116.203.91.64
{
"scan_id": 1740072570,
"ip": "116.203.91.64",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "116.203.0.0/17",
"postal_code": "90403",
"coordinates": {
"latitude": "49.4527",
"longitude": "11.0783"
},
"geo_point": "49.4527, 11.0783",
"locale_code": "en",
"continent": "Europe",
"country_code": "DE",
"country_name": "Germany",
"city": "Nuremberg"
},
"location_updated_at": "2025-02-19T16:40:05Z",
"asn": {
"number": "AS24940",
"organization": "Hetzner Online GmbH",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "116.202.0.0/15",
"organization": "Transferred to the RIPE region on 2018-08-28T00:42:30Z.",
"descr": "Transferred to the RIPE region on 2018-08-28T00:42:30Z.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:05:35Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-02-19T16:40:05Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-02-19T18:30:24Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-02-19T16:40:05Z"
}
],
"hostnames": [
{
"name": "static.64.91.203.116.clients.your-server.de",
"last_updated_at": "2025-02-21T10:08:55.483033895Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.6p1 Ubuntu 3ubuntu13.5",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.6p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.6p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.5",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"ext-info-s",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "43e2233e64640399d7d77ff2baf4c9daf275e89f53dd6427511195ef45d65bfe",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGD2wqu22pwtGsrPEi1h+rRsf12kYCwa/YTXOUDLWZQuUW0yZYGJlBUnyc1aZKARl2YJs7mp9tdcV0uv2iBQur4="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_9.6p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-51767",
"score": 7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-17T05:41:57.65Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.24.0 (Ubuntu)</center>\r\n</body>\r\n</html>\r\n",
"body_murmur": 1229986882,
"body_sha256": "766c1d6bcb81d3e983fb7adbc19c616d7fc01dafb7893738edc242e2adc59c07",
"component": [
"Nginx:1.24.0",
"Ubuntu"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Fri, 21 Feb 2025 09:08:13 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "116.203.91.64",
"path": "",
"scheme": "http"
}
},
"status_code": 404,
"title": "404 Not Found",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "http://116.203.91.64/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-21T09:08:14.148Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n\n<html>\n\n<head>\n <meta charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <title>Orthanc Explorer</title>\n\n <link rel=\"shortcut icon\" href=\"images/favicon.ico\">\n \n <link rel=\"stylesheet\" href=\"libs/jquery.mobile.min.css\" />\n <link rel=\"stylesheet\" href=\"libs/jqtree.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery.mobile.simpledialog.min.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/style.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/jquery.fileupload-ui.css\" />\n <link rel=\"stylesheet\" href=\"libs/slimbox2/slimbox2.css\" />\n\n <script src=\"libs/jquery.min.js\"></script>\n <script src=\"libs/jquery.mobile.min.js\"></script>\n <script src=\"libs/jqm.page.params.js\"></script>\n <script src=\"libs/tree.jquery.js\"></script>\n <script src=\"libs/date.js\"></script>\n <script src=\"libs/jquery.mobile.simpledialog2.js\"></script>\n <script src=\"libs/slimbox2.js\"></script>\n <script src=\"libs/jquery.blockui.js\"></script>\n\n <!