integrator.js
adservice.google.com/adsid/ Frame C5D4
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame C5D4
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame C5D4
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=1346615284425918&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 7A10
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:31 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame E607
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485924
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 7A10
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:32 GMT
integrator.js
adservice.google.com/adsid/ Frame 7A10
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 7A10
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 7A10
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=319331042&id=ima_html5&c=2944760766658927&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 7426
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:32 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 574C
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485924
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 7426
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:32 GMT
integrator.js
adservice.google.com/adsid/ Frame 7426
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 7426
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 7426
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=3280685048102456&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 2716
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:32 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame A937
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485925
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 2716
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:33 GMT
integrator.js
adservice.google.com/adsid/ Frame 2716
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 2716
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 2716
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=319331040&id=ima_html5&c=4202081167851181&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:33 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame CA8B
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:33 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame B765
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485925
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame CA8B
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:33 GMT
integrator.js
adservice.google.com/adsid/ Frame CA8B
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&bcsessionid=&bctempid=&overruleReferrer=&time=2019-06-09T15%3A13%3A34%2B00%3A00&ts=1560093214018
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.56.227 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-56-227.compute-1.amazonaws.com
Software
- /
Resource Hash
65b5e002c6c1141c6cd259fd104ae2c8f019361bb25d3114987bc406cdb94f7f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
867
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.csoonline.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
truncated
/ Frame CA8B
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame CA8B
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=31061775%2C319331042&id=ima_html5&c=4502466394766212&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:34 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
tjdYKDjJ9gC5lnF-S0D6XYTFhaH6wc8WdhAEo9IC57wgUIgG-hwIY_yHPoE8ljpus1pbML8u1E
spiffymachine.com/v2/0/
2 B
289 B
Other
General
Full URL
https://spiffymachine.com/v2/0/tjdYKDjJ9gC5lnF-S0D6XYTFhaH6wc8WdhAEo9IC57wgUIgG-hwIY_yHPoE8ljpus1pbML8u1E
Requested by
Host: spiffymachine.com
URL: https://spiffymachine.com/v2/0/cyd3Vkrqtd-ClWmwn4oT2UgRVFzxMujpGSwHmogdm3LpvfSUBhItArin36Z82cfR8fnYg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.98.64 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
64.98.201.35.bc.googleusercontent.com
Software
/
Resource Hash
4355a46b19d348dc2f57c046f8ef63d4538ebb936000f3c9ee954a27460dd865

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
Origin
https://www.csoonline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
x-datacenter
gce-europe-west1
vary
Accept-Encoding
access-control-allow-methods
POST, OPTIONS
content-type
application/json; charset=utf-8
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-headers
DNT,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Cookie
x-hostname
hank
timing-allow-origin
*
access-control-allow-origin
*
content-length
2
expires
Sun, 09 Jun 2019 15:13:33 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 5209
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:34 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 7392
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485926
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 5209
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:34 GMT
integrator.js
adservice.google.com/adsid/ Frame 5209
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 5209
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5209
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=575438153223913&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:34 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 5349
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:34 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 4C95
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485926
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 5349
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:34 GMT
integrator.js
adservice.google.com/adsid/ Frame 5349
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 5349
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5349
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=504733013&id=ima_html5&c=4472651238529152&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 12F6
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:35 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 7472
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485927
