URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-re...
Submission: On September 27 via api from US — Scanned from DE

Summary

This website contacted 13 IPs in 2 countries across 10 domains to perform 81 HTTP transactions. The main IP is 45.79.104.24, located in Fremont, United States and belongs to LINODE-AP Linode, LLC, US. The main domain is www.iicybersecurity.com.
TLS certificate: Issued by R3 on July 28th 2021. Valid for: 3 months.
This is the only time www.iicybersecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
53 45.79.104.24 63949 (LINODE-AP...)
1 142.250.185.74 15169 (GOOGLE)
1 142.250.184.232 15169 (GOOGLE)
1 142.250.181.234 15169 (GOOGLE)
4 142.250.186.164 15169 (GOOGLE)
7 172.217.23.99 15169 (GOOGLE)
4 142.250.186.99 15169 (GOOGLE)
2 142.250.185.174 15169 (GOOGLE)
1 13.107.42.14 8068 (MICROSOFT...)
1 157.240.236.15 32934 (FACEBOOK)
1 184.30.24.193 16625 (AKAMAI-AS)
1 142.250.186.78 15169 (GOOGLE)
81 13
Domain Requested by
52 www.iicybersecurity.com www.iicybersecurity.com
7 fonts.gstatic.com fonts.googleapis.com
www.google.com
4 www.gstatic.com www.google.com
www.gstatic.com
4 www.google.com www.iicybersecurity.com
www.gstatic.com
www.google.com
2 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
1 clients6.google.com www.iicybersecurity.com
1 api.pinterest.com www.iicybersecurity.com
1 graph.facebook.com www.iicybersecurity.com
1 www.linkedin.com www.iicybersecurity.com
1 maps.googleapis.com www.iicybersecurity.com
maps.googleapis.com
1 iicybersecurity.com www.iicybersecurity.com
1 www.googletagmanager.com www.iicybersecurity.com
1 fonts.googleapis.com www.iicybersecurity.com
0 urls.api.twitter.com Failed www.iicybersecurity.com
81 14
Subject Issuer Validity Valid
iicybersecurity.com
R3
2021-07-28 -
2021-10-26
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
*.google-analytics.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
www.google.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
*.google.com
GTS CA 1C3
2021-08-30 -
2021-11-22
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2021-07-18 -
2022-01-18
6 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2021-07-08 -
2021-10-06
3 months crt.sh
*.pinterest.com
DigiCert TLS RSA SHA256 2020 CA1
2021-07-26 -
2022-08-05
a year crt.sh

This page contains 2 frames:

Primary Page: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Frame ID: C5A5C1C12CAC4E6828E89866BD6F186F
Requests: 72 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Frame ID: 4E24681D03648A18AAFB5D84B0AFAEBD
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Critical authentication bypass vulnerability in Trend Micro ServerProtect allows unauthorized remote user to become Admin | IICS

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/
  • wp-embed\.min\.js\?ver=([\d.]+)

Overall confidence: 100%
Detected patterns
  • //maps\.google(?:apis)?\.com/maps/api/js

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • google-analytics\.com/(?:ga|urchin|analytics)\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • lightbox(?:-plus-jquery)?.{0,32}\.js

Overall confidence: 100%
Detected patterns
  • ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js


Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[\'"][^']+revslider[/\w-]+\.css\?ver=([0-9.]+)[\'"]
  • /revslider/[/\w-]+/js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • /recaptcha/api\.js

Page Statistics

81
Requests

95 %
HTTPS

0 %
IPv6

10
Domains

14
Subdomains

13
IPs

2
Countries

1267 kB
Transfer

3159 kB
Size

9
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

81 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
www.iicybersecurity.com/
58 KB
13 KB
Document
General
Full URL
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
cdbb3df8043701249fda2c8a23ba92f7f01ab62dc023f599ba8e5f853e6b4ac1

Request headers

Host
www.iicybersecurity.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Mon, 27 Sep 2021 16:14:00 GMT
Server
Apache/2.4.29 (Ubuntu)
X-Pingback
https://www.iicybersecurity.com/xmlrpc.php
Link
<https://www.iicybersecurity.com/?p=7010>; rel=shortlink
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
13002
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.iicybersecurity.com/eethychu/css/dist/block-library/
79 KB
11 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/eethychu/css/dist/block-library/style.min.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
9110fc122dda3067c424d9b8ff7747e2030b0bd9298f69a3683d399ad3373a6a

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"13abe-5c80bde4db1f2-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
10523
styles.css
www.iicybersecurity.com/pegnuksi/contact-form-7/includes/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/includes/css/styles.css?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
070edfef42e0980783d0acf8fa9ca6a9833b994eca13ffaa94e9a2deb47c92cf