-- https://github.com/blueimp/jQuery-File-Upload/wiki/Basic-plugin -->\n <script src=\"libs/jquery-file-upload/js/vendor/jquery.ui.widget.js\"></script>\n <script src=\"libs/jquery-file-upload/js/jquery.iframe-transport.js\"></script>\n <script src=\"libs/jquery-file-upload/js/jquery.fileupload.js\"></script>\n\n <link rel=\"stylesheet\" href=\"explorer.css\" />\n <script src=\"file-upload.js\"></script>\n <script src=\"explorer.js\"></script>\n <script src=\"query-retrieve.js\"></script>\n <script src=\"../plugins/explorer.js\"></script>\n</head>\n\n<body>\n <div data-role=\"page\" id=\"lookup\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Lookup studies</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div data-role=\"content\" id=\"content\" style=\"padding:0px\">\n <p align=\"center\">\n <a href=\"http://www.orthanc-server.com/\" target=\"_blank\" alt=\"Orthanc homepage\">\n <img src=\"orthanc-logo.png\" alt=\"Orthanc\" style=\"max-width:100%\" />\n </a>\n </p>\n </div>\n \n <form data-ajax=\"false\" id=\"lookup-form\">\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-patient-id\">Patient ID:</label>\n <input type=\"text\" name=\"lookup-patient-id\" id=\"lookup-patient-id\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-patient-name\">Patient Name:</label>\n <input type=\"text\" name=\"lookup-patient-name\" id=\"lookup-patient-name\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-accession-number\">Accession Number:</label>\n <input type=\"text\" name=\"lookup-accession-number\" id=\"lookup-accession-number\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-study-description\">Study Description:</label>\n <input type=\"text\" name=\"lookup-study-description\" id=\"lookup-study-description\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\" id=\"lookup-study-labels-div\">\n <label for=\"lookup-study-labels\">Labels:</label>\n <input type=\"text\" name=\"lookup-study-description\" id=\"lookup-study-labels\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-study-date\">Study Date:</label>\n <select name=\"lookup-study-date\" id=\"lookup-study-date\">\n </select>\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"lookup-study-date-specific\"></label>\n <input type=\"date\" name=\"lookup-study-date-specific\" id=\"lookup-study-date-specific\" />\n </div>\n\n <fieldset class=\"ui-grid-b\">\n <div class=\"ui-block-a\">\n <a href=\"#find-patients\" data-role=\"button\" data-theme=\"b\" data-direction=\"reverse\">All patients</a>\n </div>\n <div class=\"ui-block-b\">\n <a href=\"#find-studies\" data-role=\"button\" data-theme=\"b\" data-direction=\"reverse\">All studies</a>\n </div>\n <div class=\"ui-block-c\">\n <button id=\"lookup-submit\" type=\"submit\" data-theme=\"e\">Do lookup</button>\n </div>\n </fieldset>\n <div> </div>\n </form>\n <div id=\"lookup-result\">\n <div id=\"lookup-alert\">\n <div class=\"ui-bar ui-bar-e\">\n <h3>Warning:</h3> Your lookup led to many results!\n Showing only <span id=\"lookup-count\">?</span> studies to\n avoid performance issue. Please make your query more\n specific, then relaunch the lookup.\n </div>\n <div> </div>\n </div>\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"find-patients\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>All patients</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div id=\"alert-patients\">\n <div class=\"ui-bar ui-bar-e\">\n <h3>Warning:</h3> This is a large Orthanc server. Showing\n only <span id=\"count-patients\">?</span> patients to avoid\n performance issue. Make sure to use lookup if targeting\n specific patients!\n </div>\n <div> </div>\n </div>\n <ul id=\"all-patients\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"find-studies\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>All studies</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div id=\"alert-studies\">\n <div class=\"ui-bar ui-bar-e\">\n <h3>Warning:</h3> This is a large Orthanc server. Showing\n only <span id=\"count-studies\">?</span> studies to avoid\n performance issue. Make sure to use lookup if targeting\n specific studies!\n </div>\n <div> </div>\n </div>\n <ul id=\"all-studies\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"upload\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Upload DICOM files</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div>\n <!