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 12F6
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:35 GMT
integrator.js
adservice.google.com/adsid/ Frame 12F6
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 12F6
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 12F6
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=2480760783772721&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame AF85
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:35 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 3120
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485928
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame AF85
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:36 GMT
integrator.js
adservice.google.com/adsid/ Frame AF85
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame AF85
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame AF85
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=1322404187313784&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:36 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame CF47
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:36 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame FB76
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485928
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame CF47
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:36 GMT
integrator.js
adservice.google.com/adsid/ Frame CF47
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame CF47
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame CF47
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=1435623688610188&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 4E25
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:37 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 836D
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485929
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 4E25
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:37 GMT
integrator.js
adservice.google.com/adsid/ Frame 4E25
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 4E25
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 4E25
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&e=319331043&id=ima_html5&c=3910335590626648&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 78E6
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:37 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 3CA5
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485929
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 78E6
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:37 GMT
integrator.js
adservice.google.com/adsid/ Frame 78E6
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
truncated
/ Frame 78E6
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 78E6
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=895421434059341&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:38 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
g
rtb.connatix.com/
197 B
340 B
Script
General
Full URL
https://rtb.connatix.com/g?c_pw=400&c_ph=225&c_tk=C018218D-4AD0-4E01-8158-045425E65946&c_bu=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_ivt=0&connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&notServed=false&xplr=false&c_s=false&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&gdpr=1&med_id=796512&request_guid=8a980f58c2fd3a4e19321560093218119&req_no=2&v=1&c_f=[{id:13602,r:1,i:0,sr:1},{id:13706,r:1,i:0,sr:1},{id:13707,r:1,i:0,sr:1},{id:13725,r:1,i:0,sr:1},{id:13727,r:1,i:0,sr:1},{id:12868,r:1,i:0,sr:1},{id:12869,r:1,i:0,sr:1},{id:12870,r:1,i:0,sr:1},{id:13842,r:1,i:0,sr:1},{id:13843,r:1,i:0,sr:1},{id:13844,r:1,i:0,sr:1},{id:13845,r:1,i:0,sr:1},{id:11481,r:1,i:0,sr:1},{id:11519,r:1,i:0,sr:1},{id:11564,r:1,i:0,sr:1},{id:11565,r:1,i:0,sr:1},{id:11857,r:1,i:0,sr:1},{id:11858,r:1,i:0,sr:1},{id:11860,r:1,i:0,sr:1},{id:11731,r:1,i:0,sr:1},{id:13708,r:1,i:0,sr:1},{id:13710,r:1,i:0,sr:1},{id:13723,r:1,i:0,sr:1},{id:13728,r:1,i:0,sr:1},{id:12871,r:1,i:0,sr:1},{id:12872,r:1,i:0,sr:1},{id:12873,r:1,i:0,sr:1},{id:11482,r:1,i:0,sr:1},{id:11558,r:1,i:0,sr:1},{id:11562,r:1,i:0,sr:1},{id:11563,r:1,i:0,sr:1},{id:11967,r:1,i:0,sr:1},{id:12103,r:1,i:0,sr:1},{id:12104,r:1,i:0,sr:1},{id:12331,r:1,i:0,sr:1}]&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&callback=cnxJSONP_c7b3304926b54aefe23a1560093218119
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.118.21 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-118-21.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
b275023fc039b9842b58255a032e73e37151781a02c7cfcaef331266f3dfc2d3

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:38 GMT
Content-Encoding
gzip
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
161
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 0AC5
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:38 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame A6CF
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485930
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 0AC5
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:38 GMT
integrator.js
adservice.google.com/adsid/ Frame 0AC5
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
p2
sb.scorecardresearch.com/ Frame B6C5
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&ns...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&n...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=10001&ns_st_cl=149000&ns_st_hc=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_796512&ns_st_pt=10001&ns_st_dpt=10001&ns_st_ipt=10001&ns_st_et=10001&ns_st_det=10001&ns_st_upc=10001&ns_st_dupc=10001&ns_st_iupc=10001&ns_st_upa=10001&ns_st_dupa=10001&ns_st_iupa=10001&ns_st_lpc=10001&ns_st_dlpc=10001&ns_st_lpa=10001&ns_st_dlpa=10001&ns_st_pa=10001&ns_ts=1560093218257&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=Qualcomm%20found%20to%20violate%20antitrust%20laws...%20What%27s%20next%3F%20%7C%20TECH(feed)&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.56.111 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-56-111.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:38 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1560093208254&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=10001&ns_st_cl=149000&ns_st_hc=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_796512&ns_st_pt=10001&ns_st_dpt=10001&ns_st_ipt=10001&ns_st_et=10001&ns_st_det=10001&ns_st_upc=10001&ns_st_dupc=10001&ns_st_iupc=10001&ns_st_upa=10001&ns_st_dupa=10001&ns_st_iupa=10001&ns_st_lpc=10001&ns_st_dlpc=10001&ns_st_lpa=10001&ns_st_dlpa=10001&ns_st_pa=10001&ns_ts=1560093218257&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=Qualcomm%20found%20to%20violate%20antitrust%20laws...%20What%27s%20next%3F%20%7C%20TECH(feed)&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Sun, 09 Jun 2019 15:13:38 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