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"a50-5c71133cbf8cd-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
932
cookie-law-info-public.css
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/cookie-law-info-public.css?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
b8fa20af264fcdd99621fc4e3a770927452b0fe382599e0d890a3bfa31152f80

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"c25-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
955
cookie-law-info-gdpr.css
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/
28 KB
5 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/css/cookie-law-info-gdpr.css?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
1523ddaa632d195a1240668fb5c6870519e3cdfeabd5a346141bcbb03222e2e7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7045-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4941
rs6.css
www.iicybersecurity.com/pegnuksi/revslider/public/assets/css/
59 KB
13 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/css/rs6.css?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
b86f3cdcccad303cb5300fab4d2774eafc3a2788f07ff1f3cd1953dd0debaa3f

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"ea95-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12635
css
fonts.googleapis.com/
22 KB
2 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.74 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f10.1e100.net
Software
ESF /
Resource Hash
18eb06d833f08634df8949c59e7ee975cdbd4b5e327a9466692d7182a61d613d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Mon, 27 Sep 2021 16:14:01 GMT
server
ESF
date
Mon, 27 Sep 2021 16:14:01 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Mon, 27 Sep 2021 16:14:01 GMT
libs.css
www.iicybersecurity.com/oacoaloo/assets/css/
250 KB
37 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
c714efc42fb4a67de94b848cb4880480375095305fd12f2e40d9a97e47f4378d

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3e73e-5ab70d268b416-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
38007
roneous-theme-styles.css
www.iicybersecurity.com/ethajaph/wp-less-cache/
233 KB
34 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/ethajaph/wp-less-cache/roneous-theme-styles.css?ver=1632759011
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
2c1c5a592257746b76d75527a9c53fe64cdfc0a62bf4e9fa455aef53d5b39614

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Sep 2021 16:10:11 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3a583-5ccfc54e5f153-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
34948
style.css
www.iicybersecurity.com/oacoaloo/
36 KB
8 KB
Stylesheet
General
Full URL
https://www.iicybersecurity.com/oacoaloo/style.css?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
960d73d1dbfaa48b13984fa02add3ef3675a3bb1375a6a9b5751adfd23569781

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"910c-5ab70d2685657-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
7516
jquery.min.js
www.iicybersecurity.com/eethychu/js/jquery/
87 KB
31 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
bd4de6a3fc0fb68d6f76ba7b93514b96a92e585c295b5351c31ad92a4b0777ea

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"15db1-5c80bde4e5dd2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
30908
jquery-migrate.min.js
www.iicybersecurity.com/eethychu/js/jquery/
11 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/jquery/jquery-migrate.min.js?ver=3.3.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
029e0a2e809fd6b5dbe76abe8b7a74936be306c9a8c27c814c4d44aa54623300

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 10 Dec 2020 00:41:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"2bd8-5b6116e091160-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4169
cookie-law-info-public.js
www.iicybersecurity.com/pegnuksi/cookie-law-info/public/js/
34 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.5
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7739eefcdee8afcb00fbe9a35cc795fff0cff7092b10d56c4190484d42892433

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 29 Jul 2021 08:32:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"8960-5c83ef10a9f06-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
8168
rbtools.min.js
www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/
117 KB
44 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/rbtools.min.js?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
9556bca5ad5eb24439887d7339fcb687088776bbaa995553aa489c9607cf9e19

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1d25a-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
45119
rs6.min.js
www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/
319 KB
82 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/revslider/public/assets/js/rs6.min.js?ver=6.2.22
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
60f59e08903c3d0b70e928af542ded081c10a790b6c198c7026788b77f4256ac

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:01 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 Sep 2020 22:30:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4fd58-5aed4e132f23a-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
js
www.googletagmanager.com/gtag/
97 KB
39 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-44744673-1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.184.232 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f8.1e100.net
Software
Google Tag Manager /
Resource Hash
0dcc1de03f5dd7a43e4d309d5b90c7a829c6372087dbf5dbbd5a72ad1328190e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:14:02 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
39335
x-xss-protection
0
last-modified
Mon, 27 Sep 2021 15:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Mon, 27 Sep 2021 16:14:02 GMT
logo.png
iicybersecurity.com/wp-content/uploads/2020/03/
5 KB
5 KB
Image
General
Full URL
https://iicybersecurity.com/wp-content/uploads/2020/03/logo.png
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0ab9dc77e667874d502a0b9ea66071de365d73057e950432b9b7fef7c4f2267e

