118.70.133.137
{
"scan_id": 1757178654,
"ip": "118.70.133.137",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "118.70.132.0/23",
"postal_code": "100000",
"coordinates": {
"latitude": "21.0184",
"longitude": "105.8461"
},
"geo_point": "21.0184, 105.8461",
"locale_code": "en",
"continent": "Asia",
"country_code": "VN",
"country_name": "Vietnam",
"city": "Hanoi"
},
"location_updated_at": "2025-09-08T00:39:36Z",
"asn": {
"number": "AS18403",
"organization": "FPT Telecom Company",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "118.70.133.0/24",
"organization": "Vietnam Internet Network Information Center (VNNIC)",
"descr": "Vietnam Internet Network Information Center (VNNIC),\n18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam,\n10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:04Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-09-08T00:39:36Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-09-08T02:03:25Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-09-08T00:39:36Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
"body_murmur": 1637199859,
"body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
"component": [
"Ubuntu",
"Nginx:1.24.0"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Sep 2025 18:54:15 GMT"
],
"etag": [
"W/\"66b20ad6-267\""
],
"last_modified": [
"Tue, 06 Aug 2024 11:36:54 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "118.70.133.137",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to nginx!",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "http://118.70.133.137/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-02T18:54:16.333Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n\n<head>\n <meta charset=\"utf-8\">\n <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n <meta name=\"robots\" content=\"noindex, nofollow\">\n\n <meta name=\"viewport\" content=\"width=device-width,initial-scale=1\"/>\n <title>Login to IEM</title>\n <link rel=\"icon\" href=\"/auth/resources/nasof/login/custom/img/favicon.ico\" />\n <link href=\"/auth/resources/nasof/login/custom/css/styles.css\" rel=\"stylesheet\" />\n <link href=\"/auth/resources/nasof/login/custom/css/ix-icons.css\" rel=\"stylesheet\" />\n <script src=\"/auth/resources/nasof/login/custom/js/show-hide-password.js\" type=\"text/javascript\"></script>\n <script type=\"module\" src=\"/osbar/iema-os-bar/iema-os-bar.esm.js\"></script>\n <link rel=\"stylesheet\" href=\"/osbar/iema-os-bar/iema-os-bar.css\"/>\n</head>\n\n<body class=\"difads theme-brand-light\">\n <iema-os-bar app-info=\"/auth/resources/nasof/login/custom/assets/app-info.json\" language=\"en\"></iema-os-bar>\n <div class=\"wrapper\"> \n <div class=\"layout\">\n <div class=\"layout__left\">\n <div class=\"layout__leftContainer\">\n <header>\n <p class=\"font--xxlarge font--bold\" id=\"kc-page-title\"> We are sorry...\n</p>\n </header>\n <div id=\"kc-content\">\n <div id=\"kc-content-wrapper\">\n\n <div class=\"systemmessage systemmessage--error\">\n <h1 class=\"systemmessage__title\"></h1>\n <div class=\"systemmessage__content\"><p>Invalid parameter: redirect_uri</p></div>\n </div>\n\n\n\n </div>\n </div>\n </div>\n </div>\n\n <div class=\"layout__right\">\n </div>\n </div>\n </div>\n</body>\n</html>\n",
"body_murmur": -1001983392,
"body_sha256": "f8f1d42b83874e8390ea2a035cfed93f81de012c4ebf011061edd83da8421888",
"component": [
"Ubuntu",
"Nginx:1.24.0"
],
"content_length": 1852,
"favicon": {
"md5_hash": "a586e37636a42008eedc8c6c17c534ad",
"murmur_hash": 261439797,
"path": "https://edge.swoc.pisa.vn:443/auth/resources/nasof/login/custom/img/favicon.ico",
"size": 4286
},
"headers": {
"connection": [
"keep-alive"
],
"content_language": [
"en"
],
"content_length": [
"1852"
],
"content_security_policy": [
"default-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; font-src 'self' data:; frame-ancestors 'self';"
