175.27.240.203
{
"scan_id": 1767781098,
"ip": "175.27.240.203",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "175.27.224.0/19",
"postal_code": "",
"coordinates": {
"latitude": "32.0589",
"longitude": "118.7738"
},
"geo_point": "32.0589, 118.7738",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": "Nanjing"
},
"location_updated_at": "2026-01-07T16:42:18Z",
"asn": {
"number": "AS45090",
"organization": "Shenzhen Tencent Computer Systems Company Limited",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "175.27.0.0/16",
"organization": "China Internet Network Information Center",
"descr": "China Internet Network Information Center,\nFloor1, Building No.1 C/-Chinese Academy of Sciences,\n4, South 4th Street,\nHaidian District,",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:08Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-01-07T16:42:18Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-01-07T23:28:21Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-01-07T16:42:18Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "7.4",
"product": "OpenSSH",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:7.4",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "7\\.4",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_7.4",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"ssh-rsa",
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "00bf663c4b46ddf1887cd50812c78d124eb3b2b0e65d18050d2b0701d2e3757a",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBAjf+8AWqFepBAERJkopq1PsxXnazaPW0VUfqAr2pZGIXt2ExdRrG/NTVE1d1zf3hbl8g5cBfXH1ZhzmXSu89g0="
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_7.4",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2016-20012",
"score": 5.3,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-10T02:15:05.198Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"url": "http://175.27.240.203/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-07T22:55:34.426Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html lang=\"zh-Hans\">\n <head>\n \n <meta charset=\"utf-8\" />\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\" />\n <meta name=\"viewport\" content=\"width=device-width\" />\n <meta name=\"theme-color\" content=\"#000\" />\n\n <title>Grafana</title>\n\n <base href=\"/\" />\n\n <link rel=\"icon\" type=\"image/png\" href=\"public/img/fav32.png\" />\n <link rel=\"apple-touch-icon\" sizes=\"180x180\" href=\"public/img/apple-touch-icon.png\" />\n <link rel=\"mask-icon\" href=\"public/img/grafana_mask_icon.svg\" color=\"#F05A28\" />\n\n \n <link rel=\"stylesheet\" href=\"public/build/grafana.app.236e53eabc3f6ade9d45.css\" />\n \n\n \n \n <link rel=\"stylesheet\" href=\"public/build/grafana.dark.23c5425b7a9e1580d499.css\" />\n \n\n <script nonce=\"\">\n performance.mark('frontend_boot_css_time_seconds');\n </script>\n\n <meta name=\"apple-mobile-web-app-capable\" content=\"yes\" />\n <meta name=\"mobile-web-app-capable\" content=\"yes\" />\n <meta name=\"apple-mobile-web-app-status-bar-style\" content=\"black\" />\n <meta name=\"msapplication-TileColor\" content=\"#2b5797\" />\n <meta name=\"msapplication-config\" content=\"public/img/browserconfig.xml\" />\n </head>\n\n <body class=\"theme-dark app-grafana\">\n <style>\n .preloader {\n height: 100%;\n flex-direction: column;\n display: flex;\n justify-content: center;\n align-items: center;\n margin: 0 32px;\n }\n\n .preloader__enter {\n opacity: 0;\n animation-name: preloader-fade-in;\n animation-iteration-count: 1;\n animation-duration: 0.9s;\n animation-delay: 0.5s;\n animation-fill-mode: forwards;\n }\n\n .preloader__bounce {\n text-align: center;\n animation-name: preloader-bounce;\n animation-duration: 0.9s;\n animation-iteration-count: infinite;\n }\n\n .preloader__logo {\n display: inline-block;\n animation-name: preloader-squash;\n animation-duration: 0.9s;\n animation-iteration-count: infinite;\n width: 60px;\n height: 60px;\n background-repeat: no-repeat;\n background-size: contain;\n background-image: url('public/img/grafana_icon.svg');\n }\n\n .preloader__text {\n margin-top: 16px;\n font-weight: 500;\n font-size: 14px;\n font-family: Sans-serif;\n opacity: 0;\n animation-name: preloader-fade-in;\n animation-duration: 0.9s;\n animation-delay: 0.5s;\n animation-fill-mode: forwards;\n }\n\n .theme-light .preloader__text {\n color: #52545c;\n }\n\n .theme-dark .preloader__text {\n color: #d8d9da;\n }\n\n @keyframes preloader-fade-in {\n 0% {\n opacity: 0;\n \n animation-timing-function: cubic-bezier(0, 0, 0.5, 1);\n }\n 100% {\n opacity: 1;\n }\n }\n\n @keyframes preloader-bounce {\n from,\n to {\n transform: translateY(0px);\n animation-timing-function: cubic-bezier(0.3, 0, 0.1, 1);\n }\n 50% {\n transform: translateY(-50px);\n animation-timing-function: cubic-bezier(0.9, 0, 0.7, 1);\n }\n }\n\n @keyframes preloader-squash {\n 0% {\n transform: scaleX(1.3) scaleY(0.8);\n animation-timing-function: cubic-bezier(0.3, 0, 0.1, 1);\n }\n 15% {\n transform: scaleX(0.75) scaleY(1.25);\n animation-timing-function: cubic-bezier(0, 0, 0.7, 0.75);\n }\n 55% {\n transform: scaleX(1.05) scaleY(0.95);\n animation-timing-function: cubic-bezier(0.9, 0, 1, 1);\n }\n 95% {\n transform: scaleX(0.75) scaleY(1.25);\n animation-timing-function: cubic-bezier(0, 0, 0, 1);\n }\n 100% {\n transform: scaleX(1.3) scaleY(0.8);\n animation-timing-function: cubic-bezier(0, 0, 0.7, 1);\n }\n }\n\n \n .preloader__text--fail {\n display: none;\n }\n\n \n .preloader--done .preloader__bounce,\n .preloader--done .preloader__logo {\n animation-name: none;\n display: none;\n }\n\n .preloader--done .preloader__logo,\n .preloader--done .preloader__text {\n display: none;\n color: #ff5705 !important;\n font-size: 15px;\n }\n\n .theme-light .preloader--done .preloader__text {\n color: #52545c !important;\n }\n\n .preloader--done .preloader__text--fail {\n display: block;\n }\n\n .preloader--done .preloader__text--fail a {\n color: white;\n }\n\n .theme-light .preloader--done .preloader__text--fail a {\n color: rgb(31, 98, 224);\n }\n\n .preloader--done code {\n white-space: nowrap;\n padding: 2px 5px;\n margin: 0px 2px;\n font-size: 0.8rem;\n background-color: rgb(24, 27, 31);\n color: rgb(204, 204, 220);\n border: 1px solid rgba(204, 204, 220, 0.2);\n border-radius: 4px;\n }\n\n .preloader__error-list li {\n margin-bottom: 8px;\n }\n\n [ng\\:cloak],\n [ng-cloak],\n .ng-cloak {\n display: none !important;\n }\n </style>\n\n <div class=\"preloader\">\n <div class=\"preloader__enter\">\n <div class=\"preloader__bounce\">\n <div class=\"preloader__logo\" aria-live=\"polite\" role=\"status\" aria-label=\"Loading Grafana\"></div>\n </div>\n </div>\n <div class=\"preloader__text preloader__text--fail\">\n <main>\n <h1>If you're seeing this Grafana has failed to load its application files</h1>\n <ol class=\"preloader__error-list\">\n <li>This could be caused by your reverse proxy settings.</li>\n <li>If you host grafana under a subpath make sure your <code>grafana.ini</code> <code>root_url</code> setting\n includes subpath. If not using a reverse proxy make sure to set <code>serve_from_sub_path</code> to true.</li>\n <li>If you have a local dev build make sure you build frontend using: <code>yarn start</code>, or\n <code>yarn build</code>.</li>\n <li>Sometimes restarting <code>grafana-server</code> can help.</li>\n <li>Check if you are using a non-supported browser. For more information, refer to the list of\n <a href=\"https://grafana.com/docs/grafana/latest/installation/requirements/#supported-web-browsers\">\n supported browsers </a\n >.</li>\n </ol>\n </main>\n </div>\n <script nonce=\"\">\n \n \n function checkBrowserCompatibility() {\n var isIE = navigator.userAgent.indexOf('MSIE') > -1;\n var isEdge = navigator.userAgent.indexOf('Edge/') > -1 || navigator.userAgent.indexOf('Edg/') > -1;\n var isFirefox = navigator.userAgent.toLowerCase().indexOf('firefox') > -1;\n var isChrome = /Chrome/.test(navigator.userAgent) && /Google Inc/.test(navigator.vendor);\n\n \n\n var isEdgeVersion = /Edge\\/([0-9.]