161.35.47.129
{
"scan_id": 1748787635,
"ip": "161.35.47.129",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "161.35.32.0/20",
"postal_code": "SL1",
"coordinates": {
"latitude": "51.5177",
"longitude": "-0.6215"
},
"geo_point": "51.5177, -0.6215",
"locale_code": "en",
"continent": "Europe",
"country_code": "GB",
"country_name": "United Kingdom",
"city": "Slough"
},
"location_updated_at": "2025-06-02T12:40:13Z",
"asn": {
"number": "AS14061",
"organization": "DIGITALOCEAN-ASN",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "161.35.0.0/16",
"organization": "DigitalOcean, LLC",
"descr": "DigitalOcean, LLC",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2025-02-04T15:07:08Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-06-02T12:40:13Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-06-02T14:37:39Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-06-02T12:40:13Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
"body_murmur": 1637199859,
"body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
"component": [
"Nginx:1.24.0",
"Ubuntu"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 04 Jun 2025 19:32:30 GMT"
],
"etag": [
"W/\"682bb239-267\""
],
"last_modified": [
"Mon, 19 May 2025 22:35:37 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "161.35.47.129",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to nginx!",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "http://161.35.47.129/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-04T19:32:31.461Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD HTML 4.01//EN\" \"http://www.w3.org/TR/html4/strict.dtd\">\n<html><head>\n<meta type=\"copyright\" content=\"Copyright (C) 1996-2021 The Squid Software Foundation and contributors\">\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\">\n<title>ERROR: The requested URL could not be retrieved</title>\n<style type=\"text/css\"><!-- \n /*\n * Copyright (C) 1996-2023 The Squid Software Foundation and contributors\n *\n * Squid software is distributed under GPLv2+ license and includes\n * contributions from numerous individuals and organizations.\n * Please see the COPYING and CONTRIBUTORS files for details.\n */\n\n/*\n Stylesheet for Squid Error pages\n Adapted from design by Free CSS Templates\n http://www.freecsstemplates.org\n Released for free under a Creative Commons Attribution 2.5 License\n*/\n\n/* Page basics */\n* {\n\tfont-family: verdana, sans-serif;\n}\n\nhtml body {\n\tmargin: 0;\n\tpadding: 0;\n\tbackground: #efefef;\n\tfont-size: 12px;\n\tcolor: #1e1e1e;\n}\n\n/* Page displayed title area */\n#titles {\n\tmargin-left: 15px;\n\tpadding: 10px;\n\tpadding-left: 100px;\n\tbackground: url('/squid-internal-static/icons/SN.png') no-repeat left;\n}\n\n/* initial title */\n#titles h1 {\n\tcolor: #000000;\n}\n#titles h2 {\n\tcolor: #000000;\n}\n\n/* special event: FTP success page titles */\n#titles ftpsuccess {\n\tbackground-color:#00ff00;\n\twidth:100%;\n}\n\n/* Page displayed body content area */\n#content {\n\tpadding: 10px;\n\tbackground: #ffffff;\n}\n\n/* General text */\np {\n}\n\n/* error brief description */\n#error p {\n}\n\n/* some data which may have caused the problem */\n#data {\n}\n\n/* the error message received from the system or other software */\n#sysmsg {\n}\n\npre {\n}\n\n/* special event: FTP directory listing */\n#dirmsg {\n font-family: courier, monospace;\n color: black;\n font-size: 10pt;\n}\n#dirlisting {\n margin-left: 2%;\n margin-right: 