175.214.194.191
{
"scan_id": 1765499346,
"ip": "175.214.194.191",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "175.214.194.0/23",
"postal_code": "462",
"coordinates": {
"latitude": "35.2582",
"longitude": "129.0948"
},
"geo_point": "35.2582, 129.0948",
"locale_code": "en",
"continent": "Asia",
"country_code": "KR",
"country_name": "South Korea",
"city": "Busan"
},
"location_updated_at": "2025-12-10T16:43:34Z",
"asn": {
"number": "AS4766",
"organization": "Korea Telecom",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "175.208.0.0/13",
"organization": "Korea Telecom",
"descr": "Korea Telecom",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:04:47Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-12-10T16:43:34Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-12-10T17:47:23Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-12-10T16:43:34Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "2016.74",
"product": "Dropbear sshd",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:matt_johnston:dropbear_ssh_server:2016.74",
"part": "a",
"vendor": "matt_johnston",
"product": "dropbear_ssh_server",
"version": "2016\\.74",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-dropbear_2016.74",
"client_to_server_ciphers": [
"aes128-ctr",
"aes256-ctr"
],
"client_to_server_compression": [
"[email protected]",
"none"
],
"client_to_server_macs": [
"hmac-sha1",
"hmac-sha2-256",
"hmac-sha2-512"
],
"host_key_algorithms": [
"ssh-rsa"
],
"kex_algorithms": [
"[email protected]",
"ecdh-sha2-nistp521",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp256",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1",
"[email protected]"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "4b05fa5ef5ebd795884bb9fbb7fb63d2bad0ee803a2401bfe652baa0bcdb0589",
"raw": "AAAAB3NzaC1yc2EAAAADAQABAAABAQCgLRxQ1se2v9E3ltMKEVtrjjwtUq7JjdbTAD7CYWdhbd/7RXbzG4FCVjjF+kvKZjxx2PnhP7MOC2JNNfyAJFjQaJcFAqtwfrfHv+jq1ZObFnHtmDCb/grQIe8Zw5yCXJMqySj/E2pvQmXlA2eOdts/M3uO4pN9I7pYcFd2NU9MIFoCeYOWvaQcmBgeVHDp+2SZvsaj7Ue4jYCc8Hc5mxNI/wBKCS5Rvi8+hItSZag3RCdgjzDidS6uLNRMszXqct5Rm1B28KaA9Cx33cC4CnEWEvzbkV1dYwqwXL59IbL6MdWBflFpxJl5qZEyadnsR5PfCHdt2oIBK+6T4dzmJ9xF"
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes256-ctr"
],
"server_to_client_compression": [
"[email protected]",
"none"
],
"server_to_client_macs": [
"hmac-sha1",
"hmac-sha2-256",
"hmac-sha2-512"
],
"software": "dropbear_2016.74",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-05T23:32:33.165Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "GoAhead WebServer",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:goahead:goahead_webserver",
"part": "a",
"vendor": "goahead",
"product": "goahead_webserver",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n\t\n<html xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"en\" lang=\"en\">\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text/html; charset=iso-8859-1\" />\n\t<title>Ruckus Wireless Admin</title>\n<style type=\"text/css\">\nbody { background-color: #ccc; text-align: center; }\nbody, form, h1, input { margin: 0; padding: 0; }\nbody, th, input { font-family: \"Trebuchet MS\", Verdana, Geneva, Arial, Helvetica, sans-serif; font-size: 20px; }\nth { text-align: left; }\nh1 { margin: 30px 0 10px; font-size: 20px; color: #0397d6; }\n.box { background-color: #e6e6e6; padding: 10px 0; width: 24em; margin: 42px auto 20px; border: 3px solid white; }\n#note { border-color: red; background-color: #fee; }\ntable { margin: 0 auto 10px; }\n</style>\n</head>\n\n<body>\n\n<div class=\"box\"><img src=\"/images/logo_login.gif\" width=\"173\" height=\"52\" alt=\"Ruckus Wireless\" title=\"Ruckus Wireless\" />\n<h1>Ruckus Wireless Admin</h1>\n<form method=\"post\" id=\"loginform\" action=\"/forms/doLogin\" autocomplete=\"off\" onsubmit=\"return