+)/.exec(navigator.userAgent);\n\n if (isIE && parseFloat(/Trident\\/([0-9.]+)/.exec(navigator.userAgent)[1]) <= 7) {\n return false;\n } else if (\n isEdge &&\n ((isEdgeVersion && parseFloat(isEdgeVersion[1]) <= 16) ||\n parseFloat(/Edg\\/([0-9.]+)/.exec(navigator.userAgent)[1]) <= 16)\n ) {\n return false;\n } else if (isFirefox && parseFloat(/Firefox\\/([0-9.]+)/.exec(navigator.userAgent)[1]) <= 64) {\n return false;\n } else if (isChrome && parseFloat(/Chrome\\/([0-9.]+)/.exec(navigator.userAgent)[1]) <= 54) {\n return false;\n }\n\n return true;\n }\n\n if (!checkBrowserCompatibility()) {\n alert('Your browser is not fully supported, please try newer version.');\n }\n </script>\n </div>\n\n <div id=\"reactRoot\"></div>\n\n <script nonce=\"\">\n window.grafanaBootData = {\n user: {\"isSignedIn\":false,\"id\":0,\"uid\":\"\",\"login\":\"\",\"email\":\"\",\"name\":\"\",\"theme\":\"dark\",\"lightTheme\":false,\"orgCount\":1,\"orgId\":0,\"orgName\":\"\",\"orgRole\":\"\",\"isGrafanaAdmin\":false,\"gravatarUrl\":\"\",\"timezone\":\"browser\",\"weekStart\":\"browser\",\"locale\":\"en-US\",\"regionalFormat\":\"\",\"language\":\"zh-Hans\",\"helpFlags1\":0,\"hasEditPermissionInFolders\":false,\"authenticatedBy\":\"\",\"permissions\":{\"folders:read\":true},\"analytics\":{\"identifier\":\"@https://gfa.lvfunai.com/\"}},\n settings: {\"defaultDatasource\":\"-- Grafana --\",\"datasources\":{\"-- Dashboard --\":{\"type\":\"datasource\",\"name\":\"-- Dashboard --\",\"meta\":{\"id\":\"dashboard\",\"type\":\"datasource\",\"name\":\"-- Dashboard --\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Uses the result set from another panel in the same dashboard\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"}],\"logos\":{\"small\":\"public/plugins/dashboard/img/icn-reusequeries.svg\",\"large\":\"public/plugins/dashboard/img/icn-reusequeries.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"dependencies\":{\"grafanaDependency\":\"\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[]}},\"includes\":null,\"category\":\"\",\"preload\":false,\"backend\":false,\"routes\":null,\"skipDataQuery\":false,\"autoEnabled\":false,\"annotations\":false,\"metrics\":true,\"alerting\":false,\"explore\":false,\"tables\":false,\"logs\":false,\"tracing\":false,\"builtIn\":true,\"streaming\":false,\"signature\":\"internal\",\"module\":\"core:plugin/dashboard\",\"baseUrl\":\"public/plugins/dashboard\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"multiValueFilterOperators\":false,\"loadingStrategy\":\"\",\"extensions\":{\"addedLinks\":null,\"addedComponents\":null,\"exposedComponents\":null,\"extensionPoints\":null,\"addedFunctions\":null}},\"isDefault\":false,\"preload\":false,\"jsonData\":{},\"readOnly\":false,\"cachingConfig\":{\"enabled\":false,\"TTLMs\":0}},\"-- Grafana --\":{\"id\":-1,\"uid\":\"grafana\",\"type\":\"datasource\",\"name\":\"-- Grafana --\",\"meta\":{\"id\":\"grafana\",\"type\":\"datasource\",\"name\":\"-- Grafana --\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"A built-in data source that generates random walk data and can poll the Testdata data source. This helps you test visualizations and run experiments.\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"}],\"logos\":{\"small\":\"public/plugins/grafana/img/icn-grafanadb.svg\",\"large\":\"public/plugins/grafana/img/icn-grafanadb.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"dependencies\":{\"grafanaDependency\":\"\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[]}},\"includes\":null,\"category\":\"\",\"preload\":false,\"backend\":true,\"routes\":null,\"skipDataQuery\":false,\"autoEnabled\":false,\"annotations\":true,\"metrics\":true,\"alerting\":false,\"explore\":false,\"tables\":false,\"logs\":false,\"tracing\":false,\"builtIn\":true,\"streaming\":false,\"signature\":\"internal\",\"module\":\"core:plugin/grafana\",\"baseUrl\":\"public/plugins/grafana\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"multiValueFilterOperators\":false,\"loadingStrategy\":\"\",\"extensions\":{\"addedLinks\":null,\"addedComponents\":null,\"exposedComponents\":null,\"extensionPoints\":null,\"addedFunctions\":null}},\"isDefault\":false,\"preload\":false,\"jsonData\":{},\"readOnly\":false,\"cachingConfig\":{\"enabled\":false,\"TTLMs\":0}},\"-- Mixed --\":{\"type\":\"datasource\",\"name\":\"-- Mixed --\",\"meta\":{\"id\":\"mixed\",\"type\":\"datasource\",\"name\":\"-- Mixed --\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Lets you query multiple data sources in the same panel.