-- It's very difficult to style a \"file\" input so we\n actually hide it and create a \"proxy\" button that is\n forwarding its click to the \"file\" input -->\n <input id=\"fileupload\" type=\"file\" name=\"files[]\" data-url=\"../instances/\" style=\"display:none\" multiple>\n </div>\n <p>\n <ul data-role=\"listview\" data-inset=\"true\">\n <li id=\"fileupload-proxy\" onclick=\"$('#fileupload').click()\" data-icon=\"arrow-r\" data-theme=\"e\">\n <a href=\"#\">Select files to upload ...</a>\n </li>\n <li data-icon=\"arrow-r\" data-theme=\"e\"><a href=\"#\" id=\"upload-button\">Start the upload</a></li>\n <!--li data-icon=\"gear\" data-theme=\"e\"><a href=\"#\" id=\"upload-abort\" class=\"ui-disabled\">Abort the current upload</a></li-->\n <li data-icon=\"delete\" data-theme=\"d\"><a href=\"#\" id=\"upload-clear\">Clear the pending uploads</a></li>\n </ul>\n <div id=\"progress\" class=\"ui-corner-all\">\n <span class=\"bar ui-corner-all\"></span>\n <div class=\"label\"></div>\n </div>\n </p>\n <div class=\"ui-bar ui-bar-e\" id=\"issue-21-warning\">\n <h3>Warning:</h3> Orthanc issue #21: On Firefox, especially on\n Linux & OSX systems, files might be missing if using\n drag-and-drop. Please use the \"Select files to upload\" button\n instead, or use the command-line \"ImportDicomFiles.py\" script.\n </div>\n <ul id=\"upload-list\" data-role=\"listview\" data-inset=\"true\">\n <li data-role=\"list-divider\">Drag and drop DICOM files here</li>\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"patient\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Patient</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"patient-info\">\n </ul>\n <p>\n <div class=\"switch-container\">\n <select name=\"protection\" id=\"protection\" data-role=\"slider\">\n <option value=\"off\">Unprotected</option>\n <option value=\"on\">Protected</option>\n </select>\n </div>\n </p>\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"patient-delete\">Delete this patient</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"patient-store\">Send to remote modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"patient-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\" id=\"patient-access\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"patient-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"patient-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"patient-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"patient-media\">Download DICOMDIR</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"patient-archive-link\">Copy link to ZIP</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-studies\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"study\">\n <div data-role=\"header\">\n <h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> »\n Study\n </h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"study-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"study-delete\">Delete this study</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"study-store\">Send to DICOM modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"study-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\" id=\"study-access\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"study-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"study-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"study-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"study-media\">Download DICOMDIR</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"study-archive-link\">Copy link to ZIP</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-series\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"series\">\n <div data-role=\"header\">\n <h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> »\n <a href=\"#\" class=\"study-link\">Study</a> »\n Series\n </h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"series-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"series-delete\">Delete this series</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"series-store\">Send to DICOM modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"series-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\" id=\"series-access\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"series-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"series-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"search\"><a