161.35.47.129
{
"scan_id": 1739625356,
"ip": "161.35.47.129",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "161.35.32.0/20",
"postal_code": "SL1",
"coordinates": {
"latitude": "51.5368",
"longitude": "-0.6718"
},
"geo_point": "51.5368, -0.6718",
"locale_code": "en",
"continent": "Europe",
"country_code": "GB",
"country_name": "United Kingdom",
"city": "Slough"
},
"location_updated_at": "2025-02-16T16:39:42Z",
"asn": {
"number": "AS14061",
"organization": "DIGITALOCEAN-ASN",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "161.35.0.0/16",
"organization": "DigitalOcean, LLC",
"descr": "DigitalOcean, LLC",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2025-02-04T15:07:08Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-02-16T16:39:42Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-02-16T19:19:04Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-02-16T16:39:42Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.6p1 Ubuntu 3ubuntu13.5",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.6p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.6p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.5",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"ext-info-s",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "08becdb1d5a2dfce36c30e5a0011c761df7db3fa9c47e879e965a1a739ea6807",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA6idPrJ/rd+vldFUpZYOmAEdAMAQ7ZlfISgHOZi1laWS7XrdTfmbWIL6CpYbFw4pdaG67HGumImEXYZ3Q4cXXk="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_9.6p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-51767",
"score": 7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-18T19:42:27.602Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.23.4",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.23.4",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.23\\.4",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html lang=\"en\" data-bs-theme=\"light\"><!-- don't change !!! data-bs-theme is changed dynamically in the C++ code when the index.html file is loaded or when the custom css is loaded for dev setups-->\n <head>\n <meta charset=\"UTF-8\" />\n <link rel=\"icon\" href=\"./favicon.ico\" />\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" />\n <title>Orthanc Explorer 2</title>\n <script>\n // Custom bit of code to redirect to /app/ if the uri is /app\n // The reason for this is that the path to assets is relative\n // so it won't work for /app but it will for /app/\n const currentUri = new URL(window.location.href);\n\n if (currentUri.pathname.endsWith(\"app\")) {\n currentUri.pathname += \"/\";\n window.location.href = currentUri.toString();\n }\n </script>\n <script type=\"module\" crossorigin src=\"./assets/main-D8fTJEsH.js\"></script>\n <link rel=\"modulepreload\" crossorigin href=\"./assets/index-bIgAY6em.js\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/index-aTg5w7qo.css\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/main-DKrHFQoX.css\">\n </head>\n <body>\n <div id=\"app\"></div>\n </body>\n</html>\n",
"body_murmur": 1726347666,
"body_sha256": "5e714f9e68d244c12dc496bf19160adc28c7e56e1ec8c655b50b79213a24c199",
"component": [
"Nginx:1.23.4"
],
"content_length": 1205,
"headers": {
"connection": [
"keep-alive"
],
"content_length": [
"1205"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 16 Feb 2025 22:26:30 GMT"
],
"server": [
"nginx/1.23.4"
],
"x_content_type_options": [
"nosniff"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html>\r\n<head><title>301 Moved Permanently</title></head>\r\n<body>\r\n<center><h1>301 Moved Permanently</h1></center>\r\n<hr><center>nginx/1.23.4</center>\r\n</body>\r\n</html>\r\n",
"body_murmur": -1620902655,
"body_sha256": "ba7e5608ec93d78dd74030fcecaff068d047db3fc4367cf36f89205668771d60",
"content_length": 169,
"headers": {
"connection": [
"keep-alive"
],
"content_length": [
"169"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 16 Feb 2025 22:26:30 GMT"
],
"location": [
"https://161.35.47.129/orthanc/ui/app/"
],
"server": [
"nginx/1.23.4"
]
},
"location": "https://161.35.47.129/orthanc/ui/app/",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://161.35.47.129"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "161.35.47.129",
"path": "/orthanc/ui/app/",
"scheme": "https"
}
},
"status_code": 200,
"title": "Orthanc Explorer 2"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt"
],
"ocsp_urls": [
"http://ocsp.sectigo.com"
]
},
"authority_key_id": "8d8c5ec454ad8ae177e99bf99b05e1b8018d61e1",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://sectigo.com/CPS"