doSubmit();\">\n<table border=\"0\" cellspacing=\"3\" cellpadding=\"3\">\n<tr>\n <th><label for=\"login-username\">Username:</label></th>\n <td><input type=\"text\" name=\"login_username\" id=\"login-username\" size=\"28\" maxlength=\"64\" /></td>\n</tr>\n<tr>\n <th><label for=\"password\">Password:</label></th>\n <td><input type=\"password\" name=\"password\" id=\"password\" size=\"28\" maxlength=\"64\" /></td>\n</tr>\n</table>\n<input type=\"image\" src=\"/images/login.gif\" alt=\"Login\" title=\"Login\" />\n</form>\n\n</div><img src=\"/images/goahead.gif\" width=\"155\" height=\"31\" alt=\"\" />\n\n<script type=\"text/javascript\" src=\"/js/prototype.js\"></script>\n<script type=\"text/javascript\">\n// <![CDATA[\nif (top.frames.length!=0)\n top.location=self.document.location;\n\nfunction doSubmit() {\n if ($F('login-username') == '') {\n alert(\"I need to know your username.\");\n Field.activate('login-username');\n return false;\n }\n return true;\n}\nEvent.observe(window, 'load', function() { Field.focus('login-username') });\n// ]]>\n</script>\n</body>\n</html>\n\n",
"body_murmur": 864067461,
"body_sha256": "433ad1540bd74a365d7dcff6393d78d6012d07b8b0060957bf996f91af1dff83",
"component": [
"GoAhead"
],
"content_length": -1,
"favicon": {
"md5_hash": "ed8cf53ef6836184587ee3a987be074a",
"murmur_hash": -2069844696,
"path": "http://175.214.194.191:80/favicon.ico",
"size": 2862
},
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"date": [
"Fri Dec 12 09:48:48 2025"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
]
},
"protocol": "HTTP/1.0",
"redirects": [
{
"body": "<html><head></head><body>\r\nThis document has moved to a new <a href=\"/\">location</a>.\r\n Please update your documents to reflect the new location.\r\n </body></html>\r\n\r\n",
"body_murmur": -624789581,
"body_sha256": "d2b7b0cb5a45669cba0f67df6f542ea9c848be5127709924f668b8c8096d921f",
"content_length": -1,
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"date": [
"Fri Dec 12 09:48:45 2025"
],
"location": [
"https://175.214.194.191/"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"set_cookie": [
"sid=0; path=/; HttpOnly;"
]
},
"location": "https://175.214.194.191/",
"protocol": "HTTP/1.0",
"status_code": 302,
"status_line": "302 Redirect"
},
{
"body": "<html><head></head><body>\r\nThis document has moved to a new <a href=\"https://175.214.194.191/login.asp\">location</a>.\r\nPlease update your documents to reflect the new location.\r\n</body></html>\r\n\r\n",
"body_murmur": 135291759,
"body_sha256": "1587d96849d8e4b4abcfe650391184f884695e5468e3d21f83536fb02a661603",
"content_length": -1,
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"date": [
"Fri Dec 12 09:48:46 2025"
],
"location": [
"https://175.214.194.191/login.asp"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"set_cookie": [
"sid=0; path=/; HttpOnly; Secure;"
]
},
"location": "https://175.214.194.191/login.asp",
"protocol": "HTTP/1.0",
"status_code": 302,
"status_line": "302 Redirect"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://175.214.194.191/"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "175.214.194.191",
"path": "/login.asp",
"scheme": "https"
}
},
"status_code": 200,
"title": "Ruckus Wireless Admin"
}
},