g
rtb.connatix.com/
161 B
327 B
Script
General
Full URL
https://rtb.connatix.com/g?c_pw=400&c_ph=225&c_tk=C018218D-4AD0-4E01-8158-045425E65946&c_bu=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_ivt=0&connatix_sess=gDF3K_9Aa7jqClGYd5AlNmOSUCDT8FfquHtCl7HRrybYYeyp-wGe6TKMR9Hqm4vyoLYXJqad8F06Qm4a35_AKG0nBrrB7IOklYew_5du5ZqIexz24y3JBTBfqg6Peye1sDh-jTeacahSmnRSa_RP9H51QUPApkgVBC3Fv-eRfQtdvf1qnMfX-trS2ALTzMxG&notServed=false&xplr=false&c_s=false&c_pl=IlMv42u4-WLVur2QZtYSYps7fU15vUUIWxPWwD4LxyPU778uAPdHYkYofCceXcINKrMibbkrdP4_IHZ8fEQR8VrIYCeDOQNV33P7di09-tkrCIwOHQSA0tGavjwrXV-JSQF5LyDbjW3OzxGjPIQ_S__oMC4wM5eW11XmyFaVAX98z24YuJIRSD3GwkQ2OCT5AJz42_VJBgTYIVf1NhTMYf7V1pHbLW0vLD3XYQmFLdrG-PXE6kZG0WQ3zRHnh3QC93T6Cbidl620pfJ0MMYYPg&gdpr=1&med_id=796512&request_guid=9b11ee3b42b47c9e30091560093218422&req_no=3&v=2&c_f=[{id:13602,r:2,i:0,sr:2},{id:13706,r:2,i:0,sr:2},{id:13707,r:2,i:0,sr:2},{id:13725,r:1,i:0,sr:1},{id:13727,r:1,i:0,sr:1},{id:12868,r:2,i:0,sr:2},{id:12869,r:2,i:0,sr:2},{id:12870,r:2,i:0,sr:2},{id:13842,r:2,i:0,sr:2},{id:13843,r:2,i:0,sr:2},{id:13844,r:2,i:0,sr:2},{id:13845,r:2,i:0,sr:2},{id:11481,r:2,i:0,sr:2},{id:11519,r:2,i:0,sr:2},{id:11564,r:2,i:0,sr:2},{id:11565,r:2,i:0,sr:2},{id:11857,r:2,i:0,sr:2},{id:11858,r:2,i:0,sr:2},{id:11860,r:2,i:0,sr:2},{id:11731,r:2,i:0,sr:2},{id:13708,r:1,i:0,sr:1},{id:13710,r:1,i:0,sr:1},{id:13723,r:1,i:0,sr:1},{id:13728,r:1,i:0,sr:1},{id:12871,r:1,i:0,sr:1},{id:12872,r:1,i:0,sr:1},{id:12873,r:1,i:0,sr:1},{id:11482,r:1,i:0,sr:1},{id:11558,r:1,i:0,sr:1},{id:11562,r:1,i:0,sr:1},{id:11563,r:1,i:0,sr:1},{id:11967,r:1,i:0,sr:1},{id:12103,r:1,i:0,sr:1},{id:12104,r:1,i:0,sr:1},{id:12331,r:1,i:0,sr:1}]&p=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F2687265%2Fremote-exploit-in-bash-cve-2014-6271.html&c_v=1506_0_0_1_0&callback=cnxJSONP_fbeb2d7515fbf8622e641560093218422
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.118.21 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-118-21.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
74478d9722c0a60bef87196e5857f1a12d93146ecf268f7e4a76aca03dac6c9f

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 09 Jun 2019 15:13:38 GMT
Content-Encoding
gzip
Server
nginx/1.12.2
Connection
keep-alive
Content-Length
148
truncated
/ Frame 0AC5
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 0AC5
0
59 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?error=1009&vis=1&lid=7&sdkv=h.3.310.0&id=ima_html5&c=4394604063554995&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 09 Jun 2019 15:13:38 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame E2F5
237 KB
80 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1506/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
81866
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:38 GMT
bridge3.310.0_en.html
imasdk.googleapis.com/js/core/ Frame 6409
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.310.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.310.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
189087
date
Tue, 04 Jun 2019 00:14:48 GMT
expires
Wed, 03 Jun 2020 00:14:48 GMT
last-modified
Mon, 03 Jun 2019 18:26:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
485931
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame E2F5
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Sun, 09 Jun 2019 15:13:39 GMT
integrator.js
adservice.google.com/adsid/ Frame E2F5
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.csoonline.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 09 Jun 2019 15:13:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0

Verdicts & Comments Add Verdict or Comment

330 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| getQueryVariable function| $ function| jQuery function| getApolloLocaleSlugMap function| getApolloLocaleIdMap function| getApolloLocaleBrandMap function| getCountryCodeLocaleMap function| getCookie function| setCookie function| getFastlyCountryCode function| getLocaleFromCountryCode function| getAutoLocale function| getSelectedLocale function| setSelectedLocale function| browserLocaleError function| setBrowserLocale function| getRedirectLocale function| getBrowserLocale function| getLocale object| googletag function| __cmp object| consent function| runQueue function| watchConsentQueue function| bindReshowCmp function| admiral object| jQuery110209303835107260185 object| blueConicPreListeners function| BCClass object| blueConicClient string| twitterUrl string| linkedInUrl string| facebookUrl string| twitterHandle string| busUnit string| localeEdition string| busUnitAddress object| IDG string| positionDataTag object| adUnitIdsMap function| getSrcCookie function| isElementAboveTheFold function| isElementInViewport function| isVisible function| isTabVisible function| buildPositionData object| adLayer boolean| global_ShowSuper boolean| global_ShowHero string| url object| Logon object| $thm object| diagPixSentCodes object| __iasPET function| loadGPT function| requestAds function| iasDataHandler number| IASPET_TIMEOUT number| __iasPETTimeoutRequestAds object| Typekit object| Select2 string| isProd string| brandCode string| brandName string| brandId boolean| regDebugLog string| regApiUrl string| apiKey string| tokenPrefix string| tokenSuffix string| brandDomain string| insiderContentType boolean| notEmptyArticle boolean| notEmptyMediaResource