\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/datasources/#special-data-sources\"}],\"logos\":{\"small\":\"public/plugins/mixed/img/icn-mixeddatasources.svg\",\"large\":\"public/plugins/mixed/img/icn-mixeddatasources.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"dependencies\":{\"grafanaDependency\":\"\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[]}},\"includes\":null,\"category\":\"\",\"preload\":false,\"backend\":false,\"routes\":null,\"skipDataQuery\":false,\"autoEnabled\":false,\"annotations\":false,\"metrics\":true,\"alerting\":false,\"explore\":false,\"tables\":false,\"logs\":false,\"tracing\":false,\"queryOptions\":{\"minInterval\":true},\"builtIn\":true,\"mixed\":true,\"streaming\":false,\"signature\":\"internal\",\"module\":\"core:plugin/mixed\",\"baseUrl\":\"public/plugins/mixed\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"multiValueFilterOperators\":false,\"loadingStrategy\":\"\",\"extensions\":{\"addedLinks\":null,\"addedComponents\":null,\"exposedComponents\":null,\"extensionPoints\":null,\"addedFunctions\":null}},\"isDefault\":false,\"preload\":false,\"jsonData\":{},\"readOnly\":false,\"cachingConfig\":{\"enabled\":false,\"TTLMs\":0}}},\"minRefreshInterval\":\"5s\",\"panels\":{\"alertlist\":{\"id\":\"alertlist\",\"name\":\"Alert list\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Shows list of alerts and their current status\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/alert-list/\"}],\"logos\":{\"small\":\"public/plugins/alertlist/img/icn-singlestat-panel.svg\",\"large\":\"public/plugins/alertlist/img/icn-singlestat-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":15,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/alertlist\",\"signature\":\"internal\",\"module\":\"core:plugin/alertlist\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"annolist\":{\"id\":\"annolist\",\"name\":\"Annotations list\",\"aliasIds\":[\"ryantxu-annolist-panel\"],\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"List annotations\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/annotations/\"}],\"logos\":{\"small\":\"public/plugins/annolist/img/icn-annolist-panel.svg\",\"large\":\"public/plugins/annolist/img/icn-annolist-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/annolist\",\"signature\":\"internal\",\"module\":\"core:plugin/annolist\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"barchart\":{\"id\":\"barchart\",\"name\":\"Bar chart\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Categorical charts with group support\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/bar-chart/\"}],\"logos\":{\"small\":\"public/plugins/barchart/img/barchart.svg\",\"large\":\"public/plugins/barchart/img/barchart.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":2,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/barchart\",\"signature\":\"internal\",\"module\":\"core:plugin/barchart\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"bargauge\":{\"id\":\"bargauge\",\"name\":\"Bar gauge\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Horizontal and vertical gauges\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/bar-gauge/\"}],\"logos\":{\"small\":\"public/plugins/bargauge/img/icon_bar_gauge.svg\",\"large\":\"public/plugins/bargauge/img/icon_bar_gauge.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":5,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/bargauge\",\"signature\":\"internal\",\"module\":\"core:plugin/bargauge\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"candlestick\":{\"id\":\"candlestick\",\"name\":\"Candlestick\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Graphical representation of price movements of a security, derivative, or currency.