href=\"#\" id=\"series-preview\">Preview this series</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"series-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"series-media\">Download DICOMDIR</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"series-archive-link\">Copy link to ZIP</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-instances\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"instance\">\n <div data-role=\"header\">\n <h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> »\n <a href=\"#\" class=\"study-link\">Study</a> »\n <a href=\"#\" class=\"series-link\">Series</a> »\n Instance\n </h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"instance-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"instance-delete\">Delete this instance</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"instance-store\">Send to DICOM modality</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\" id=\"instance-access\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"instance-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"instance-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-dicom\">Download the DICOM file</a></li>\n <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-json\">Download the JSON file</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"instance-download-link\">Copy link to the DICOM file</a></li>\n <li data-icon=\"search\"><a href=\"#\" id=\"instance-preview\">Preview the instance</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <div class=\"ui-body ui-body-b\">\n <h1>DICOM Tags</h1>\n <p align=\"right\">\n <input type=\"checkbox\" id=\"show-tag-name\" checked=\"checked\" class=\"custom\" data-mini=\"true\" />\n <label for=\"show-tag-name\">Show tag description</label>\n </p>\n <h2>Meta header</h2>\n <div id=\"dicom-metaheader\"></div>\n <h2>Dataset</h2>\n <p align=\"right\" id=\"transfer-syntax\">\n <em>Transfer syntax: <span id=\"transfer-syntax-text\"></span></em>\n </p>\n <div id=\"dicom-tree\"></div>\n </div>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"plugins\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Plugins</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n </div>\n <div data-role=\"content\">\n <ul id=\"all-plugins\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"query-retrieve\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (1/4)</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n </div>\n <div data-role=\"content\">\n <form data-ajax=\"false\">\n <div data-role=\"fieldcontain\">\n <label for=\"qr-server\">DICOM server:</label>\n <select name=\"qr-server\" id=\"qr-server\">\n </select>\n </div>\n\n <div data-role=\"fieldcontain\" id=\"qr-fields\">\n <fieldset data-role=\"controlgroup\">\n <legend>Field of interest:</legend>\n <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-id\" value=\"PatientID\" checked=\"checked\" />\n <label for=\"qr-patient-id\">Patient ID</label>\n <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-name\" value=\"PatientName\" />\n <label for=\"qr-patient-name\">Patient Name</label>\n <input type=\"radio\" name=\"qr-field\" id=\"qr-accession-number\" value=\"AccessionNumber\" />\n <label for=\"qr-accession-number\">Accession Number</label>\n <input type=\"radio\" name=\"qr-field\" id=\"qr-study-description\" value=\"StudyDescription\" />\n <label for=\"qr-study-description\">Study Description</label>\n </fieldset>\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"qr-value\">Value for this field:</label>\n <input type=\"text\" name=\"qr-value\" id=\"qr-value\" value=\"\" />\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"qr-date\">Study date:</label>\n <select name=\"qr-date\" id=\"qr-date\">\n </select>\n </div>\n\n <div data-role=\"fieldcontain\">\n <label for=\"qr-date-specific\"></label>\n <input type=\"date\" name=\"qr-date-specific\" id=\"qr-date-specific\" />\n </div>\n\n <div data-role=\"fieldcontain\" id=\"qr-modalities\">\n <div data-role=\"fieldcontain\">\n <fieldset data-role=\"controlgroup\" data-type=\"horizontal\">\n <legend>Modalities:</legend>\n <input type=\"checkbox\" name=\"CR\" id=\"qr-cr\" class=\"custom\" /> <label for=\"qr-cr\">CR</label>\n <input type=\"checkbox\" name=\"CT\" id=\"qr-ct\" class=\"custom\" /> <label for=\"qr-ct\">CT</label>\n <input type=\"checkbox\" name=\"MR\" id=\"qr-mr\" class=\"custom\" /> <label for=\"qr-mr\">MR</label>\n <input type=\"checkbox\" name=\"NM\" id=\"qr-nm\" class=\"custom\" /> <label for=\"qr-nm\">NM</label>\n <input type=\"checkbox\" name=\"PT\" id=\"qr-pt\" class=\"custom\" /> <label for=\"qr-pt\">PT</label>\n <input type=\"checkbox\" name=\"US\" id=\"qr-us\" class=\"custom\" /> <label for=\"qr-us\">US</label>\n <input type=\"checkbox\" name=\"XA\" id=\"qr-xa\" class=\"custom\" /> <label for=\"qr-xa\">XA</label>\n <input type=\"checkbox\" name=\"DR\" id=\"qr-dr\" class=\"custom\" /> <label for=\"qr-dr\">DR</label>\n <input type=\"checkbox\" name=\"DX\" id=\"qr-dx\" class=\"custom\" /> <label for=\"qr-dx\">DX</label>\n <input type=\"checkbox\" name=\"MG\" id=\"qr-mg\" class=\"custom\" /> <label for=\"qr-mg\">MG</label>\n <input type=\"checkbox\" name=\"XC\" id=\"qr-xc\" class=\"custom\" /> <label for=\"qr-xc\">XC</label>\n </fieldset>\n </div>\n </div>\n\n <fieldset class=\"ui-grid-a\">\n <div class=\"ui-block-a\">\n <button id=\"qr-echo\" data-theme=\"a\">Test Echo</button>\n </div>\n <div class=\"ui-block-b\">\n <button id=\"qr-submit\" type=\"submit\" data-theme=\"b\">Search studies</button>\n </div>\n </fieldset>\n </form>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-2\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (2/4)</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n <div data-role=\"content\">\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\" data-split-icon=\"arrow-d\" data-split-theme=\"b\">\n </ul>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-3\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (3/4)</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n <div data-role=\"content\">\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-4\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (4/4)</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n\n <div data-role=\"content\">\n <form data-ajax=\"false\" id=\"retrieve-form\">\n <div data-role=\"fieldcontain\">\n <label for=\"retrieve-target\">Target AET:</label>\n <input type=\"text\" name=\"retrieve-target\" id=\"retrieve-target\"></input>\n </div>\n\n <fieldset class=\"ui-grid-b\">\n <div class=\"ui-block-a\"></div>\n <div class=\"ui-block-b\">\n <button id=\"retrieve-submit\" type=\"submit\" data-theme=\"b\">Retrieve</button>\n </div>\n <div class=\"ui-block-c\"></div>\n </fieldset>\n </form>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"jobs\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Jobs</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n </div>\n <div data-role=\"content\">\n <ul id=\"all-jobs\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"job\">\n <div data-role=\"header\">\n <h1><span class=\"orthanc-name\"></span>Job</h1>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-left\">\n <a href=\"#lookup\" data-icon=\"arrow-r\" data-role=\"button\" data-direction=\"reverse\">Lookup</a>\n <a href=\"#plugins\" data-icon=\"grid\" data-role=\"button\" data-direction=\"reverse\">Plugins</a>\n </div>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\">\n <a href=\"#jobs\" data-icon=\"refresh\" data-role=\"button\" data-direction=\"reverse\">Jobs</a>\n </div>\n </div>\n <div data-role=\"content\">\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\" id=\"job-info\">\n </ul>\n\n <fieldset class=\"ui-grid-b\">\n <div class=\"ui-block-a\"></div>\n <div class=\"ui-block-b\">\n <button id=\"job-cancel\" data-theme=\"b\">Cancel job</button>\n <button id=\"job-resubmit\" data-theme=\"b\">Resubmit job</button>\n <button id=\"job-pause\" data-theme=\"b\">Pause job</button>\n <button id=\"job-resume\" data-theme=\"b\">Resume job</button>\n </div>\n <div class=\"ui-block-c\"></div>\n </fieldset>\n </div>\n </div>\n\n <div id=\"peer-store\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Sending to Orthanc peer...