Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

161.35.47.129

SummaryCVE DetailsRaw Data
04 Jun 2025, 19:32:31 UTC
{
  "scan_id": 1748787635,
  "ip": "161.35.47.129",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "161.35.32.0/20",
    "postal_code": "SL1",
    "coordinates": {
      "latitude": "51.5177",
      "longitude": "-0.6215"
    },
    "geo_point": "51.5177, -0.6215",
    "locale_code": "en",
    "continent": "Europe",
    "country_code": "GB",
    "country_name": "United Kingdom",
    "city": "Slough"
  },
  "location_updated_at": "2025-06-02T12:40:13Z",
  "asn": {
    "number": "AS14061",
    "organization": "DIGITALOCEAN-ASN",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "161.35.0.0/16",
    "organization": "DigitalOcean, LLC",
    "descr": "DigitalOcean, LLC",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2025-02-04T15:07:08Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-06-02T12:40:13Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-06-02T14:37:39Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-06-02T12:40:13Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.24.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.24\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
          "body_murmur": 1637199859,
          "body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
          "component": [
            "Nginx:1.24.0",
            "Ubuntu"
          ],
          "content_length": -1,
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Wed, 04 Jun 2025 19:32:30 GMT"
            ],
            "etag": [
              "W/\"682bb239-267\""
            ],
            "last_modified": [
              "Mon, 19 May 2025 22:35:37 GMT"
            ],
            "server": [
              "nginx/1.24.0 (Ubuntu)"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "161.35.47.129",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "Welcome to nginx!",
          "transfer_encoding": [
            "chunked"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "score": 2.1,
          "severity": "low"
        }
      ],
      "url": "http://161.35.47.129/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-04T19:32:31.461Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD HTML 4.01//EN\" \"http://www.w3.org/TR/html4/strict.dtd\">\n<html><head>\n<meta type=\"copyright\" content=\"Copyright (C) 1996-2021 The Squid Software Foundation and contributors\">\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\">\n<title>ERROR: The requested URL could not be retrieved</title>\n<style type=\"text/css\"><!-- \n /*\n * Copyright (C) 1996-2023 The Squid Software Foundation and contributors\n *\n * Squid software is distributed under GPLv2+ license and includes\n * contributions from numerous individuals and organizations.\n * Please see the COPYING and CONTRIBUTORS files for details.\n */\n\n/*\n Stylesheet for Squid Error pages\n Adapted from design by Free CSS Templates\n http://www.freecsstemplates.org\n Released for free under a Creative Commons Attribution 2.5 License\n*/\n\n/* Page basics */\n* {\n\tfont-family: verdana, sans-serif;\n}\n\nhtml body {\n\tmargin: 0;\n\tpadding: 0;\n\tbackground: #efefef;\n\tfont-size: 12px;\n\tcolor: #1e1e1e;\n}\n\n/* Page displayed title area */\n#titles {\n\tmargin-left: 15px;\n\tpadding: 10px;\n\tpadding-left: 100px;\n\tbackground: url('/squid-internal-static/icons/SN.png') no-repeat left;\n}\n\n/* initial title */\n#titles h1 {\n\tcolor: #000000;\n}\n#titles h2 {\n\tcolor: #000000;\n}\n\n/* special event: FTP success page titles */\n#titles ftpsuccess {\n\tbackground-color:#00ff00;\n\twidth:100%;\n}\n\n/* Page displayed body content area */\n#content {\n\tpadding: 10px;\n\tbackground: #ffffff;\n}\n\n/* General text */\np {\n}\n\n/* error brief description */\n#error p {\n}\n\n/* some data which may have caused the problem */\n#data {\n}\n\n/* the error message received from the system or other software */\n#sysmsg {\n}\n\npre {\n}\n\n/* special event: FTP directory listing */\n#dirmsg {\n    font-family: courier, monospace;\n    color: black;\n    font-size: 10pt;\n}\n#dirlisting {\n    margin-left: 2%;\n    margin-right: 2%;\n}\n#dirlisting tr.entry td.icon,td.filename,td.size,td.date {\n    border-bottom: groove;\n}\n#dirlisting td.size {\n    width: 50px;\n    text-align: right;\n    padding-right: 5px;\n}\n\n/* horizontal lines */\nhr {\n\tmargin: 0;\n}\n\n/* page displayed footer area */\n#footer {\n\tfont-size: 9px;\n\tpadding-left: 10px;\n}\n\n\nbody\n:lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; }\n:lang(he) { direction: rtl; }\n --></style>\n</head><body id=\"ERR_INVALID_URL\">\n<div id=\"titles\">\n<h1>ERROR</h1>\n<h2>The requested URL could not be retrieved</h2>\n</div>\n<hr>\n\n<div id=\"content\">\n<p>The following error was encountered while trying to retrieve the URL: <a href=\"/\">/</a></p>\n\n<blockquote id=\"error\">\n<p><b>Invalid URL</b></p>\n</blockquote>\n\n<p>Some aspect of the requested URL is incorrect.</p>\n\n<p>Some possible problems are:</p>\n<ul>\n<li><p>Missing or incorrect access protocol (should be <q>http://</q> or similar)</p></li>\n<li><p>Missing hostname</p></li>\n<li><p>Illegal double-escape in the URL-Path</p></li>\n<li><p>Illegal character in hostname; underscores are not allowed.</p></li>\n</ul>\n\n<p>Your cache administrator is <a href=\"mailto:webmaster?subject=CacheErrorInfo%20-%20ERR_INVALID_URL&amp;body=CacheHost%3A%20161.35.47.129%0D%0AErrPage%3A%20ERR_INVALID_URL%0D%0AErr%3A%20%5Bnone%5D%0D%0ATimeStamp%3A%20Sat,%2031%20May%202025%2015%3A46%3A55%20GMT%0D%0A%0D%0AClientIP%3A%20127.0.0.1%0D%0A%0D%0AHTTP%20Request%3A%0D%0A%0D%0A%0D%0A\">webmaster</a>.</p>\n<br>\n</div>\n\n<hr>\n<div id=\"footer\">\n<p>Generated Sat, 31 May 2025 15:46:55 GMT by 161.35.47.129 (squid/6.10)</p>\n<!-- ERR_INVALID_URL -->\n</div>\n</body></html>\n",