\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/candlestick/\"}],\"logos\":{\"small\":\"public/plugins/candlestick/img/candlestick.svg\",\"large\":\"public/plugins/candlestick/img/candlestick.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":[\"financial\",\"price\",\"currency\",\"k-line\"]},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/candlestick\",\"signature\":\"internal\",\"module\":\"core:plugin/candlestick\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"canvas\":{\"id\":\"canvas\",\"name\":\"Canvas\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Explicit element placement\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/canvas/\"}],\"logos\":{\"small\":\"public/plugins/canvas/img/icn-canvas.svg\",\"large\":\"public/plugins/canvas/img/icn-canvas.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/canvas\",\"signature\":\"internal\",\"module\":\"core:plugin/canvas\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"dashlist\":{\"id\":\"dashlist\",\"name\":\"Dashboard list\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"List of dynamic links to other dashboards\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/dashboard-list/\"}],\"logos\":{\"small\":\"public/plugins/dashlist/img/icn-dashlist-panel.svg\",\"large\":\"public/plugins/dashlist/img/icn-dashlist-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":16,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/dashlist\",\"signature\":\"internal\",\"module\":\"core:plugin/dashlist\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"flamegraph\":{\"id\":\"flamegraph\",\"name\":\"Flame Graph\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/flame-graph/\"}],\"logos\":{\"small\":\"public/plugins/flamegraph/img/icn-flamegraph.svg\",\"large\":\"public/plugins/flamegraph/img/icn-flamegraph.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/flamegraph\",\"signature\":\"internal\",\"module\":\"core:plugin/flamegraph\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"gauge\":{\"id\":\"gauge\",\"name\":\"Gauge\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Standard gauge visualization\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/gauge/\"}],\"logos\":{\"small\":\"public/plugins/gauge/img/icon_gauge.svg\",\"large\":\"public/plugins/gauge/img/icon_gauge.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":4,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/gauge\",\"signature\":\"internal\",\"module\":\"core:plugin/gauge\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"geomap\":{\"id\":\"geomap\",\"name\":\"Geomap\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Geomap panel\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/geomap/\"}],\"logos\":{\"small\":\"public/plugins/geomap/img/icn-geomap.svg\",\"large\":\"public/plugins/geomap/img/icn-geomap.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/geomap\",\"signature\":\"internal\",\"module\":\"core:plugin/geomap\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"gettingstarted\":{\"id\":\"gettingstarted\",\"name\":\"Getting Started\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"}],\"logos\":{\"small\":\"public/plugins/gettingstarted/img/icn-dashlist-panel.svg\",\"large\":\"public/plugins/gettingstarted/img/icn-dashlist-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":true,\"sort\":100,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/gettingstarted\",\"signature\":\"internal\",\"module\":\"core:plugin/gettingstarted\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"heatmap\":{\"id\":\"heatmap\",\"name\":\"Heatmap\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Like a histogram over time\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/heatmap/\"}],\"logos\":{\"small\":\"public/plugins/heatmap/img/icn-heatmap-panel.svg\",\"large\":\"public/plugins/heatmap/img/icn-heatmap-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":10,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/heatmap\",\"signature\":\"internal\",\"module\":\"core:plugin/heatmap\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"histogram\":{\"id\":\"histogram\",\"name\":\"Histogram\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Distribution of values presented as a bar chart.