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"dicom-store\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Sending to DICOM modality...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"info-retrieve\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Retrieving images from DICOM modality...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"dialog\" style=\"display:none\">\n </div>\n\n <div id=\"template-insecure\" style=\"display:none\">\n <div class=\"warning-insecure ui-body ui-body-e\">\n <h1>Insecure setup</h1>\n <p>\n Your Orthanc server is accepting remote connections, but is\n\tusing the default username and password, or has user\n\tauthentication explicitly turned off. Please carefully read\n\tyour logs and review your configuration, especially\n\toptions <tt>RemoteAccessAllowed</tt>, <tt>AuthenticationEnabled</tt>,\n\tand <tt>RegisteredUsers</tt>.\n </p>\n </div>\n </div>\n</body>\n\n</html>\n",
"body_murmur": -621179528,
"body_sha256": "c68119acc63075a2f0866ece0c0ecbc33a50e8b536d72b1ab8d34fcdd58121ef",
"component": [
"Nginx:1.24.0",
"Ubuntu"
],
"content_length": -1,
"favicon": {
"md5_hash": "6e028d7cc65a1430c68a581f8064e8e2",
"murmur_hash": -478834633,
"path": "https://116.203.91.64:443/favicon.ico",
"size": 4286
},
"headers": {
"access_control_allow_origin": [
"*"
],
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Thu, 20 Feb 2025 21:07:17 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
],
"unknown": [
{
"key": "access_control_allow_headers",
"value": [
"DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Token"
]
},
{
"key": "access_control_allow_methods",
"value": [
"GET, POST, OPTIONS"
]
},
{
"key": "access_control_expose_headers",
"value": [
"Content-Length,Content-Range"
]
}
],
"x_content_type_options": [
"nosniff"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"access_control_allow_origin": [
"*"
],
"connection": [
"keep-alive"
],
"content_length": [
"0"
],
"date": [
"Thu, 20 Feb 2025 21:07:17 GMT"
],
"location": [
"app/explorer.html"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
],
"unknown": [
{
"key": "access_control_allow_methods",
"value": [
"GET, POST, OPTIONS"
]
},
{
"key": "access_control_allow_headers",
"value": [
"DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Token"
]
},
{
"key": "access_control_expose_headers",
"value": [
"Content-Length,Content-Range"
]
}
],
"x_content_type_options": [
"nosniff"
]
},
"location": "app/explorer.html",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://116.203.91.64"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "116.203.91.64",
"path": "/app/explorer.html",
"scheme": "https"
}
},
"status_code": 200,
"title": "Orthanc Explorer",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://e5.i.lencr.org/"
],
"ocsp_urls": [
"http://e5.o.lencr.org"
]
},
"authority_key_id": "9f2b5fcf3c214f9d04b7ed2b2cc4c6708bd2d70d",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:\n D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50\n Timestamp : Jan 7 10:06:56.785 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:3F:DE:AA:FC:19:0F:06:CA:DC:7C:6C:5A:\n 41:74:3B:7B:2C:2C:9A:56:A5:20:D2:54:FB:21:BE:E2:\n 67:60:0D:D4:02:21:00:B5:26:0B:67:91:C1:18:BD:C0:\n 75:25:6C:EB:F4:C6:EF:F9:70:AB:88:F8:89:ED:98:B4:\n 9C:C5:0F:31:5D:50:1D\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:\n 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0\n Timestamp : Jan 7 10:06:56.802 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:28:2B:BB:21:ED:7A:8B:C3:5F:93:A3:D5:\n E9:29:87:B0:F1:59:DE:D5:27:1A:D6:A2:D9:F5:60:58:\n 6E:68:CF:7D:02:21:00:82:F9:FE:1D:34:57:2A:5D:5B:\n BD:5A:D4:AA:FE:A2:D5:8A:A5:95:07:8A:43:A6:71:3F:\n B4:FA:09:0E:00:76:69",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
},