boolean| isInsiderPremium boolean| isResourceInsiderPremium object| ownerIds string| campaignId string| assetId string| placementId string| clientCompany string| businessUnit object| _alcTag object| ALC object| Hashes string| elqSiteID string| elqVer string| elqERoot string| elqSecERoot string| elqPPS function| elqErr string| elqCurESite string| elqAltESite number| elqWCount boolean| elqTryI string| elqStr object| elqTID boolean| elqTRun boolean| elqLoad boolean| elqFail string| elqCurE function| elqClearT function| elqWrite function| elqInit function| elqReplace function| elqQString function| elqAddQS object| elqWDt object| elqDt number| elqMs number| elqTzo string| elqRef2 function| elqFCS object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken undefined| google_measure_js_timing string| slot function| 4dm1r11545242527 function| GetElqCustomerGUID string| elqCustomerGUID boolean| canRunAds string| oneRegPlacementID boolean| supMontMods undefined| segs object| ntvConfig string| prodNames string| prodManufacturers string| prodCategories string| prodVendors string| insiderSignedIn string| idg_uuid string| dlJobFunction object| dlJobPosition object| dlIndustry undefined| insiderToken undefined| tokens string| sincePublished string| edition object| dataLayer object| _sf_async_config string| adBlockStatus function| AdBlockEnabled function| numberFromDataLayer function| stringFromDataLayer object| permutive number| relatedTop object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client function| CMD function| initCmd object| $jscomp object| ntv number| ntvLoadStart undefined| nQuery object| prdom function| ntvInsertTracking function| ntvTrackingUrlUtil function| ntvStopWatch function| ntvTimeOnContentStopWatch function| ntvGetElementViewability function| ntvViewableImpressionTracker function| ntvArticleTracker function| ntvjQueryInit function| ntvExtends function| ntvAppendStylesheet function| ntvAppendScript object| ntvToutAds object| PostRelease function| parcelRequire function| TrackerFactory function| _MOAT function| _Viant object| businessLogic number| ocHeadTop undefined| menuWidth function| animateSlideLeft function| animateSlideRight function| calcAdHeight object| Mustache function| BlueConicMetaDataService function| FormRuleService function| ouibounce function| RuleService function| BlockAdBlock object| blockAdBlock object| bcConnectionUtil object| jsonpath function| BlueConicDataLayerUtil function| md5 function| isValidEmailAddress function| encodeQueryData function| bindEmailModal object| google_tag_manager function| postscribe object| headertag function| headertag_render object| pbjs object| rubicontag string| firstSessionDate string| lastSessionDate string| currentSessionDate number| sessionNumber undefined| inSession number| daysSinceLastSession object| currentTime number| longExpiry undefined| lastSessionMS object| recaptcha function| parallaxLb function| parallaxLbHandler function| executeDRRMobile function| executeDRRDesktop string| obEdition string| widgetId object| script object| child object| SC function| DP_jQuery_1560093206447 function| getLoginStatusForOmniture function| getQsVal function| getTrackingToken function| socialTrack function| linkedInTrack object| AWIN object| domains object| converter object| awinit function| debounce function| printPage object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater function| initZooms object| _tlImpressionBusLoader boolean| PR_SHOULD_USE_CONTINUATION function| prettyPrintOne function| prettyPrint object| PR function| readCookie function| readRawCookie function| getUrlParams function| initAccordion undefined| ss_android undefined| ss_set undefined| ss_icons undefined| ss_keywords undefined| ss_legacy undefined| ss_getElementsByClassName undefined| ss_liga object| g_brandAnalyticsInfoMap object| LazyLoader object| xrayAd number| ocHead number| relatedContentHeight object| _comscore object| acceptedDomains string| cleanedHost object| a object| f object| closure_lm_763881 object| tl_jsonp object| __core-js_shared__ object| core object| tlScriptCandidates object| _tlCreatives function| generateSubtag string| GoogleAnalyticsObject function| ga object| _auto function| ael object| httpRequest function| onYouTubeIframeAPIReady function| udm_ object| ns_p object| COMSCORE object| google_tag_data object| gaplugins object| twttr object| gaGlobal object| gaData boolean| cnx_poly object| cnxBindings function| cnxUnbind object| cnxtimeouts object| cnxintervals function| cnxSetTimeout function| cnxSetInterval function| cnxClearAll object| cnxUmm string| cnxPageGuid object| cnxJSONP_2fe030e54a1adbb939751560093207499 object| __SKIM_JS_GLOBAL__ string| _linkedin_data_partner_id object| t number| _tlTagsPending object| MoatSuperV26 number| google_global_correlator object| closure_lm_234609 object| cnxJSONP_7ab2606a3326c0efc3001560093208001 object| cnxJSONP_ebb1ec0d800f8105068c1560093208345 boolean| _tlSyncDone object| closure_lm_482235 object| closure_lm_369895 object| closure_lm_282596 object| closure_lm_629596 object| closure_lm_455429 object| closure_lm_284859 object| closure_lm_173146 object| closure_lm_681636 object| closure_lm_18652 object| closure_lm_911699 object| closure_lm_632219 object| closure_lm_965933 object| closure_lm_199082 object| closure_lm_771908 object| closure_lm_719204 object| closure_lm_329690 object| closure_lm_127351 object| cnxJSONP_c7b3304926b54aefe23a1560093218119 object| cnxJSONP_fbeb2d7515fbf8622e641560093218422 function| cnxAddEventListener

21 Cookies

Domain/Path Name / Value
.3lift.com/ Name: tluid
Value: 7157235142152232974
.eloqua.com/ Name: ELOQUA
Value: GUID=334B966E1E64423A8F9DA3EB86DC8B2E
.3lift.com/ Name: tlcookieable
Value: 1
.csoonline.com/ Name: _gat_UA-300704-9
Value: 1
.outbrain.com/ Name: recs_f729303ef6a61a2a065efc43189b1d7b
Value: 0B1925901673A1121390614A2176453099A1774583762A2227393577A1998452725AC2B2231202990A2241691043ACD1
.csoonline.com/ Name: _gid
Value: GA1.2.1488924528.1560093207
www.csoonline.com/ Name: BCSessionID
Value: No%20profile%20present%20and%20will%20not%20be%20created.