\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/histogram/\"}],\"logos\":{\"small\":\"public/plugins/histogram/img/histogram.svg\",\"large\":\"public/plugins/histogram/img/histogram.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":[\"distribution\",\"bar chart\",\"frequency\",\"proportional\"]},\"hideFromList\":false,\"sort\":12,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/histogram\",\"signature\":\"internal\",\"module\":\"core:plugin/histogram\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"logs\":{\"id\":\"logs\",\"name\":\"Logs\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/logs/\"}],\"logos\":{\"small\":\"public/plugins/logs/img/icn-logs-panel.svg\",\"large\":\"public/plugins/logs/img/icn-logs-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/logs\",\"signature\":\"internal\",\"module\":\"core:plugin/logs\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"news\":{\"id\":\"news\",\"name\":\"News\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"RSS feed reader\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/news/\"}],\"logos\":{\"small\":\"public/plugins/news/img/news.svg\",\"large\":\"public/plugins/news/img/news.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":17,\"skipDataQuery\":true,\"state\":\"beta\",\"baseUrl\":\"public/plugins/news\",\"signature\":\"internal\",\"module\":\"core:plugin/news\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"nodeGraph\":{\"id\":\"nodeGraph\",\"name\":\"Node Graph\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/node-graph/\"}],\"logos\":{\"small\":\"public/plugins/nodeGraph/img/icn-node-graph.svg\",\"large\":\"public/plugins/nodeGraph/img/icn-node-graph.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/nodeGraph\",\"signature\":\"internal\",\"module\":\"core:plugin/nodeGraph\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"piechart\":{\"id\":\"piechart\",\"name\":\"Pie chart\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"The new core pie chart visualization\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/pie-chart/\"}],\"logos\":{\"small\":\"public/plugins/piechart/img/icon_piechart.svg\",\"large\":\"public/plugins/piechart/img/icon_piechart.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":8,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/piechart\",\"signature\":\"internal\",\"module\":\"core:plugin/piechart\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"stat\":{\"id\":\"stat\",\"name\":\"Stat\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Big stat values \\u0026 sparklines\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/stat/\"}],\"logos\":{\"small\":\"public/plugins/stat/img/icn-singlestat-panel.svg\",\"large\":\"public/plugins/stat/img/icn-singlestat-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":3,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/stat\",\"signature\":\"internal\",\"module\":\"core:plugin/stat\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"state-timeline\":{\"id\":\"state-timeline\",\"name\":\"State timeline\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"State changes and durations\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/state-timeline/\"}],\"logos\":{\"small\":\"public/plugins/state-timeline/img/timeline.svg\",\"large\":\"public/plugins/state-timeline/img/timeline.