"subject_alt_name": {
"dns_names": [
"pacs.nico-onco.avowiz.com"
]
},
"subject_key_id": "fc47bc3927068dadc66e527bbdf077f00f168258"
},
"fingerprint_md5": "649F989B29D5FBC70CC47E20B41528C2",
"fingerprint_sha1": "99F45CDE9CEC24672F8EAB8F7564E81F400D6703",
"fingerprint_sha256": "E77F500A9032899CFA1AE8FBAB2FC6314D68FC7B98F183814F8AA413BA77185B",
"issuer": {
"common_name": [
"E5"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=E5",
"jarm": "27d40d40d00040d00042d43d000000d2e61cae37a985f75ecafb81b33ca523",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-02-26T15:39:58",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "316869774402415975809615969225407945103405",
"signature": {
"algorithm": {
"name": "ecdsa-with-SHA384",
"oid": "1.2.840.10045.4.3.3"
},
"self_signed": false,
"value": "MzA2NDAyMzAwOTllNTNiNzBlZGYwZTEzMDcyOGUxZTc0YTU2OWEzZTA5NTk0ODJiZTFiOWQ5MWRjOTE5NDg2MWE1NTFkMTQ1YmQyZDc5NjY2ZDRlNzEyNTI1ZTBmODYyNzJhMTU3OWMwMjMwN2Y4NjY3NDI1NWM0OWFiZmRkMWUzODAxMDQyZjM2MTk4NDQzZTkwNTdhYzAzOGU3ZjNhYzAyYmEzYmNmNTU1ZGVlYzJhMDlhNWJhYzQ2N2Q5OWFjMjI2YjNiMmJhMTc1"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "e6d2316340778cc1104106d771b9cec1d240f6968486fbba87321dfd1e378e50",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502203fdeaafc190f06cadc7c6c5a41743b7b2c2c9a56a520d254fb21bee267600dd4022100b5260b6791c118bdc075256cebf4c6eff970ab88f889ed98b49cc50f315d501d"
},
"timestamp": "2025-01-07T10:06:56.785000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "ccfb0f6a85710965fe959b53cee9b27c22e9855c0d978db6a97e54c0fe4c0db0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450220282bbb21ed7a8bc35f93a3d5e92987b0f159ded5271ad6a2d9f560586e68cf7d02210082f9fe1d34572a5d5bbd5ad4aafea2d58aa595078a43a6713fb4fa090e007669"
},
"timestamp": "2025-01-07T10:06:56.802000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"pacs.nico-onco.avowiz.com"
]
},
"subject_alt_name": {
"dns_names": [
"pacs.nico-onco.avowiz.com"
],
"extended_dns_names": [
{
"domain": "avowiz",
"fld": "avowiz.com",
"subdomain": "pacs.nico-onco",
"tld": "com"
}
]
},
"subject_dn": "/CN=pacs.nico-onco.avowiz.com",
"subject_key_info": {
"_key": "ecdsa",
"dh": [],
"dsa": [],
"ecdsa": {
"b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
"curve": "p256",
"gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
"gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
"length": 256,
"p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
"x": "40494556579418647269047432807895483074118812629439539243825615119196780113780",
"y": "96162266888099688699188934470691672535049602999470646235507116665078210492143"
},
"fingerprint_sha256": "d147dccf1b381270d8034108ac79d72ff2d92583f947e34cfd69af9fc91dfcaa",
"key_algorithm": "Elliptic_curve_cryptography",
"rsa": []
},
"tbs_fingerprint": "81785ae128cc95acf4a7031400f7518b33915543a7054fff3828bf77f40ab4e1",
"tbs_noct_fingerprint": "fcaaf22d3119ccf108c8d967a18e1a84074a376cca4e7f0e44833cec8863005e",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-04-07T09:08:25",
"not_before": "2025-01-07T09:08:26"
},
"version": 2
},
"fingerprint_sha256": "E77F500A9032899CFA1AE8FBAB2FC6314D68FC7B98F183814F8AA413BA77185B",
"precert": false,
"raw": "MIIDkjCCAxmgAwIBAgISA6MyUrMESFe5O/c/YmwDtdgtMAoGCCqGSM49BAMDMDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJFNTAeFw0yNTAxMDcwOTA4MjZaFw0yNTA0MDcwOTA4MjVaMCQxIjAgBgNVBAMTGXBhY3Mubmljby1vbmNvLmF2b3dpei5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARZhxtXVl95u09frCKO3o7AQYks6EleO1ABKKbaWL4vdNSZ6g4NyO8YMDkfcxOykeIeodJAxBYpPjbffl8WWfbvo4ICGzCCAhcwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBT8R7w5JwaNrcZuUnu98HfwDxaCWDAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LXDTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAkBgNVHREEHTAbghlwYWNzLm5pY28tb25jby5hdm93aXouY29tMBMGA1UdIAQMMAowCAYGZ4EMAQIBMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYA5tIxY0B3jMEQQQbXcbnOwdJA9paEhvu6hzId/R43jlAAAAGUQDtREQAABAMARzBFAiA/3qr8GQ8Gytx8bFpBdDt7LCyaVqUg0lT7Ib7iZ2AN1AIhALUmC2eRwRi9wHUlbOv0xu/5cKuI+IntmLScxQ8xXVAdAHYAzPsPaoVxCWX+lZtTzumyfCLphVwNl422qX5UwP5MDbAAAAGUQDtRIgAABAMARzBFAiAoK7sh7XqLw1+To9XpKYew8Vne1Sca1qLZ9WBYbmjPfQIhAIL5/h00VypdW71a1Kr+otWKpZUHikOmcT+0+gkOAHZpMAoGCCqGSM49BAMDA2cAMGQCMAmeU7cO3w4TByjh50pWmj4JWUgr4bnZHckZSGGlUdFFvS15Zm1OcSUl4PhicqFXnAIwf4ZnQlXEmr/dHjgBBC82GYRD6QV6wDjn86wCujvPVV3uwqCaW6xGfZmsIms7K6F1",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "https://116.203.91.64/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-20T21:07:19.59Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "postgresql",