widgets.outbrain.com/ Name: akacd_widgets_stg
Value: 3737546005~rv=70~id=3e76e1ef215e1e27dc401f1bda1fe7ce
.eloqua.com/ Name: ELQSTATUS
Value: OK
www.csoonline.com/ Name: last_visit_bc
Value: 1560093205170
www.csoonline.com/ Name: firstSessionDate
Value: Sun, 09 Jun 2019 15:13:26 GMT
.csoonline.com/ Name: _ga
Value: GA1.2.723992339.1560093207
.3lift.com/sync Name: sync
Value: CgkIcxDG4rTmsy0KCgjmARDG4rTmsy0KCQgJEMbitOazLQoKCKkBEMbitOazLQoJCDoQxuK05rMtCgoIvQEQxuK05rMtCgoIjgEQxuK05rMtCgoI3gEQxuK05rMtCgkIHxDG4rTmsy0KCQhfEMbitOazLQ==
.outbrain.com/ Name: obuid
Value: b93c16f4-7d70-42f0-b527-3666ff110b36
www.csoonline.com/ Name: inSession
Value: true
www.csoonline.com/ Name: lastSessionDate
Value: Sun, 09 Jun 2019 15:13:26 GMT
www.csoonline.com/ Name: sessionNumber
Value: 1
.csoonline.com/ Name: aiia
Value: true
.csoonline.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
www.csoonline.com/ Name: currentSessionDate
Value: Sun, 09 Jun 2019 15:13:26 GMT
www.csoonline.com/article/2687265 Name: ntvSession
Value: {}

5 Console Messages

Source Level URL
Text
console-api error URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019053001.js(Line 1)
Message:
Exception in queued GPT command
console-api log URL: https://cdn.blueconic.net/idg.js(Line 127)
Message:
[BC]Item will not be scraped due to missing publication date
console-api log URL: https://www.csoonline.com/article/2687265/remote-exploit-in-bash-cve-2014-6271.html(Line 126)
Message:
*****GDPR: EU user?
console-api log (Line 1)
Message:
Local storage not available.
console-api log (Line 1)
Message:
Automate is initialized.

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ad.doubleclick.net
admiral.mgr.consensu.org
adservice.google.com
adservice.google.de
alt.idgesg.net
ampcid.google.com
ampcid.google.de
api.rlcdn.com
api.skimlinks.mgr.consensu.org
automate-prod.s3.amazonaws.com
automate.linksynergy.com
cdn.adsafeprotected.com
cdn.blueconic.net
cdn.connatix.com
cdn.permutive.com
cdns.connatix.com
ck.connatix.com
core.connatix.com
eb2.3lift.com
fonts.googleapis.com
fonts.gstatic.com
fonts.staticworld.net
i.connatix.com
ib.3lift.com
idg.blueconic.net
idge.staticworld.net
images.outbrainimg.com
images.techhive.com
imasdk.googleapis.com
jadserve.postrelease.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mcdp-nydc1.outbrain.com
mv.outbrain.com
ntvcld-a.akamaihd.net
odb.outbrain.com
p.skimresources.com
p.typekit.net
pagead2.googlesyndication.com
pixel.adsafeprotected.com
platform.twitter.com
r.skimresources.com
rtb.connatix.com
s.ntv.io
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
secure.p01.eloqua.com
securepubads.g.doubleclick.net
spiffymachine.com
static.ads-twitter.com
t.skimresources.com
tcheck.outbrainimg.com
tlx.3lift.com
tpc.googlesyndication.com
trk.connatix.com
use.fontawesome.com
v.connatix.com
vendorlist.consensu.org
w.soundcloud.com
widgets.outbrain.com
www.csoonline.com
www.dwin2.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
104.109.56.111
104.75.173.188
104.75.174.73
142.0.173.130
151.101.194.165
151.101.2.110
151.101.2.165
151.101.2.2
151.101.36.157
151.139.128.10
172.217.22.2
172.217.22.70
18.207.76.63
199.166.0.26
2.16.186.99
2.18.232.28
2.18.234.163
2.18.234.21
23.111.9.35
2600:9000:2047:9000:1:af78:4c0:93a1
2606:2800:234:59:254c:406:2366:268c
2a00:1450:4001:809::200a
2a00:1450:4001:80b::200a
2a00:1450:4001:818::2006
2a00:1450:4001:819::200e
2a00:1450:4001:81a::2002
2a00:1450:4001:81b::2002
2a00:1450:4001:81c::2008
2a00:1450:4001:81d::2001
2a00:1450:4001:81f::2003
2a00:1450:4001:820::2002
2a00:1450:4001:820::2003
2a00:1450:4001:820::200e
2a00:1450:4001:821::2002
2a00:1450:4001:824::2004
2a00:1450:4001:825::200e
2a02:26f0:6c00:19f::19fd
2a04:4e42::645
34.199.191.3
34.226.56.227
34.230.118.21
34.95.92.78
35.153.195.133
35.190.40.172
35.190.59.101
35.190.75.210
35.201.117.115
35.201.67.47