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":9,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/state-timeline\",\"signature\":\"internal\",\"module\":\"core:plugin/state-timeline\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"status-history\":{\"id\":\"status-history\",\"name\":\"Status history\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Periodic status history\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/status-history/\"}],\"logos\":{\"small\":\"public/plugins/status-history/img/status.svg\",\"large\":\"public/plugins/status-history/img/status.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":11,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/status-history\",\"signature\":\"internal\",\"module\":\"core:plugin/status-history\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"table\":{\"id\":\"table\",\"name\":\"Table\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Supports many column styles\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/table/\"}],\"logos\":{\"small\":\"public/plugins/table/img/icn-table-panel.svg\",\"large\":\"public/plugins/table/img/icn-table-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":6,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/table\",\"signature\":\"internal\",\"module\":\"core:plugin/table\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"text\":{\"id\":\"text\",\"name\":\"Text\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Supports markdown and html content\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/text/\"}],\"logos\":{\"small\":\"public/plugins/text/img/icn-text-panel.svg\",\"large\":\"public/plugins/text/img/icn-text-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":14,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/text\",\"signature\":\"internal\",\"module\":\"core:plugin/text\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"timeseries\":{\"id\":\"timeseries\",\"name\":\"Time series\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Time based line, area and bar charts\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/time-series/\"}],\"logos\":{\"small\":\"public/plugins/timeseries/img/icn-timeseries-panel.svg\",\"large\":\"public/plugins/timeseries/img/icn-timeseries-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":1,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/timeseries\",\"signature\":\"internal\",\"module\":\"core:plugin/timeseries\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"traces\":{\"id\":\"traces\",\"name\":\"Traces\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/traces/\"}],\"logos\":{\"small\":\"public/plugins/traces/img/traces-panel.svg\",\"large\":\"public/plugins/traces/img/traces-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/traces\",\"signature\":\"internal\",\"module\":\"core:plugin/traces\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"trend\":{\"id\":\"trend\",\"name\":\"Trend\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Like timeseries, but when x != time\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/trend/\"}],\"logos\":{\"small\":\"public/plugins/trend/img/trend.svg\",\"large\":\"public/plugins/trend/img/trend.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"beta\",\"baseUrl\":\"public/plugins/trend\",\"signature\":\"internal\",\"module\":\"core:plugin/trend\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"welcome\":{\"id\":\"welcome\",\"name\":\"Welcome\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"}],\"logos\":{\"small\":\"public/plugins/welcome/img/icn-dashlist-panel.svg\",\"large\":\"public/plugins/welcome/img/icn-dashlist-panel.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":null},\"hideFromList\":true,\"sort\":100,\"skipDataQuery\":true,\"state\":\"\",\"baseUrl\":\"public/plugins/welcome\",\"signature\":\"internal\",\"module\":\"core:plugin/welcome\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"},\"xychart\":{\"id\":\"xychart\",\"name\":\"XY Chart\",\"info\":{\"author\":{\"name\":\"Grafana Labs\",\"url\":\"https://grafana.com\"},\"description\":\"Supports arbitrary X vs Y in a graph to visualize the relationship between two variables.