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1387-5ab70d2978464"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4999
wp-emoji-release.min.js
www.iicybersecurity.com/eethychu/js/
18 KB
5 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/wp-emoji-release.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
def5de6254be138b8b35d680d1fdd8b07827d03b8626daebfeeb4157ec330ea7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4705-5c80bde4e1f52-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
4930
js
maps.googleapis.com/maps/api/
142 KB
47 KB
Script
General
Full URL
https://maps.googleapis.com/maps/api/js?key=AIzaSyDO53tF-CzzWUVAsojLzTPPXzF02UTVdf0&callback=initMap
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.181.234 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s56-in-f10.1e100.net
Software
mafe /
Resource Hash
fa44a10aa3bbc8c9eedd47b0455257296d72e6a158d40ac08b6884396632729a
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:14:02 GMT
content-encoding
gzip
vary
Accept-Language
server
mafe
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1800
cross-origin-resource-policy
cross-origin
server-timing
gfet4t7; dur=24
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
47425
x-xss-protection
0
expires
Mon, 27 Sep 2021 16:44:02 GMT
332.app.js
www.iicybersecurity.com/pegnuksi/click-to-chat-for-whatsapp/new/inc/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/click-to-chat-for-whatsapp/new/inc/assets/js/332.app.js?ver=3.4
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5064759a0360c16691dd45b9f71ffa942c37296d549f671dacd12eb97711e06c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Thu, 23 Sep 2021 20:32:47 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1131-5ccaf88aa9f75-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1531
regenerator-runtime.min.js
www.iicybersecurity.com/eethychu/js/dist/vendor/
6 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e87a1c5e24f9a7c7dcb437417f0b05b0a3c12947ce32d65c990c988a8b5ed4d7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1906-5c80bde4f28f2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
2398
wp-polyfill.min.js
www.iicybersecurity.com/eethychu/js/dist/vendor/
16 KB
6 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
293913879d30bab7499013e935009f5183facbddd63bfc9656a859622590b80b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 26 Jul 2021 19:36:23 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4056-5c80bde4f57d2-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6031
index.js
www.iicybersecurity.com/pegnuksi/contact-form-7/includes/js/
13 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/includes/js/index.js?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
eea0b9621509f98be77c5af1e9b5c952a675bda2b27c419876364017069e0c19

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"32bb-5c71133cbf8cd-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4071
api.js
www.google.com/recaptcha/
884 B
1019 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?render=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&ver=3.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.186.164 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s08-in-f4.1e100.net
Software
GSE /
Resource Hash
5e375155e6aed9bb32e8b86f7e52bec152d096f697765b83a2e1491b5ad3f0a7
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:14:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
585
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:14:02 GMT
index.js
www.iicybersecurity.com/pegnuksi/contact-form-7/modules/recaptcha/
2 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/contact-form-7/modules/recaptcha/index.js?ver=5.4.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ccdcf774bd0fc2383fb9d2b780148d17b2ceb3dbc355db13cc17edfdc1f511f3

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Jul 2021 08:33:00 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"739-5c71133cc086d-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
847
bootstrap.js
www.iicybersecurity.com/oacoaloo/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/bootstrap.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
89acc3906884f18f7de7794414158ba7681b88da7c9524b328e58505c80a287c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"8fce-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
9741
imagesloaded.min.js
www.iicybersecurity.com/eethychu/js/
5 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/imagesloaded.min.js?ver=4.1.4
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ff4bd34aa98a0214833619d3d751838db015722dfbbec15cd14dadc66cd67869

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Tue, 11 Aug 2020 21:22:52 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"15fd-5aca0ac7d5435-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
1834
masonry.min.js
www.iicybersecurity.com/eethychu/js/
24 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/masonry.min.js?ver=4.2.2
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e00add38134eac2fb8e8e9c09cbfff7bbe57952b210322eb2eecb0a21fc055eb

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Tue, 11 Aug 2020 21:22:52 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"5e4a-5aca0ac7d63d5-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
7382
jquery.equalheights.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
941 B
793 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.equalheights.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d82a3e63d5c360dc3e6af602df56cc4f7aee557bb74df4b21ceafdbd94d3106b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"3ad-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
444
jquery.smooth-scroll.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.smooth-scroll.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
a66d3e11ff45a67ab99c2d2660007aa5161df3a413e52ec0a686fafce8b23e46

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"dad-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
1481
owl.carousel.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
40 KB
11 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/owl.carousel.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e2992dc5aab651772418f2ec8c8ca41de86d50c4eb6a7afee08b51b6c7dcee17

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9ee5-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
10683
jquery.flexslider.min.js
www.iicybersecurity.com/pegnuksi/js_composer/assets/lib/flexslider/
30 KB
8 KB
Script
General
Full URL
https://www.iicybersecurity.com/pegnuksi/js_composer/assets/lib/flexslider/jquery.flexslider.min.js?ver=6.7.0
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
23cf1b7e88d0a1380682288aa82eb327f78221b2097868f45e11620b3c7a9b60