"url": "http://175.214.194.191/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-12T09:48:49.796Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n\t\n<html xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"en\" lang=\"en\">\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text/html; charset=iso-8859-1\" />\n\t<title>Ruckus Wireless Admin</title>\n<style type=\"text/css\">\nbody { background-color: #ccc; text-align: center; }\nbody, form, h1, input { margin: 0; padding: 0; }\nbody, th, input { font-family: \"Trebuchet MS\", Verdana, Geneva, Arial, Helvetica, sans-serif; font-size: 20px; }\nth { text-align: left; }\nh1 { margin: 30px 0 10px; font-size: 20px; color: #0397d6; }\n.box { background-color: #e6e6e6; padding: 10px 0; width: 24em; margin: 42px auto 20px; border: 3px solid white; }\n#note { border-color: red; background-color: #fee; }\ntable { margin: 0 auto 10px; }\n</style>\n</head>\n\n<body>\n\n<div class=\"box\"><img src=\"/images/logo_login.gif\" width=\"173\" height=\"52\" alt=\"Ruckus Wireless\" title=\"Ruckus Wireless\" />\n<h1>Ruckus Wireless Admin</h1>\n<form method=\"post\" id=\"loginform\" action=\"/forms/doLogin\" autocomplete=\"off\" onsubmit=\"return doSubmit();\">\n<table border=\"0\" cellspacing=\"3\" cellpadding=\"3\">\n<tr>\n <th><label for=\"login-username\">Username:</label></th>\n <td><input type=\"text\" name=\"login_username\" id=\"login-username\" size=\"28\" maxlength=\"64\" /></td>\n</tr>\n<tr>\n <th><label for=\"password\">Password:</label></th>\n <td><input type=\"password\" name=\"password\" id=\"password\" size=\"28\" maxlength=\"64\" /></td>\n</tr>\n</table>\n<input type=\"image\" src=\"/images/login.gif\" alt=\"Login\" title=\"Login\" />\n</form>\n\n</div><img src=\"/images/goahead.gif\" width=\"155\" height=\"31\" alt=\"\" />\n\n<script type=\"text/javascript\" src=\"/js/prototype.js\"></script>\n<script type=\"text/javascript\">\n// <![CDATA[\nif (top.frames.length!=0)\n top.location=self.document.location;\n\nfunction doSubmit() {\n if ($F('login-username') == '') {\n alert(\"I need to know your username.\");\n Field.activate('login-username');\n return false;\n }\n return true;\n}\nEvent.observe(window, 'load', function() { Field.focus('login-username') });\n// ]]>\n</script>\n</body>\n</html>\n\n",
"body_murmur": 864067461,
"body_sha256": "433ad1540bd74a365d7dcff6393d78d6012d07b8b0060957bf996f91af1dff83",
"component": [
"GoAhead"
],
"content_length": -1,
"favicon": {
"md5_hash": "ed8cf53ef6836184587ee3a987be074a",
"murmur_hash": -2069844696,
"path": "https://175.214.194.191:443/favicon.ico",
"size": 2862
},
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"date": [
"Sun Dec 7 08:42:46 2025"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
]
},
"protocol": "HTTP/1.0",
"redirects": [
{
"body": "<html><head></head><body>\r\nThis document has moved to a new <a href=\"https://175.214.194.191/login.asp\">location</a>.\r\nPlease update your documents to reflect the new location.\r\n</body></html>\r\n\r\n",
"body_murmur": 135291759,
"body_sha256": "1587d96849d8e4b4abcfe650391184f884695e5468e3d21f83536fb02a661603",
"content_length": -1,
"headers": {
"cache_control": [
"no-cache, no-store"
],
"content_type": [
"text/html"
],
"date": [
"Sun Dec 7 08:42:45 2025"
],
"location": [
"https://175.214.194.191/login.asp"
],
"pragma": [
"no-cache"
],
"server": [
"GoAhead-Webs"
],
"set_cookie": [
"sid=0; path=/; HttpOnly; Secure;"
]
},
"location": "https://175.214.194.191/login.asp",
"protocol": "HTTP/1.0",
"status_code": 302,
"status_line": "302 Redirect"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://175.214.194.191"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "175.214.194.191",
"path": "/login.asp",
"scheme": "https"
}
},
"status_code": 200,
"title": "Ruckus Wireless Admin"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": true,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_key_id": "55db09a766dc54ff1d6b8b3cd74bfb0b"
},
"fingerprint_md5": "A4329BAD723AF23D3245540448EEF0B6",
"fingerprint_sha1": "D505F67FBF5C3F51C542EFD8274891BF7F2774DC",
"fingerprint_sha256": "BFEAC7106C71DB5DBD44A52FF9B2E513D33A56188E73E3F19CAE46266E54D0B9",
"issuer": {
"common_name": [
"RuckusPKI-DeviceSubCA-2"
],
"country": [
"US"
],
"locality": [
"Sunnyvale"
],
"organization": [
"Ruckus Wireless Inc."