],
"content_type": [
"text/html;charset=utf-8"
],
"date": [
"Tue, 09 Sep 2025 02:59:52 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
],
"set_cookie": [
"KC_STATE_CHECKER=eyJhbGciOiJIUzUxMiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlYjc1NDJiNC0yYmJmLTRhZGMtYWNhYy0xMzliZjFlNzE1YTkifQ.eyJta3kiOiJpbnZhbGlkUGFyYW1ldGVyTWVzc2FnZSIsIm10eSI6IkVSUk9SIiwibXBhciI6WyJyZWRpcmVjdF91cmkiXSwic3RhdCI6NDAwLCJjbGlkIjoiYmJmYzhkMGEtNTA1OS00MjdhLWE2N2UtZDI5MTcwOWJlNDE1Iiwic3QyIjoiYWRjNmRmZTAtZTY3Zi00NzAwLWExYmYtM2E5MGM5YTZmZjJlIn0.fE-r_9g94JVeVYSehLaPje9J0BUnvLy-135GStcU83XmPKbDwJOON9gZO-EQrRAKBuQDQRcIQsZqzDcqthAcdA;Version=1;Path=/auth/realms/customer/;Max-Age=300;HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"no-referrer"
]
},
{
"key": "x_robots_tag",
"value": [
"none"
]
}
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html>\r\n<head><title>302 Found</title></head>\r\n<body>\r\n<center><h1>302 Found</h1></center>\r\n</body>\r\n</html>\r\n",
"body_murmur": -9616316,
"body_sha256": "075f0fd7eeb4bfec31816d61be72b064d4899853b224bd5f380041d7dd0b1d19",
"content_length": 110,
"headers": {
"cache_control": [
"no-cache, no-store, max-age=0"
],
"connection": [
"keep-alive"
],
"content_length": [
"110"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 09 Sep 2025 02:59:50 GMT"
],
"location": [
"https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?client_id=ie-management&scope=openid&nonce=efdee43eb65642d3adce501ecd94dec5&response_type=code&state=25fee5859238e2005664f639babfce47&redirect_uri=https%3A%2F%2F192.168.4.24%2Fcb"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
],
"set_cookie": [
"session=52QvvcnPWR0alWlbN4vf5w|1757390390|YoYI1Vl4MyPcH-k5Bz-uGQnAxRalDeguNbOvm4ypvZfqhf0ZXJ54s0lgg1npBijgVP9h4jqjv7iyIvcCQWyEfdHv_KA-cpdjp1hfgNoqTmcqO9Du2hwnmgwhGykAmwZlL9yeIzIHM6SZkCGaPwGjjfJa5Wap6vDMQ1tG4xXcpBi4A4HmES-M8SaDk3rikYpL|dk99F1LS2ejKVo_Nb936R8D9cZg; Path=/; SameSite=Lax; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"strict-origin"
]
}
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"location": "https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?client_id=ie-management&scope=openid&nonce=efdee43eb65642d3adce501ecd94dec5&response_type=code&state=25fee5859238e2005664f639babfce47&redirect_uri=https%3A%2F%2F192.168.4.24%2Fcb",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Moved Temporarily"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://118.70.133.137"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "edge.swoc.pisa.vn",
"path": "/auth/realms/customer/protocol/openid-connect/auth",
"raw_query": "client_id=ie-management&scope=openid&nonce=efdee43eb65642d3adce501ecd94dec5&response_type=code&state=25fee5859238e2005664f639babfce47&redirect_uri=https%3A%2F%2F192.168.4.24%2Fcb",
"scheme": "https"
}
},
"status_code": 400,
"title": "Login to IEM"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://e8.i.lencr.org/"
]
},
"authority_key_id": "8f0d13a2f62e7ed1506c3318385d598e237291ca",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://e8.c.lencr.org/98.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:\n 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0\n Timestamp : Sep 1 05:43:52.009 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:61:CF:63:E4:E0:6C:CB:B3:18:67:30:36:\n F9:F7:93:73:38:85:56:5A:8A:1B:4E:E5:4A:8E:2F:51:\n 90:02:D3:33:02:20:0A:C6:E9:E7:C6:76:06:6F:5C:3B:\n 76:A8:B0:9B:69:6F:40:D5:E6:D1:53:EF:46:07:08:C1:\n 33:1C:08:D4:B5:25\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:\n 67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D\n Timestamp : Sep 1 05:43:52.065 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:C8:A0:A7:03:46:19:4F:AA:96:B9:CE:\n 1C:FD:C5:45:23:A0:F7:BE:38:5A:6D:7C:4B:59:F0:FE:\n B0:64:EC:C8:5B:02:21:00:D4:F4:74:49:46:7F:47:7E:\n 23:CD:9B:60:E2:D8:B1:3C:C2:6D:F3:2A:93:59:14:79:\n E7:28:A2:59:E0:B4:18:68",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