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Tue, 14 Sep 2021 18:32:27 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"77d6-5cbf8cdc26277-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
7374
jquery.social-share-counter.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
4 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.social-share-counter.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
1cdd566186e2e2c2e47e2326c41b9a5c5defbabbca9ed5d9314efa2ff4ac8da4

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"e39-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1157
flickrPhotoStream.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
862 B
863 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/flickrPhotoStream.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
317d8920b17ba0ce71276796cc066c8b6cd68f9c4cfe455d0d13517556aa34fa

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"35e-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
514
jquery.parallax.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.parallax.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d52085ad6f664ac587e6da61da45b73ea1f27525e217b25c8771ae5b260fa002

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"d86-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
1323
waypoint.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
8 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/waypoint.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
a0e3b40e1e73a113883274b72a3f81ba2315bd515973437f2f0e8c81433ed52c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1f5b-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
2594
jquery.counterup.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
1 KB
928 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.counterup.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e650648b3bc4f57300bf192a919da1194479dd069f4c4ed439a2605cb755a738

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"439-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
579
lightbox.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
8 KB
3 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/lightbox.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5dfae2b18d90cc17e4c8d5b2968f3375b9f8365f056022a59d3ec4f5cc74f0d2

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1e58-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
2365
jquery.mb.YTPlayer.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
32 KB
9 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.mb.YTPlayer.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
db98beb8c3fab7b72638342f3c30a3e41648d4cea10f0575660125f7f51009c4

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7ec4-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
8655
jquery.countdown.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
5 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.countdown.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
198ff864d1599605eaf550c5a0ae7fb0e0e4d7203d86cdcee7c48ef5e9c41a5b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"1262-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
2174
fluidvids.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
1 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/fluidvids.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
add71095551eac2fcc2a1a7fe3e341b7e33e01bbcabc8630bbff93d54bfa8db0

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"535-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
739
gmap3.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
25 KB
9 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/gmap3.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
79946018dbc2b6ae5a2c88aeb9361e364d933888f1522bf8e25ea78fbf6480aa

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"6293-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
8946
modernizr.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
3 KB
2 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/modernizr.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
cbf24261cc3548e1f2244975225fd004c8493c9166f8567520668af4b0a14b67

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"c02-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
1487
jquery.throttle.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
736 B
811 B
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jquery.throttle.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0942374c8462dbb3f61b544b75d8c9b00a238a8bcb6f255c3c9e46147a0673d2

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"2e0-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
462
jQuery.shuffle.min.js
www.iicybersecurity.com/oacoaloo/assets/js/lib/
10 KB
4 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/lib/jQuery.shuffle.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8b41881e704914f121b6eadd12e5b0da41541fabc933ebd93f5a86fd1ea3454e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"27c3-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
3814
scripts.js
www.iicybersecurity.com/oacoaloo/assets/js/
31 KB
6 KB
Script
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/js/scripts.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d9013df478068e0eba8d9e987b3899fe4fdd3ee33a247e1fbbd1e3f1c319872a

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7ad4-5ab70d268c3b6-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=91
Content-Length
6162
wp-embed.min.js
www.iicybersecurity.com/eethychu/js/
1 KB
1 KB
Script
General
Full URL
https://www.iicybersecurity.com/eethychu/js/wp-embed.min.js?ver=5.8.1
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
5be614bce53f767993a5f5f14a6badd6aae6bf3af7cbdbf4d31520de49e27991