],
"province": [
"California"
]
},
"issuer_dn": "/CN=RuckusPKI-DeviceSubCA-2/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US",
"jarm": "13d13d00013d13d06c13d13d13d13d9674c6b4e623ae36cc2d998e99e2262e",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1195089764",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"SN-351802003512"
],
"country": [
"US"
],
"locality": [
"Sunnyvale"
],
"organization": [
"Ruckus Wireless Inc."
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"SN-351802003512"
],
"extended_dns_names": []
},
"subject_dn": "/CN=SN-351802003512/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "649f3b8f802eff4ffd73bde26ac96a143d0e2a0d63d3d769e8b3f1d48dbc3419",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHg5NWQ0NWUxNmQ0OGFmMDcyYmQzNDBkNmE0ZDE4MmU5YTM1ODMxM2UxYTllYzllOWVmYWUwZmVmMTIwMDJmYTBlYjlhNjdmZTIwN2JlODJhYTBhZTQxZDZjNWI0YzdjMDQ4NTc1MWZlNzIyNjZmYjY1Zjc2OGU4MzA2M2JiYjFlMjdkMjNlZWQ1MDEyYmI3MDBiOTA3NjM4OTM4NjAwZGU2NDE5MTJhNzU5ODNjMGJjODFjOGJjNWVjN2U3ZGQwY2U1OGI5NDlhNTc2YTQzMmE5YjBkZWRkMWZiMTY2YzAyOWMxOTQ1OTYxNTlmNjY0NTU5NWY0MzlkYTkyOWI4YjQ0N2RjZjc2OTVmOGQzMzY1OGFkYzk3MzUzOTEyYjYwODhkNzE5YmI0NzBhMmIxMzBiYWJhZTBkZDQ1MjIwOGExNjliZWQ3YWEzNzI1NGFkOGQ5ZjZkOWE3M2Y4YzQ2NGZlZjM0MmZhM2ZkZWVhNWU1MTE5NDU5YmZlNTIxMGQyZTVlY2RlM2E3NzE5YzNlOGEwYTViNDM4NzI1NDE3YjM3MTJjYjA2NTIwNDk4OTg5ZWU3YTI4ODdkMTM5N2I2ZTQwMWQzNWVlZDA3N2I0MjQwZDIxNDAzZDk1YzAwZTk2MjE0YzUyOTFkMGQxZWY3NDdiYmFmZGZhZjNkNTVjZTljNQ=="
}
},
"tbs_fingerprint": "60c4640dbcd139697ac5a59edccc0aa60dddeef22ed39c3641494fa05b53ce6b",
"validation_level": "OV",
"validity": {
"length_seconds": 789004800,
"not_after": "2043-08-12T23:53:27",
"not_before": "2018-08-11T23:53:27"
},
"version": 2
},
"fingerprint_sha256": "BFEAC7106C71DB5DBD44A52FF9B2E513D33A56188E73E3F19CAE46266E54D0B9",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted"
]
}
},
"url": "https://175.214.194.191/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-12T01:39:45.151Z"
},
{
"port": 1883,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-12T13:41:42.929Z"
}
],
"services_hash": "cd857499e418a1cc95f36d2002be33cac8b6c8c40e3a2b844cd256e616cd8c6b",
"last_updated_at": "2025-12-12T13:41:42.929Z",
"banner": [
"http",
"ssh",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}