2%;\n}\n#dirlisting tr.entry td.icon,td.filename,td.size,td.date {\n border-bottom: groove;\n}\n#dirlisting td.size {\n width: 50px;\n text-align: right;\n padding-right: 5px;\n}\n\n/* horizontal lines */\nhr {\n\tmargin: 0;\n}\n\n/* page displayed footer area */\n#footer {\n\tfont-size: 9px;\n\tpadding-left: 10px;\n}\n\n\nbody\n:lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; }\n:lang(he) { direction: rtl; }\n --></style>\n</head><body id=\"ERR_INVALID_URL\">\n<div id=\"titles\">\n<h1>ERROR</h1>\n<h2>The requested URL could not be retrieved</h2>\n</div>\n<hr>\n\n<div id=\"content\">\n<p>The following error was encountered while trying to retrieve the URL: <a href=\"/\">/</a></p>\n\n<blockquote id=\"error\">\n<p><b>Invalid URL</b></p>\n</blockquote>\n\n<p>Some aspect of the requested URL is incorrect.</p>\n\n<p>Some possible problems are:</p>\n<ul>\n<li><p>Missing or incorrect access protocol (should be <q>http://</q> or similar)</p></li>\n<li><p>Missing hostname</p></li>\n<li><p>Illegal double-escape in the URL-Path</p></li>\n<li><p>Illegal character in hostname; underscores are not allowed.</p></li>\n</ul>\n\n<p>Your cache administrator is <a href=\"mailto:webmaster?subject=CacheErrorInfo%20-%20ERR_INVALID_URL&body=CacheHost%3A%20161.35.47.129%0D%0AErrPage%3A%20ERR_INVALID_URL%0D%0AErr%3A%20%5Bnone%5D%0D%0ATimeStamp%3A%20Sat,%2031%20May%202025%2015%3A46%3A55%20GMT%0D%0A%0D%0AClientIP%3A%20127.0.0.1%0D%0A%0D%0AHTTP%20Request%3A%0D%0A%0D%0A%0D%0A\">webmaster</a>.</p>\n<br>\n</div>\n\n<hr>\n<div id=\"footer\">\n<p>Generated Sat, 31 May 2025 15:46:55 GMT by 161.35.47.129 (squid/6.10)</p>\n<!-- ERR_INVALID_URL -->\n</div>\n</body></html>\n",
"body_murmur": -715115393,
"body_sha256": "044be1e9757afcfd463b3a4cf6daf54bb7d691f56dab3864088372f1556c9b65",
"content_length": 3503,
"headers": {
"content_language": [
"en"
],
"content_length": [
"3503"
],
"content_type": [
"text/html;charset=utf-8"
],
"date": [
"Sat, 31 May 2025 15:46:55 GMT"
],
"server": [
"squid/6.10"
],
"unknown": [
{
"key": "x_squid_error",
"value": [
"ERR_INVALID_URL 0"
]
},
{
"key": "cache_status",
"value": [
"161.35.47.129"
]
},
{
"key": "mime_version",
"value": [
"1.0"
]
}
],
"vary": [
"Accept-Language"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "161.35.47.129",
"path": "",
"scheme": "https"
}
},
"status_code": 400,
"title": "ERROR: The requested URL could not be retrieved"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r11.i.lencr.org/"
],
"ocsp_urls": [
"http://r11.o.lencr.org"
]
},
"authority_key_id": "c5cf46a4eaf4c3c07a6c95c42db05e922f26e3b9",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://r11.c.lencr.org/86.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:\n 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34\n Timestamp : Apr 12 00:15:45.652 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:A4:A9:0B:56:D5:D1:95:FC:4A:CB:72:\n 79:88:E5:D4:FA:87:6F:3C:43:60:9A:5D:30:89:51:60:\n AA:CE:80:32:70:02:21:00:A3:77:49:00:0D:B2:09:90:\n B4:7D:16:BD:FB:00:64:52:81:2F:E5:07:5C:1A:90:1A:\n BC:EF:F0:A8:A4:42:29:34\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:\n F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A\n Timestamp : Apr 12 00:15:45.647 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:E0:33:02:18:CA:F5:AC:19:98:EF:C0:\n C2:75:72:95:FE:A5:8A:0D:4D:5E:99:98:40:83:13:14:\n 09:6C:26:1D:C8:02:20:06:8C:5B:2C:D3:26:10:AA:61:\n B5:23:A2:A0:22:15:E5:F0:01:5E:60:D0:36:CE:4D:B4:\n 5F:EC:C0:AD:86:00:50",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.abortion.run"