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 04 Feb 2021 08:33:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"592-5ba7e8e3e40e0-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
765
hv-WlzNxIFoO84YdfUsTPA.woff2
fonts.gstatic.com/s/biryani/v6/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/biryani/v6/hv-WlzNxIFoO84YdfUsTPA.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
e36d75efe076b2a4b04828750686a3fdb68949057cfcb0dc28604308a01f2f30
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Thu, 23 Sep 2021 07:25:50 GMT
x-content-type-options
nosniff
age
377292
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14104
x-xss-protection
0
last-modified
Tue, 01 Sep 2020 04:54:41 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Fri, 23 Sep 2022 07:25:50 GMT
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v18/
19 KB
20 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v18/JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
2b26a74f3c0e529bc8fccfa6b1db8e083e738992266359fde1a5bd0aaa81cbc3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 22 Sep 2021 13:18:36 GMT
x-content-type-options
nosniff
age
442526
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19844
x-xss-protection
0
last-modified
Tue, 10 Aug 2021 00:20:10 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Thu, 22 Sep 2022 13:18:36 GMT
5aU69_a8oxmIdGl4BA.woff2
fonts.gstatic.com/s/hind/v11/
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU69_a8oxmIdGl4BA.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
d7a3280717b1f82f46bee459863720a03de43b16dc8097ba1b133440e5fe0edc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sun, 26 Sep 2021 20:46:00 GMT
x-content-type-options
nosniff
age
70082
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16264
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:03 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 26 Sep 2022 20:46:00 GMT
5aU19_a8oxmIfNJdERySjQ.woff2
fonts.gstatic.com/s/hind/v11/
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU19_a8oxmIfNJdERySjQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
e2f1a473a1649fe316dbddc5cf8f45c525d62b8373d1be395272864c0cf1e60f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 21 Sep 2021 08:58:30 GMT
x-content-type-options
nosniff
age
544532
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16268
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:02 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Sep 2022 08:58:30 GMT
themify.woff
www.iicybersecurity.com/oacoaloo/assets/fonts/
55 KB
55 KB
Font
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/fonts/themify.woff
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
0db5c5a1475eb7a3e5028983ea1e642d1b2c00faff6a250a37502b0f3832a4a7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://www.iicybersecurity.com
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Connection
keep-alive
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"db2c-5ab70d268c3b6"
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
56108
securitytesting.jpg
www.iicybersecurity.com/ethajaph/2020/09/
44 KB
44 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/09/securitytesting.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8095b1e12d6f13e06c23fe6338328405067b018c17abc8c65870f335fca8904e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Fri, 18 Sep 2020 19:11:08 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"b037-5af9b436120fc"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
45111
amdfeatured.jpg
www.iicybersecurity.com/ethajaph/2021/09/
22 KB
22 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/amdfeatured.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
166086cca30cbcba6f836f448729d121ad85c723984bf948efb4694a3f9ca3db

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Fri, 17 Sep 2021 21:21:33 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"58c6-5cc3783fffa75"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
22726
security.jpg
www.iicybersecurity.com/ethajaph/2020/08/
21 KB
21 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/08/security.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
45c14f0262696685f9dccedef8d781cd44dc3d6dc0fe401fe9bc5a840381d96b

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Wed, 19 Aug 2020 21:24:49 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"5215-5ad41a2373a7f"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
21013
securityjune2020.jpg
www.iicybersecurity.com/ethajaph/2020/08/
42 KB
42 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/08/securityjune2020.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
07317d1a9f27bdd457dbd86c288b1420af98fbebd17cd82a38eadcd1743e24c0

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:02 GMT
Last-Modified
Wed, 12 Aug 2020 23:04:14 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"a7bf-5acb634db58dc"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
42943
nitropro.jpg
www.iicybersecurity.com/ethajaph/2020/09/
20 KB
21 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2020/09/nitropro.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
50cf64cbf67db17697da4487d38cd90e75bf5a291b8b6622a53ea1e972a4f75f

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Last-Modified
Thu, 17 Sep 2020 21:01:24 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"51d8-5af88afd7b545"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
20952
cisco2021feat.jpg
www.iicybersecurity.com/ethajaph/2021/02/
20 KB
20 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/02/cisco2021feat.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ce46512c5890da6de4d03a7e9269875510a9b19df69c422fa1cc4347257d7166

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Last-Modified
Wed, 24 Feb 2021 23:32:34 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4e98-5bc1d731472e6"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=91
Content-Length
20120
jblfeatured.jpg
www.iicybersecurity.com/ethajaph/2021/09/
25 KB
26 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/jblfeatured.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
387edece1bc2828455e0ebe9361cff22e3e1bf41ced3f0dad05c2b66255aabd7

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Last-Modified
Tue, 07 Sep 2021 18:43:43 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"64f8-5cb6c25203b1a"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
25848
bluetoothfeat.jpg
www.iicybersecurity.com/ethajaph/2021/09/
29 KB
29 KB
Image
General
Full URL
https://www.iicybersecurity.com/ethajaph/2021/09/bluetoothfeat.jpg
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
4d42e3ff28ff44318c4108d98e46dc1fe7a9bb316e9a9814e3c2e5494fe72b23