],
"id": "1.3.6.1.4.1.6449.1.2.2.7"
},
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:\n 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A\n Timestamp : Oct 12 19:43:09.565 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:7B:5C:C6:EE:0F:EC:9B:A5:5F:D5:4D:AF:\n AA:F8:2B:11:73:A2:B3:16:B2:E0:59:77:94:C9:E1:75:\n D2:EF:80:20:02:20:13:72:E5:70:0A:8B:1E:1B:03:62:\n D1:FD:39:06:E6:F3:08:4F:35:A7:C5:3D:94:E6:EE:51:\n 12:7F:69:56:3A:23\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:\n 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0\n Timestamp : Oct 12 19:43:09.555 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:05:D3:0D:D2:28:C8:4F:30:39:F9:82:A3:\n 32:2B:7C:CA:7E:2A:E0:99:5D:8E:D4:FA:1F:4B:1D:7D:\n 18:39:B4:27:02:21:00:EC:DE:42:02:F9:19:4D:9D:BC:\n 4F:69:25:4F:C0:17:7E:DA:84:95:54:2A:CD:39:C7:7A:\n C7:4E:2B:9D:AD:D2:E7\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:\n F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A\n Timestamp : Oct 12 19:43:09.513 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:0C:80:2A:A8:E9:73:30:AD:A5:A0:35:E1:\n 96:26:56:FE:04:9C:02:50:D4:0F:2E:10:2B:B0:9C:2A:\n 9C:85:00:04:02:20:31:7C:53:23:1E:4C:31:F1:B5:CF:\n F2:31:35:00:92:51:6D:CB:69:3C:5E:56:6F:AE:21:87:\n 86:EB:E0:0D:C8:C1",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"xtelerad.com",
"www.xtelerad.com"
]
},
"subject_key_id": "c3a716eba887101618a5ff4397443f8be485585b"
},
"fingerprint_md5": "CFB6593E085E9751061487104CCA6420",
"fingerprint_sha1": "40EC3C8F132C0D53282E5AC647C11D9FCDCAF438",
"fingerprint_sha256": "C4217D3BA2282482BB9F138FF83A6E0327D499E8F1780AAF2DC941484BF2726E",
"issuer": {
"common_name": [
"Sectigo RSA Domain Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"organization": [
"Sectigo Limited"
],
"province": [
"Greater Manchester"
]
},
"issuer_dn": "/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA",
"jarm": "21d19d00021d21d21c42d43d0000009c19eb5d1f46a7a29c1602d080891400",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-02-22T00:57:50",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "89916276255930276342791089874550437700",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "dddcca3495d7e11605e79532fac79ff83d1c50dfdb003a1412760a2cacbbc82a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402207b5cc6ee0fec9ba55fd54dafaaf82b1173a2b316b2e0597794c9e175d2ef802002201372e5700a8b1e1b0362d1fd3906e6f3084f35a7c53d94e6ee51127f69563a23"
},
"timestamp": "2024-10-12T19:43:09.565000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "ccfb0f6a85710965fe959b53cee9b27c22e9855c0d978db6a97e54c0fe4c0db0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022005d30dd228c84f3039f982a3322b7cca7e2ae0995d8ed4fa1f4b1d7d1839b427022100ecde4202f9194d9dbc4f69254fc0177eda8495542acd39c77ac74e2b9dadd2e7"
},
"timestamp": "2024-10-12T19:43:09.555000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "12f14e34bd53724c840619c38f3f7a13f8e7b56287889c6d300584ebe586263a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402200c802aa8e97330ada5a035e1962656fe049c0250d40f2e102bb09c2a9c8500040220317c53231e4c31f1b5cff231350092516dcb693c5e566fae218786ebe00dc8c1"
},
"timestamp": "2024-10-12T19:43:09.513000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"xtelerad.com"
]
},
"subject_alt_name": {
"dns_names": [
"xtelerad.com",
"www.xtelerad.com"
],
"extended_dns_names": [
{
"domain": "xtelerad",
"fld": "xtelerad.com",
"tld": "com"
},
{
"domain": "xtelerad",
"fld": "xtelerad.com",
"subdomain": "www",
"tld": "com"
}
]
},
"subject_dn": "/CN=xtelerad.com",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "7a3eb09de1d869d4fd43eebd1127ddc7fb1fadd4e3153f2e40b8f4651a4fe88a",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "2b90d4a9a8fdbe6de3f235555851c488d3e16a3e9d51a211a7af65d226c58d94",
"tbs_noct_fingerprint": "a9bd66d0146b0b1fba41d0b9fd3b350b0c6f480230cdcdae49ca084470261c75",
"validation_level": "DV",
"validity": {
"length_seconds": 31622400,
"not_after": "2025-10-12T23:59:59",
"not_before": "2024-10-12T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "C4217D3BA2282482BB9F138FF83A6E0327D499E8F1780AAF2DC941484BF2726E",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://161.35.47.129/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-16T22:26:43.427Z"
}
],
"services_hash": "09ab26a4dfdc82833ef5e802b64bb89c3a6ddab49b871e86ce743a96861494b3",
"last_updated_at": "2025-02-18T19:42:27.602Z",
"banner": [
"ssh",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}