]
},
"subject_key_id": "9cc038ee400c55a8d3af5766b3dda1b19b93c3ed"
},
"fingerprint_md5": "B9B9DED7DB95A7C046163916485343F5",
"fingerprint_sha1": "5C126DC80654CA2595507D75B0BDBCCE43A1E0D7",
"fingerprint_sha256": "20E4FB844912164C5A2473CCDE73C9F11FED0322E6529A07357EF6894248783D",
"issuer": {
"common_name": [
"R11"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R11",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-06-09T15:36:54",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-06-06T17:24:58",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "512938704258521350788656511648313584289237",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0de1f2302bd30dc140621209ea552efc47747cb1d7e930ef0e421eb47e4eaa34",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100a4a90b56d5d195fc4acb727988e5d4fa876f3c43609a5d30895160aace803270022100a37749000db20990b47d16bdfb006452812fe5075c1a901abceff0a8a4422934"
},
"timestamp": "2025-04-12T00:15:45.652000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "12f14e34bd53724c840619c38f3f7a13f8e7b56287889c6d300584ebe586263a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100e0330218caf5ac1998efc0c2757295fea58a0d4d5e999840831314096c261dc80220068c5b2cd32610aa61b523a2a02215e5f0015e60d036ce4db45fecc0ad860050"
},
"timestamp": "2025-04-12T00:15:45.647000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.abortion.run"
]
},
"subject_alt_name": {
"dns_names": [
"*.abortion.run"
],
"extended_dns_names": [
{
"domain": "abortion",
"fld": "abortion.run",
"subdomain": "*",
"tld": "run"
}
]
},
"subject_dn": "/CN=*.abortion.run",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "9046aa63477efd73939df4ef2f5b28a651b69d0d0352e7a372ae308bcc5a306c",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHhiZTE3ODk3YTlhM2EyZDRkNzUzOWUwZmRmOWMzZWY1YWJjNzk5Mjc0OTk2MTdhMzcyNjRlYjdkOTExYTk0NjM2ZjU3MzBlNGE2MDY5ZmQ3MzUxZmJmZTZmMDA0YzZhNzI4MzZiYzVjMGNiZDE0NWFiNDlhZTUxNjA5YjIyYWQ4N2NlYjdiOTk3NzYwNzk5MWJlZjc3ODBhZTgxZTE3YmFmYWFlNjQxODJhZThmMWViYmU0NDA0MjhiMGZkNjlkODYwNWEyOTQwMTVlYzU1OTk4OWU5MWExMzFiMjM0NjYwNTg2ZDY1ZWNiZTE5YmY2M2RjN2RlMGNkM2ExN2Y0OWRjOGM1ZTIwMTlkMWIxNGE2ODJkNzA4ODFiN2IzY2QzYTFlM2NjZTgxNTJkZThlZDgxNTViZjdlYjAzMTY4MDMyOTRlZTVlODM2NGU0YzYwMDFlYjFiNTBiNGRlNDNkYzliMDcwNWUxYmM0OWM3YWUwYTQ5NWUzMGJmMWM1YjUxMmZkZmJlOGI3ZDFlNGMyN2UxYjFmNjdlMDRkN2IyNTMxZGQ1ZGI0NTFkYzQ0ODVkNTMyMGJlMTFiMmFiMWE1MzAxNGRiYjY2NTJmMDhlOWRlYjdlZTA1NzA2OWJlNzIwZjEzZjkxZWQxOGFlMmRlZjAwYzYzODA1Njc0NWNjYTA2NQ=="
}
},
"tbs_fingerprint": "493ba1ca77ce60a08fe69d9f45d9051d5b02c33da7f16fdf2bd80e6f61d6e9cd",
"tbs_noct_fingerprint": "9364fb014d37edb94c9265d2bd2416b37a079f2ff53d0a0b02952983290b5b6e",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-07-10T23:17:14",
"not_before": "2025-04-11T23:17:15"
},
"version": 2
},
"fingerprint_sha256": "20E4FB844912164C5A2473CCDE73C9F11FED0322E6529A07357EF6894248783D",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://161.35.47.129/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-31T15:47:01.177Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-29T17:29:56.169Z"
}
],
"services_hash": "ab518ba4427012ca242ae644413019da4e61ed1336edc0a6fedbe848c791b97c",
"last_updated_at": "2025-06-04T19:32:31.461Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"80/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"80/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"80/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}