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Last-Modified
Thu, 02 Sep 2021 18:05:21 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"724c-5cb0706b5700c"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=90
Content-Length
29260
recaptcha__de.js
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/
342 KB
134 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?render=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&ver=3.0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
b8c490e04a2be43d25df6263307477469d6ef82a318809f800bedda65c4803b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.iicybersecurity.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:02:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
698
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
136719
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:02:24 GMT
analytics.js
www.google-analytics.com/
48 KB
20 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-44744673-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.174 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
fd222137f245c06ddb4c4d44db41f12138dad6cf8ef5d4d4a5e500f38f0c8c62
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 11 Aug 2021 00:32:57 GMT
server
Golfe2
age
5225
date
Mon, 27 Sep 2021 14:46:57 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19747
expires
Mon, 27 Sep 2021 16:46:57 GMT
collect
www.google-analytics.com/j/
1 B
212 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=1603310855&t=pageview&_s=1&dl=https%3A%2F%2Fwww.iicybersecurity.com%2Fcritical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&ul=en-us&de=UTF-8&dt=Critical%20authentication%20bypass%20vulnerability%20in%20Trend%20Micro%20ServerProtect%20allows%20unauthorized%20remote%20user%20to%20become%20Admin%20%7C%20IICS&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAUABAAAAAC~&jid=271245208&gjid=1169014292&cid=1449899521.1632759243&tid=UA-44744673-1&_gid=172339318.1632759243&_r=1&gtm=2ou9m0&z=1841990104
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.174 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.iicybersecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 27 Sep 2021 16:14:02 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.iicybersecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
anchor
www.google.com/recaptcha/api2/ Frame 4E24
39 KB
20 KB
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.164 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s08-in-f4.1e100.net
Software
GSE /
Resource Hash
4cfd3fc67db685582719c62aafbf2a29ae3c296bd077b96909cb17a324fddc4a
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-J3dhtGWHH09rqzkOr21qgg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.iicybersecurity.com/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy-report-only
require-corp; report-to="recaptcha"
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Mon, 27 Sep 2021 16:14:03 GMT
content-security-policy
script-src 'report-sample' 'nonce-J3dhtGWHH09rqzkOr21qgg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
20180
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
5aU19_a8oxmIfMJaERySjQ.woff2
fonts.gstatic.com/s/hind/v11/
15 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v11/5aU19_a8oxmIfMJaERySjQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Hind%3A400%2C100%2C300%2C400%2C600%2C700%7CMontserrat%3A400%2C100%2C300%2C400%2C600%2C700%7CBiryani%3A800%2C100%2C300%2C400%2C600%2C700%7COpen+Sans%3A300%2C400&subset=latin%2Clatin-ext&ver=5.8.1
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
47ee68145b529d601247e82604b9c3de7a0b44a0e1d95d9470424271994f548e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sun, 26 Sep 2021 17:38:56 GMT
x-content-type-options
nosniff
age
81307
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15848
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 17:04:04 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 26 Sep 2022 17:38:56 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36007998902852751324_1632759241976&_=1632759241977
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
13.107.42.14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

count.json
urls.api.twitter.com/1/urls/
0
0

/
graph.facebook.com/
250 B
681 B
Script
General
Full URL
https://graph.facebook.com/?id=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html/&callback=jQuery36007998902852751324_1632759241980&_=1632759241981
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
157.240.236.15 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
edge-star-shv-02-frx5.facebook.com
Software
/
Resource Hash
79efbf2424c0c9aec37bd054d12ee4b8c192d650381dff851b3458e75832ee14
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
www-authenticate
OAuth "Facebook Platform" "invalid_request" "(#2) Service temporarily unavailable"
x-fb-rev
1004458260
alt-svc
h3=":443"; ma=3600, h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
190
x-fb-rlafr
0
pragma
no-cache
x-fb-debug
XpvxLtHPvU2QbOhxuYf1Yvw99XRlC7I9zLIFF9PSomb6Ihg9ZpsMTkgzFvBig9fzH0u2n7aWlc8Dw4U+kQgi0Q==
x-fb-trace-id
DAiSZqej8Ik
date
Mon, 27 Sep 2021 16:14:03 GMT
vary
Origin, Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
AkpbnPurlfkxFA1mBcKS8cf
cache-control
no-store
facebook-api-version
v4.0
priority
u=3,i
expires
Sat, 01 Jan 2000 00:00:00 GMT
count.json
api.pinterest.com/v1/urls/
220 B
514 B
Script
General
Full URL
https://api.pinterest.com/v1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36007998902852751324_1632759241982&_=1632759241983
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/eethychu/js/jquery/jquery.min.js?ver=3.6.0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.193 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-193.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
792263a46e268f6d733fd86d5d4d3d871e535e6572720682cc164a6b138912f4
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:14:03 GMT
x-content-type-options
nosniff
x-cdn
akamai
akamai-grn
0.ad247e68.1632759243.65aa95fa
content-type
application/javascript
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
x-envoy-upstream-service-time
2
x-pinterest-rid
1823968972276191
content-length
220
expires
Mon, 27 Sep 2021 16:29:03 GMT
rpc
clients6.google.com/
0
0

rpc
clients6.google.com/ Frame
0
0
Preflight
General
Full URL
https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ
Protocol
H2
Server
142.250.186.78 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s05-in-f14.1e100.net
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type
Origin
https://www.iicybersecurity.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=UTF-8
referrer-policy
no-referrer
content-length
1564
date
Mon, 27 Sep 2021 16:14:03 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
loading.gif
www.iicybersecurity.com/oacoaloo/assets/img/lightbox/
2 KB
3 KB
Image
General
Full URL
https://www.iicybersecurity.com/oacoaloo/assets/img/lightbox/loading.gif
Requested by
Host: www.iicybersecurity.com
URL: https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.104.24 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
li1203-24.members.linode.com
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
ccd39b8ba77b46e92151135ac4749d1fa2e03fb5bc30b475c9ca11b8c95ef64e