"version": "16.0 - 16.2",
"product": "PostgreSQL DB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postgresql:postgresql:16",
"part": "a",
"vendor": "postgresql",
"product": "postgresql",
"version": "16",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"postgres": {
"errors": [
{
"code": "0A000",
"file": "postmaster.c",
"line": "2145",
"message": "unsupported frontend protocol 255.255: server supports 3.0 to 3.0",
"routine": "ProcessStartupPacket",
"severity": "FATAL"
},
{
"code": "0A000",
"file": "postmaster.c",
"line": "2145",
"message": "unsupported frontend protocol 0.0: server supports 3.0 to 3.0",
"routine": "ProcessStartupPacket",
"severity": "FATAL"
},
{
"code": "0A000",
"file": "postmaster.c",
"line": "2145",
"message": "unsupported frontend protocol 0.0: server supports 3.0 to 3.0",
"routine": "ProcessStartupPacket",
"severity": "FATAL"
}
],
"is_ssl": true,
"supported_versions": "SFATAL\u0000VFATAL\u0000C0A000\u0000Munsupported frontend protocol 0.0: server supports 3.0 to 3.0\u0000Fpostmaster.c\u0000L2145\u0000RProcessStartupPacket"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"subject_alt_name": {
"dns_names": [
"avo-dicomloc-nico-onco"
]
},
"subject_key_id": "6dca7d0d16e866f7a738a20e9bf40298a83bff59"
},
"fingerprint_md5": "6C306700C3F343FE672E20A4442F4B1C",
"fingerprint_sha1": "CAC8FD265DDDB5F5351C1162CD02700F3EB558E2",
"fingerprint_sha256": "5027A8ED9E0ECDE8359B352A7F9DE6B4BAE2CB5260E0B14C5F16DFC6C99B0110",
"issuer": {
"common_name": [
"avo-dicomloc-nico-onco"
]
},
"issuer_dn": "/CN=avo-dicomloc-nico-onco",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "686608354780732626396806839030208010618768416707",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "MGI4YTIyNzUwNzQ4MjRlNTRiNjg2NzBhZmM4ZjQyNWExZDk4NjUyYWE3MWI3OTEzMDA4MDU5YzVlZGIzNzJkOWI5MTcwMTI4ZjEwNjZlYWU4YjYxNzVkNjAzZmMzNjUxYjEyYWRmYWRjNzU2NjU0ZGQ2Njc3NDJlOTk2YjA2ZTQxNWEwNmNjNjU5Zjk4YmRjNDU1Y2IwZWYwYTJmNzg3ZWNlOGU5YjA4YTM0MzA5ODE0YTVhNzA1ZjI4ZGNkZDQ2NDkyYmE3NzNkMzlkNGZkMDQyMDdiOGIwZmM1ODAzOWE4OGRjNTAyOTdmZjM3ODUzMTk5NDkxMzg4MmVhYjczMTFlMDI3YmIwMWU3ODVkZTQxNDJmNTRjYjQ3ZDAxYWYzMGE3N2Y0YzljYzY4Njc4ZGY1ODc4MmNkOTY0OTg4ZmMxOGE2ODJjMGRmZDFiYmQxZWY0NTYzNzFlNTRkZTNhY2I4ZmZlZmMzMTU1YTQ0MGU2M2RmZmU4Yjk4YzU0Mzg4MzU4NDQyZTEyM2ZlYjk3MGZkM2E2MjlhODdmZWVjNTFjY2U5ZjJmODgwMWY3MDIzMTE5OTc2MmYzYWJkZmRmYTE3Y2Y5YTk0ZDljNmJhNmU0YTE3NmFiMjgwZTExOWVjMzE3NjBiOWI1M2UzZjdhYjRiODAwM2Y2NDNkOWYxYmM="
},
"subject": {
"common_name": [
"avo-dicomloc-nico-onco"
]
},
"subject_alt_name": {
"dns_names": [
"avo-dicomloc-nico-onco"
],
"extended_dns_names": []
},
"subject_dn": "/CN=avo-dicomloc-nico-onco",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "83b79b7aead339b786ee0b43c08124cb79008ed1558ab39ff4ee1e0ae9b61d63",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "7107894976b75e43be44c4571c030fe812646226ee7a6273ac19ca1050bd2756",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2034-11-04T21:47:23",
"not_before": "2024-11-06T21:47:23"
},
"version": 2
},
"fingerprint_sha256": "5027A8ED9E0ECDE8359B352A7F9DE6B4BAE2CB5260E0B14C5F16DFC6C99B0110",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-21T03:11:13.657Z"
}
],
"services_hash": "535520ba0f4e6a9597337f02ef509de6e8a7a105e5a357b7f276506ebfaaa390",
"last_updated_at": "2025-02-21T09:08:14.148Z",
"banner": [
"postgres",
"tls",
"http",
"ssh"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"80/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"80/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"80/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}