          "body_murmur": -715115393,
          "body_sha256": "044be1e9757afcfd463b3a4cf6daf54bb7d691f56dab3864088372f1556c9b65",
          "content_length": 3503,
          "headers": {
            "content_language": [
              "en"
            ],
            "content_length": [
              "3503"
            ],
            "content_type": [
              "text/html;charset=utf-8"
            ],
            "date": [
              "Sat, 31 May 2025 15:46:55 GMT"
            ],
            "server": [
              "squid/6.10"
            ],
            "unknown": [
              {
                "key": "x_squid_error",
                "value": [
                  "ERR_INVALID_URL 0"
                ]
              },
              {
                "key": "cache_status",
                "value": [
                  "161.35.47.129"
                ]
              },
              {
                "key": "mime_version",
                "value": [
                  "1.0"
                ]
              }
            ],
            "vary": [
              "Accept-Language"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "161.35.47.129",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 400,
          "title": "ERROR: The requested URL could not be retrieved"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://r11.i.lencr.org/"
                ],
                "ocsp_urls": [
                  "http://r11.o.lencr.org"
                ]
              },
              "authority_key_id": "c5cf46a4eaf4c3c07a6c95c42db05e922f26e3b9",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://r11.c.lencr.org/86.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:\n                47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34\n    Timestamp : Apr 12 00:15:45.652 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:A4:A9:0B:56:D5:D1:95:FC:4A:CB:72:\n                79:88:E5:D4:FA:87:6F:3C:43:60:9A:5D:30:89:51:60:\n                AA:CE:80:32:70:02:21:00:A3:77:49:00:0D:B2:09:90:\n                B4:7D:16:BD:FB:00:64:52:81:2F:E5:07:5C:1A:90:1A:\n                BC:EF:F0:A8:A4:42:29:34\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:\n                F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A\n    Timestamp : Apr 12 00:15:45.647 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:E0:33:02:18:CA:F5:AC:19:98:EF:C0:\n                C2:75:72:95:FE:A5:8A:0D:4D:5E:99:98:40:83:13:14:\n                09:6C:26:1D:C8:02:20:06:8C:5B:2C:D3:26:10:AA:61:\n                B5:23:A2:A0:22:15:E5:F0:01:5E:60:D0:36:CE:4D:B4:\n                5F:EC:C0:AD:86:00:50",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.abortion.run"
                ]
              },
              "subject_key_id": "9cc038ee400c55a8d3af5766b3dda1b19b93c3ed"
            },
            "fingerprint_md5": "B9B9DED7DB95A7C046163916485343F5",
            "fingerprint_sha1": "5C126DC80654CA2595507D75B0BDBCCE43A1E0D7",
            "fingerprint_sha256": "20E4FB844912164C5A2473CCDE73C9F11FED0322E6529A07357EF6894248783D",
            "issuer": {
              "common_name": [
                "R11"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "Let's Encrypt"
              ]
            },
            "issuer_dn": "/C=US/O=Let's Encrypt/CN=R11",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-06-09T15:36:54",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-06-06T17:24:58",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "512938704258521350788656511648313584289237",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0de1f2302bd30dc140621209ea552efc47747cb1d7e930ef0e421eb47e4eaa34",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100a4a90b56d5d195fc4acb727988e5d4fa876f3c43609a5d30895160aace803270022100a37749000db20990b47d16bdfb006452812fe5075c1a901abceff0a8a4422934"
                },
                "timestamp": "2025-04-12T00:15:45.652000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "12f14e34bd53724c840619c38f3f7a13f8e7b56287889c6d300584ebe586263a",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100e0330218caf5ac1998efc0c2757295fea58a0d4d5e999840831314096c261dc80220068c5b2cd32610aa61b523a2a02215e5f0015e60d036ce4db45fecc0ad860050"
                },
                "timestamp": "2025-04-12T00:15:45.647000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.abortion.run"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.abortion.run"
              ],
              "extended_dns_names": [
                {
                  "domain": "abortion",
                  "fld": "abortion.run",
                  "subdomain": "*",
                  "tld": "run"
                }
              ]
            },
            "subject_dn": "/CN=*.abortion.run",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "9046aa63477efd73939df4ef2f5b28a651b69d0d0352e7a372ae308bcc5a306c",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "493ba1ca77ce60a08fe69d9f45d9051d5b02c33da7f16fdf2bd80e6f61d6e9cd",
            "tbs_noct_fingerprint": "9364fb014d37edb94c9265d2bd2416b37a079f2ff53d0a0b02952983290b5b6e",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7775999,
              "not_after": "2025-07-10T23:17:14",
              "not_before": "2025-04-11T23:17:15"
            },
            "version": 2
          },
          "fingerprint_sha256": "20E4FB844912164C5A2473CCDE73C9F11FED0322E6529A07357EF6894248783D",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://161.35.47.129/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-31T15:47:01.177Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-29T17:29:56.169Z"
    }
  ],
  "services_hash": "ab518ba4427012ca242ae644413019da4e61ed1336edc0a6fedbe848c791b97c",
  "last_updated_at": "2025-06-04T19:32:31.461Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "80/http"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    }
  }
}