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
www.iicybersecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
Cookie
_ga=GA1.2.1449899521.1632759243; _gid=GA1.2.172339318.1632759243; _gat_gtag_UA_44744673_1=1; cookielawinfo-checkbox-necessary=yes; cookielawinfo-checkbox-non-necessary=no
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://www.iicybersecurity.com/oacoaloo/assets/css/libs.css?ver=5.8.1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 27 Sep 2021 16:14:03 GMT
Last-Modified
Mon, 27 Jul 2020 18:52:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9f1-5ab70d268c3b6"
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
2545
styles__ltr.css
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/ Frame 4E24
52 KB
52 KB
Stylesheet
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
5fe20047c1cc1be61a786d56c5c02b96453b9c60656d6c8429a1add79017e47f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:11:05 GMT
x-content-type-options
nosniff
age
178
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
52867
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/css
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:11:05 GMT
recaptcha__de.js
www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/ Frame 4E24
342 KB
134 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
b8c490e04a2be43d25df6263307477469d6ef82a318809f800bedda65c4803b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:02:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
699
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
136719
x-xss-protection
0
last-modified
Sun, 12 Sep 2021 18:01:17 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="recaptcha"
expires
Tue, 27 Sep 2022 16:02:24 GMT
logo_48.png
www.gstatic.com/recaptcha/api2/ Frame 4E24
2 KB
2 KB
Image
General
Full URL
https://www.gstatic.com/recaptcha/api2/logo_48.png
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
1b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 10:54:05 GMT
x-content-type-options
nosniff
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
age
19198
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/recaptcha
content-type
image/png
cache-control
public, max-age=604800
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2228
x-xss-protection
0
expires
Mon, 04 Oct 2021 10:54:05 GMT
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v18/ Frame 4E24
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
3e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.google.com/
Origin
https://www.google.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 21 Sep 2021 09:07:47 GMT
x-content-type-options
nosniff
age
543976
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15344
x-xss-protection
0
last-modified
Mon, 16 Oct 2017 17:32:55 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Sep 2022 09:07:47 GMT
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v18/ Frame 4E24
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.23.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s45-in-f3.1e100.net
Software
sffe /
Resource Hash
5a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.google.com/
Origin
https://www.google.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 10:50:25 GMT
x-content-type-options
nosniff
age
19418
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15552
x-xss-protection
0
last-modified
Mon, 16 Oct 2017 17:33:02 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Tue, 27 Sep 2022 10:50:25 GMT
webworker.js
www.google.com/recaptcha/api2/ Frame 4E24
102 B
134 B
Other
General
Full URL
https://www.google.com/recaptcha/api2/webworker.js?hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.164 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s08-in-f4.1e100.net
Software
GSE /
Resource Hash
392ed442867566d8cbd08f7e0d9a379c49177a9c96186ad0d1eba1a316721267
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Mon, 27 Sep 2021 16:14:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
cross-origin-embedder-policy-report-only
require-corp; report-to="recaptcha"
x-frame-options
SAMEORIGIN
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
112
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:14:03 GMT
reload
www.google.com/recaptcha/api2/ Frame 4E24
29 KB
16 KB
XHR
General
Full URL
https://www.google.com/recaptcha/api2/reload?k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__de.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.164 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s08-in-f4.1e100.net
Software
GSE /
Resource Hash
797dacd2b256647c6837c7432bbe3a671ac4bc4d440bfed420215e968f8148e2
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfKO7gZAAAAAFuwQxV9x-CmwPRnipZB4Itt7y1_&co=aHR0cHM6Ly93d3cuaWljeWJlcnNlY3VyaXR5LmNvbTo0NDM.&hl=de&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=n9jm0gixk9kd
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
application/x-protobuffer

Response headers

date
Mon, 27 Sep 2021 16:14:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
application/json; charset=utf-8
cache-control
private, max-age=0
content-security-policy
frame-ancestors 'self'
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16356
x-xss-protection
1; mode=block
expires
Mon, 27 Sep 2021 16:14:03 GMT
common.js
maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/
0
0

util.js
maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
urls.api.twitter.com
URL
https://urls.api.twitter.com/1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36007998902852751324_1632759241978&_=1632759241979
Domain
clients6.google.com
URL
https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ
Domain
maps.googleapis.com
URL
https://maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/common.js
Domain
maps.googleapis.com
URL
https://maps.googleapis.com/maps-api-v3/api/js/46/6/intl/de_ALL/util.js