},
"subject_alt_name": {
"dns_names": [
"edge.swoc.pisa.vn"
]
},
"subject_key_id": "65d3784522eb6a039fc57960f691b0ed06a15f9b"
},
"fingerprint_md5": "18E532FC945580777C6F7E38E761C258",
"fingerprint_sha1": "9971968615D7B553B47C1EDB571D3AA677AC3FC6",
"fingerprint_sha256": "C4B0F8E46F3E6B2B2E09A7A4FE8EF53C08AA27F2FA54A11306F5BB1C7A65384F",
"issuer": {
"common_name": [
"E8"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=E8",
"jarm": "27d40d40d00040d00042d43d000000d2e61cae37a985f75ecafb81b33ca523",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-09-18T02:26:51",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "491803521087957609163888028027658714022497",
"signature": {
"algorithm": {
"name": "ecdsa-with-SHA384",
"oid": "1.2.840.10045.4.3.3"
},
"self_signed": false,
"value": "MzA2NjAyMzEwMGEzMzc2MDE2NzA3M2E3MzhjYmM1OGVmMTBlODIzMTJmYmJlNzEwNzliYmMyZTA5OTQ4OWEzZDQ5YjBkYzUyZmE3MzZjZjZkMDdmN2M2YTUyMWZmMzg4YzNlNTEyNjAzODAyMzEwMGUwZDdhY2UzNDY2Y2VkOWY4ZWNhYmUyOTMyNGY4MTBkNTExNDI5ZjBhZGQ3ODg1MDE5ZjY0NTE4ZjRmOGRkMGJhMmQ0ZGUzNWFhNDNiMTI4NGM3NTk4ODM4Njg2ZDA1Mg=="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "ccfb0f6a85710965fe959b53cee9b27c22e9855c0d978db6a97e54c0fe4c0db0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3044022061cf63e4e06ccbb318673036f9f793733885565a8a1b4ee54a8e2f519002d33302200ac6e9e7c676066f5c3b76a8b09b696f40d5e6d153ef460708c1331c08d4b525"
},
"timestamp": "2025-09-01T05:43:52.009000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1a04ff49d0541d40aff6a0c3bff1d8c4672f4eecee234068986b17402edc897d",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100c8a0a70346194faa96b9ce1cfdc54523a0f7be385a6d7c4b59f0feb064ecc85b022100d4f47449467f477e23cd9b60e2d8b13cc26df32a93591479e728a259e0b41868"
},
"timestamp": "2025-09-01T05:43:52.065000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"edge.swoc.pisa.vn"
]
},
"subject_alt_name": {
"dns_names": [
"edge.swoc.pisa.vn"
],
"extended_dns_names": [
{
"domain": "pisa",
"fld": "pisa.vn",
"subdomain": "edge.swoc",
"tld": "vn"
}
]
},
"subject_dn": "/CN=edge.swoc.pisa.vn",
"subject_key_info": {
"_key": "ecdsa",
"dh": [],
"dsa": [],
"ecdsa": {
"b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
"curve": "p256",
"gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
"gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
"length": 256,
"p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
"x": "69483276032870540470528526393841310823860220087597244766247445577957967762340",
"y": "86858322649393473260439796834413534883729216107908667537448299514824091241016"
},
"fingerprint_sha256": "dd0225b7593e76b2b9c4a1bd82dc11290f8fd328213f3b61c188c0a205141223",
"key_algorithm": "Elliptic_curve_cryptography",
"rsa": []
},
"tbs_fingerprint": "da3a7f346437c5d65e69d3deaccd45bb84ae57e2fcbef2e1945b7a23d3fb0d59",
"tbs_noct_fingerprint": "467c07027a0a92e027b1fe3c566bc8cb3973e08653193ef8d06ae538e7148cae",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-11-30T04:45:20",
"not_before": "2025-09-01T04:45:21"
},
"version": 2
},
"fingerprint_sha256": "C4B0F8E46F3E6B2B2E09A7A4FE8EF53C08AA27F2FA54A11306F5BB1C7A65384F",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "https://118.70.133.137/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-09-09T02:59:56.866Z"
}
],
"services_hash": "e5acaf798c73b7ca3f8005b30f780e346ffa24804ebd14452eeca45fe2d8579f",
"last_updated_at": "2025-09-09T02:59:56.866Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"443/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"443/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"443/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"443/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"443/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"443/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}