35.201.98.64
52.218.233.59
52.222.162.189
52.222.162.202
52.222.162.213
52.222.162.7
52.29.21.152
52.51.227.120
54.154.94.173
54.93.135.33
64.74.236.19
70.42.32.51
00e441f817788168d15166b9a82eab1ddb74c0f7edbaa80d02e7831725d1862e
029b39c2ac3558edf6336ffd1a260636815f88be07213e8ac49db050285d5f11
02d2940a00290f3a9e4955de7821626688c0cacde8c97c762838e6b40ab22926
032c385d86d8b49e46c9216be5c4b2625918907ba209750d0ad00080801c49fa
03643efcf63e8fbfe6571cd0f1a4ce49f8575a7bee74f2e9fd7fab344e474e48
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
03fe6ca60cfaf61cba3353a0b460ed2912b07b09858e1f01ef55e0cff50e0ec7
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
053d5c873a012d89c7a079d097426cfddb18b28494a55c51eff89e0294540dfd
08aa3a5ee68a21d5771a70b20495b6da1c0f996c46982cd1b0447ad2db730d11
0a3b3a6b3b361e61755844148dc20b54fac68d6abc8158f78d6965f4a228b8bf
0afbd1c3e2da712bb4843aed36d9341b9ff3203b38826ffdf2bee00d2b4673c1
0e68c06565b75491023352c396e76fa438b9093e6bc6a98e6688a23335854e7f
0e7e85bedd51d57664518e33941b37ec94c5c5061bebb6db0becbea8b877bdab
0f3ff65c6f02d9010a10c930ca16e6ed93fad3a35d308a1d3847c5e6ac631c03
12d999a6c33d75d8f6e172bd7319c74ffda408238f5a2e034600a2493c181b3a
13f1b00173946b42d16add7f01d587f145caa84efd4f94c02573143536a78d05
17bb8b5dfa44693e301a436b03b03ef05ed0a581e6e036aef2756a5c03034356
18c04d9780f6893da3d093124f2b559cf0da945ba1974d225752fd6b3d37fc6b
1a5fbcd5baebb9fbf16b08afd53bbc22b5b24e52382f8fe45f117f53f17ff1f9
1b197985c0bef8bc365381bd16e15dccf184eb33d0abf0afdb4f567da2000fb2
1c3f20ee2ffa18c23f0d6c63c02ab23f051c3ec0d07aa80c2f54d08b11b8a5b0
1e5021cae459e8ef32a85e19388afaa5cc28bdfa655250e79e7c143bde60e7f0
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db
2939d607a8ad67edbc7ade28075844c18c904d4b2b87145db848382a50af0214
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04
2e0c0b22dc0d2f84def070f050cac64768aa76e1acc64415458fde9173e17083
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5
37aa2df6eabbf801c05c6c35dc8314f9e284868f1a6ef2cb2732d2d33daff9f3
3845d649bd2d5144b1fd77e816050954f99a21042479354512ca8213d0d30f80
3a116c532905a517755fd4b3299f1d96d0847c9080816a97a494a0220ceed983
3ad611984f050907751d5fd6c001c180f64861ab947d86bbe39022b198fc5883
3d5629a5cbadabfd67e7c99b9e71569f356ebf7fddabd5b3c24e37b49a48c605
3e1e592f525ca27ef80c91d293a81e27e226cbeabd2168cb9595b55c7ed9c3f4
40a7af2e330fed46165c350c441e05c58c9363e06ce0251caf2192fd249fd201
413215e01c47f149df91c6d2281bc5288980420466333b3190d2807c1a5a6966
4355a46b19d348dc2f57c046f8ef63d4538ebb936000f3c9ee954a27460dd865
43c6ec467d4dca55df0498b80753aa9e9b6696d6c8f7dc7080d20c42cef039c4
44dc64c082736ee986d3dda3134211b2b5361c6624d9c4acc187a79a8a8d6d6d
453893f7daa3d8fe9716f8c6d0f36f8ade8cacfc0093e164f4f998b46427959e
464e7cde418a559c5035942d1ab154d5d906f378f256a0dd39848d197df6180d
47a9439c6214c7cb46bc9d103ac240a0e51ba09c40faa5449f14f41fbe77ef13
47c749c888c850505d68f2745651928d8aec9a6802d6a8b20869fa114af92277
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
48f3e43edd8eb525b3de5c342677b7918b1a3b305a3ba2e1cac6dce4cb8837aa
4d08b1fc63ad38f844d84f9893103ab6181a956605f6e49765ac43c349cc7762
4e6b5fc328bac95eec2e30afa8a58224c9accc6d70daf0e864d75c4c6d07fe94
4f4ed0e81c2f0016d06ae816dd872edc04e97612c9d36f2f3f4475f2954e7fcc
50b96fc0cfd363b826c43a068f6c92e6d4ebd8c537570b674d48813a5dfdfa14
551c004633e25f9dd42ff8e4af57138e73e1a06349e8296ed7180046c0452ae3
55e8d16bb1a291b0524928dd3bd20c191a14d8a947e4b141271f9c595c7bb451
58e12f6361b0e25f9ce4750d5c9ac860c000ac94d9e333c64145522efda5ea70
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
5a9c4b424254849d034541d05afd282527236eba23a7d28b2cff1e4b7fb54772
5e9ea707a3d475708008836f6202aed222ee8ea7399770c2a7c0b189fd6d3543
607bfd152e5c762ba0f0502f653c7bbb546ad7955e792a9840d4ae28a8219423
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
636159b35205da4142a43bc02d2849d77d3ac07a0946211585cde15a9c6ff21f