Verdicts & Comments Add Verdict or Comment

74 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| onbeforexrselect boolean| originAgentCluster object| _wpemojiSettings undefined| $ function| jQuery object| Cli_Data object| cli_cookiebar_settings object| log_object object| CLI_Cookie object| CLI object| cliBlocker string| CLI_ACCEPT_COOKIE_NAME string| CLI_PREFERNCE_COOKIE number| CLI_ACCEPT_COOKIE_EXPIRE boolean| CLI_COOKIEBAR_AS_POPUP object| gsapVersions object| tpGS object| punchgs object| RSANYID object| RSANYID_sliderID function| gtag object| dataLayer function| setREVStartSize function| initMap object| ht_ctc_chat_var object| runtime object| regeneratorRuntime function| setImmediate function| clearImmediate object| wpcf7 object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client object| wpcf7_recaptcha function| EvEmitter function| imagesLoaded object| google_tag_manager object| google_tag_data string| GoogleAnalyticsObject function| ga object| google object| module$exports$mapsapi$util$event object| module$contents$mapsapi$overlay$overlayView_OverlayView object| gaplugins object| gaGlobal object| gaData object| recaptcha function| jQueryBridget function| getSize function| matchesSelector object| fizzyUIUtils function| Outlayer function| Masonry object| jsparallax function| jsparallax_init function| onYouTubePlayerAPIReady object| ytp object| fluidvids object| Modernizr object| wp_data object| wp object| closure_lm_407316 string| currentText string| categoryCookie object| categoryCookieValue object| cli_chkbox_elm string| cli_chkbox_data_id string| cli_chkbox_data_id_trimmed function| addWheelListener string| selector object| twemoji

9 Cookies

Domain/Path Name / Value
www.google.com/recaptcha Name: _GRECAPTCHA
Value: 09AH-MKGXUFvdJGBAWRP5N4qsWZEZH_cV8jmQqcT8gPdEhjM-fLpVIEjx5PclaOJohv9NGHX4It6Z-46hbVPU2E1A
.iicybersecurity.com/ Name: _ga
Value: GA1.2.1449899521.1632759243
.iicybersecurity.com/ Name: _gid
Value: GA1.2.172339318.1632759243
.iicybersecurity.com/ Name: _gat_gtag_UA_44744673_1
Value: 1
www.iicybersecurity.com/ Name: cookielawinfo-checkbox-necessary
Value: yes
www.iicybersecurity.com/ Name: cookielawinfo-checkbox-non-necessary
Value: no
.linkedin.com/ Name: bcookie
Value: "v=2&af47c806-0e19-40be-8d61-5ada3b2ac023"
.www.linkedin.com/ Name: bscookie
Value: "v=1&202109271614035d745dad-3b19-48fe-8e0e-acabb911d058AQHtqLw35sPp7W-nqn-1PpO1_xEvweDF"
.linkedin.com/ Name: lidc
Value: "b=TGST03:s=T:r=T:a=T:p=T:g=2566:u=1:x=1:i=1632759243:t=1632845643:v=2:sig=AQGehlMwo4sPCA1_6MBbxxM_Eo9YIasr"

4 Console Messages

Source Level URL
Text
network error URL: https://urls.api.twitter.com/1/urls/count.json?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36007998902852751324_1632759241978&_=1632759241979
Message:
Failed to load resource: net::ERR_NAME_NOT_RESOLVED
javascript error URL: https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html
Message:
Access to XMLHttpRequest at 'https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ' from origin 'https://www.iicybersecurity.com' has been blocked by CORS policy: Response to preflight request doesn't pass access control check: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://clients6.google.com/rpc?key=AIzaSyCKSbrvQasunBoV16zDH9R33D88CeLr9gQ
Message:
Failed to load resource: net::ERR_FAILED
network error URL: https://www.linkedin.com/countserv/count/share?url=https://www.iicybersecurity.com/critical-authentication-bypass-vulnerability-in-trend-micro-serverprotect-allows-unauthorized-remote-user-to-become-admin.html&callback=jQuery36007998902852751324_1632759241976&_=1632759241977
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api.pinterest.com
clients6.google.com
fonts.googleapis.com
fonts.gstatic.com
graph.facebook.com
iicybersecurity.com
maps.googleapis.com
urls.api.twitter.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.gstatic.com
www.iicybersecurity.com
www.linkedin.com
clients6.google.com
maps.googleapis.com
urls.api.twitter.com
13.107.42.14
142.250.181.234
142.250.184.232
142.250.185.174
142.250.185.74
142.250.186.164
142.250.186.78
142.250.186.99
157.240.236.15
172.217.23.99
184.30.24.193
45.79.104.24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