650ae71f579feb5002cf59bb44ead1b0fbec98923fe09a9dbfdde2b865f664ef
65b5e002c6c1141c6cd259fd104ae2c8f019361bb25d3114987bc406cdb94f7f
66b5ca68288cc2506f1c5709fe38cebccca428406a7ce96e392718203666d503
674bacc340798e45b0f36e114f073eb3dec917b4e405d46a5066c73052c46a8a
676aa6d4090a54ea6893484095f55c80659fb8538db100cdb8ce1dc82bab42b8
6a0f6cf6b4648c192d81b5fc7b70cb2f6819ef4a799e421e8626cae9697aa85a
6e574a88a303d27876368be887fc6415d1928a18e7f81c0e2f6e992f32455e66
6eb4e5504eb9654aa6e2e14f07d640404bca9be42530631016c1edf90aa73541
704fcd64605ce7809d92601dccaaf612b1e9fedbf78ad9bca78a4c2f5657d562
70f4516b80065013b90b2b41ac6e11767d420f7438f87f1c774fa853b4f675a5
7406bb93452c0a0d21079779d11fd3a36ae5b8a019c0f1446e725c753995d89a
74478d9722c0a60bef87196e5857f1a12d93146ecf268f7e4a76aca03dac6c9f
758d5a5cd2e6e37758716fc0806f90e90f8d07a7c41897c6df34ee80ef1d1269
76a6df6a987d607a1f28f904c1345ffcc4bd8b181f940c351530d1eb9bc02887
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313
77d081b5cbccdf90ac8e9ca88b9519798bf17c7b3d2c4b6eebb6ca254eb8381d
786653b773ea8e89e055b1380faa96769ed8bc605d6cfda8332f2c21408040cc
78d83d68ccf7a24aca085486bfc291760424279b6f5308092af4fe600b9d1e19
792699905f1c4310fd453876a05c779ea30db04fefc662341e2c0cc1d6b5112e
7db36b8d785d5d811ee1d82db5eeea2045f34a14d7dc70dc6c9f20053a26c23c
7e3f61a257e65e8c82601c44a52bcb4598c58cba6c36fa23041cc16af61792f3
7f50b51f0ef7f4478d639ec9ab59169e420fed17d4792eb84e3589e989730c03
7fc9e76a113a4cf9d3730e8439304e652431ce3a3deadcc15897c4e877ad3b92
8050f05c230d74be333b63cef230e786094e9100f55fa19c6c0831e95870768d
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
83a91c3fa17b734f4a8a7bb189d295b8b0795f8ae9235c5f470cd110eaf54900
83d86c9e7359ed844c0e7682abcd5cdb65222d421c61156f17791ac6c2650274
869ff0ba952924c539c2858fbfb032e6caf14f0a8805be73156ca21debd6ea2d
895830e74284179aba9c4c58787d60e5043c2d9fd61389261e9d111ad3419bf4
8982bee74ee4a24031eea6ffe2cf2a3a41b3eee01490dfb4b8a641ef69dc923f
8a4f5012d1a688b1dadd281385cda711366c623f66fc4f29f449f0d0aa8bbd74
8b1573c4fc9682b0e729494658d82956868649906f78848bb78280616229667b
8bd06a157f6234495a2a93e0ad4166ebe82bf9d69a20831eadd196aad3f152b6
8cbde677cfad8b6a5531f472f6e79236392fd06ed3cd4acb9ef31612cbb6a66e
8f88cb7a1cd4134f5d616b9fca90b9069fa16c162b7ae66ba1b500c490b41dd2
907b3888689f0c5f1b1e63e911624457626a85dfa61cb832288179c22cbb1a4d
90ac357d2d308c8bb95d1b9ee610fb203fddfe3ea02c74a0140983d435a96694
90e7f8120f6d2e856e3a487abe2551c75bea54bee192a5a9b8afa4a0216eefa6
915bbf4d9813c1f5637c3392d57c41b34c84c967bd08e49971597a498449c12c
91820d5453e2e3b84ae6e95af2a59a908e1075f57cb186004a1bfbdeb7ab0058
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
94d2f2702c0702d05899daeb179f102ff3b070747a6fd22f80c7b891b3cb4e69
968c476f2f09e32d4527551e13c3465f989a99814dc2bbe4d7398c3e0215996a
9777efb15beb5bd9927a30454bd69769e5ceca210f00aa52bd319d680bee8c21
97fcd922e5c4c070fba458eee6dd50c3133431ab01e93041ac5c8840634f9261
9844fb443bd322af1d908116fa890abdbed6b8b6fe73fba91c9beb8408318aad
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
9a519b487d9753d903deb5d65ca0faa0c6fa0d572a89b71a4ced7e354447ad9d
9b75756e2bef84c6856a35559bb3d0f15bfe7f6e19572f169174b1cd916262b3
9b9265c69a5cc295d1ab0d04e0273b3677db1a6216ce2ccf4efc8c277ed84b39
9c857aafeb3aca95b2b9d1db13c1c7f5e1924aaf8d93e0e512bbd5d73ee3d98e
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
9d6aa23598ba820181e6f464186ccdd385506e5871595ffcc80d3a48d6609562
9e9bcbffd3a29d35c0f069229501c57f28370104c55571004f5a8557572ab2b5
9eb5f4aaf681528b1c83e13a0e9302e9f05132372e35dbc96c95485198028d56
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f
a2da03e31d3f31b5fc134e1ac2ca24b5fe80b47b5eed6eda1d47a5b5116e8191
a5e5c781317ce492049cb1f9e1deec67c47bbe5dbd03ec12f688cf7a221a79f2
a72557f379934ceccb097162886f22990bf0910ba0e285e46e6378d8a904fd09
a739dbffc4a907c1f133b4b26e0daf544ea743218bba5704a910313b0ef3ac10
a917566e751e5fb831c9d4381f464c7dcf95d8a0f59f4b217bc1cb94b4a28de4
aa4c0e3bbcf82ab51f6f7cdc71783569bdeed8357000ac3e7433fbee8e1e89b1
ae1b78352b46c0943fe27a3c417fd30d8dcdba1d2bf5e0f27a0c3155637a1564
ae3078287ab358b32099b25670d8ab8967334be92bc6ad5db4873a20ba3bf6a2
af34f58ea2fc346a5f7028ad8b721a9bb31405cf283471a37dab53bad10a6a36
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
b275023fc039b9842b58255a032e73e37151781a02c7cfcaef331266f3dfc2d3
b52e06f854795718703ef9723b47a9a23edcbe2ae53ff261926d8d6059056cfe
b59054e128a42511aa22399d02cd8365ac1c66a6efe6f4f11cfe1ae16284db0c
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
b8a851a5e971d557236e49266f8bd0951149fb66f7212f6e32729a925baffc01
b9b7a6409fe8b5947364399f4945e658f388f58012d739f4ce91f5ba834f80e2
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6
bcb8ec500ddaf5cb57b8b4ea9e8374459c8d89edefdcabe38681ce37ec4ad119
bdfe5b167ff906b96e1f8f028ac8f5e41af7a1892d0cc3a275d28057ba79c0a9
bfcd89614e4c5a8445a83d1aefa355494827569b86214432a2e44a99b26b25a7
c2787f84ac525e6b202f56eb25ef03f40017d11100280dd6f3866cadb4d1f50c
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
c5bad5ad4873ebdc3a15f122c0682a17bce8bc83d3b3466a3285feba4f09b43c
c7d10c776205fd870156fb3289d42a6fb2e8b10c44d5ee438bba0b54aa2da17a
c7e1ddc2de3256e9b1db3c3733f38a74a9cdcbf1c424d559519f85cfe0e321ba
c80b8e38e93a84d8bcf76639294cabc7f0bad535d4a896660004734cc5d1c61a
c9a8b2ad4d5b895b2f293eb6e8d9f6226904d4a660fe197833311e3f61411d21
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
ca51e0a28d0a5a6056e312625cf15051dd1aab76d64107af6ac2a393448e0028
cb3a7287129d3521fd77f5b82007499c22db663601fdd977b6a15b4676ce17e3
cce1a9282d617a8475100f0a0505c83464852a4ec34ff854792d8af13dccb8aa
cd430b3687ad052f626eca01deb506c3553c76f7a192847191eda9bbba9f50e8
d2aae940b6d023c99cbd656bbd0868f51bcf4a93455efef42cc95d8a4c7bceca
d53cd484b96d000c8bfda0b49ebcc546be2c6a8933430da3ecf24f0fe3f76aae
d61ee6f4c7b8572833d3bdad303493033c896a58ca134680319e3c4bef8756bb
d76f75487d3b73df1fbbbadac2b16dd48ed8cc7becbc6cbba2d52d2b1fae18b5
da1ab34f6c36d69460101faad0bd273d36a8bc4aa7a01bb7cb577b40f64d6fad
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
de42e064ccc64d63d2872ae0b70cf646c6d223bf21b6585b3c7399542e39b7b5
df6aa193b8808f4bdc6f38cf7d878dedd8e0aca737e2cf325fb5a967c372bcb8
df8087f58aadffcf6759d2849839b08e847025a442e7f6bd6af7ac0acdbed2ce
df8771a652630a4dce9e94cd2696eb76a1fd3c4fd7bc24269879f0ba8bc793c5
dfd9e061f289eeaf739ed0e3f756905b4c61dfb2403c1a5c8feb47134aa43dad
e361531fa141864a28133b1d0174d3082ccc117fb347d7a913877faac08b9df0
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e5c1d9e7bdeaf3372dee724d175d25aca879ed52ae9afd018f503e9d74e09b50
e8e5fe8177578150e8faf71219cfe439c2391501f077c8015ec03d694c9ea3ae
e969bb16ae7b47a2ca815d51402b844ff2da906270adad2d56878b5d788ecb98
e9eca1449dd137bb21c358bb8acdcfe2374833a63b300f7ce6b1d5f33a0204c8
ea1a2a0de916894ba85ed6500751ac2eceaf9bfdc7bda25988ea42c97ef08ca5
ed4b59c842945fa6d990f7d9a750c87a92f7ba60f7f19f8d18af145853c35c1a
edecdf5af4c0eb41b65610c84b6f2eaa2590a999d98d4d7ef0df06bf799d8f6a
ef756e21b4660483b0d200e15873d899d783fc49abccebcf5d2ebc5d7e6f8e31
ef7755857c07a98436dce7c81f0071da4925b63aa320f6a600eafdc08d620f5f
f0b97fc49950832323730d508911fa12bd098eca0670ccb3a18ada5af3a34699
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
f1e945400c04241ef089d71de3b0cf7e202431ac4685ada318714fe07ee9dcb0
f370d6bd05df8e6a5b671f06e038c4d85d95dc5446fdeb8f8762e817882a8322
f6bbd3540733be952a2921b2e4716d3b5190d5897510efcf9baa09649a1eaedf
f88f33a736ef0e7d27d78a7b2cdadb674ac192db9aede3a42c65ea1fd4386114
f91649026d2a05a646860a4be36a5388d5c78b4afc03f5ecd49adcad3c4449c3
fb6b1425ff73fe62d725a3981ac08d9f57e16e14d5ae321c617e21e1d7403d1f
fcc2e5c091392d65ffd3b0b8bd11a2d3fd8b0049903fa9b3b12ba64dd174f403
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
fd66d8dc41c06a99c3877934b3af8d38de72f3a94db252c0b9474bec35014491