\",\"links\":[{\"name\":\"Raise issue\",\"url\":\"https://github.com/grafana/grafana/issues/new\"},{\"name\":\"Documentation\",\"url\":\"https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/xy-chart/\"}],\"logos\":{\"small\":\"public/plugins/xychart/img/icn-xychart.svg\",\"large\":\"public/plugins/xychart/img/icn-xychart.svg\"},\"build\":{},\"screenshots\":null,\"version\":\"\",\"updated\":\"\",\"keywords\":[\"scatter\",\"plot\"]},\"hideFromList\":false,\"sort\":100,\"skipDataQuery\":false,\"state\":\"\",\"baseUrl\":\"public/plugins/xychart\",\"signature\":\"internal\",\"module\":\"core:plugin/xychart\",\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\"}},\"apps\":{\"grafana-exploretraces-app\":{\"id\":\"grafana-exploretraces-app\",\"path\":\"public/plugins/grafana-exploretraces-app/module.js\",\"version\":\"1.2.0\",\"preload\":true,\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\",\"extensions\":{\"addedLinks\":[{\"targets\":[\"grafana/dashboard/panel/menu\"],\"title\":\"Open in Traces Drilldown\",\"description\":\"Open current query in the Traces Drilldown app\"},{\"targets\":[\"grafana/explore/toolbar/action\"],\"title\":\"Open in Grafana Traces Drilldown\",\"description\":\"Try our new queryless experience for traces\"}],\"addedComponents\":[{\"targets\":[\"grafana-asserts-app/entity-assertions-widget/v1\"],\"title\":\"Asserts widget\",\"description\":\"A block with assertions for a given service\"},{\"targets\":[\"grafana-asserts-app/insights-timeline-widget/v1\"],\"title\":\"Insights Timeline Widget\",\"description\":\"Widget for displaying insights timeline in other apps\"}],\"exposedComponents\":[{\"id\":\"grafana-exploretraces-app/open-in-explore-traces-button/v1\",\"title\":\"Open in Traces Drilldown button\",\"description\":\"A button that opens a traces view in the Traces Drilldown app.\"},{\"id\":\"grafana-exploretraces-app/embedded-trace-exploration/v1\",\"title\":\"Embedded Trace Exploration\",\"description\":\"A component that renders a trace exploration view that can be embedded in other parts of Grafana.\"}],\"extensionPoints\":[{\"id\":\"grafana-exploretraces-app/investigation/v1\",\"title\":\"\",\"description\":\"\"}],\"addedFunctions\":[]},\"dependencies\":{\"grafanaDependency\":\"\\u003e=11.5.0\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[\"grafana-asserts-app/entity-assertions-widget/v1\",\"grafana-asserts-app/insights-timeline-widget/v1\"]}}},\"grafana-lokiexplore-app\":{\"id\":\"grafana-lokiexplore-app\",\"path\":\"public/plugins/grafana-lokiexplore-app/module.js\",\"version\":\"1.0.29\",\"preload\":true,\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\",\"extensions\":{\"addedLinks\":[{\"targets\":[\"grafana/dashboard/panel/menu\",\"grafana/explore/toolbar/action\",\"grafana-metricsdrilldown-app/open-in-logs-drilldown/v1\",\"grafana-assistant-app/navigateToDrilldown/v1\"],\"title\":\"Open in Grafana Logs Drilldown\",\"description\":\"Open current query in the Grafana Logs Drilldown view\"}],\"addedComponents\":[{\"targets\":[\"grafana-asserts-app/insights-timeline-widget/v1\"],\"title\":\"Insights Timeline Widget\",\"description\":\"Widget for displaying insights timeline in other apps\"}],\"exposedComponents\":[{\"id\":\"grafana-lokiexplore-app/open-in-explore-logs-button/v1\",\"title\":\"Open in Logs Drilldown button\",\"description\":\"A button that opens a logs view in the Logs Drilldown app.\"},{\"id\":\"grafana-lokiexplore-app/embedded-logs-exploration/v1\",\"title\":\"Embedded Logs Exploration\",\"description\":\"A component that renders a logs exploration view that can be embedded in other parts of Grafana.\"}],\"extensionPoints\":[{\"id\":\"grafana-lokiexplore-app/investigation/v1\",\"title\":\"\",\"description\":\"\"}],\"addedFunctions\":[]},\"dependencies\":{\"grafanaDependency\":\"\\u003e=11.6.0\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[\"grafana-adaptivelogs-app/temporary-exemptions/v1\",\"grafana-lokiexplore-app/embedded-logs-exploration/v1\",\"grafana-asserts-app/insights-timeline-widget/v1\"]}}},\"grafana-metricsdrilldown-app\":{\"id\":\"grafana-metricsdrilldown-app\",\"path\":\"public/plugins/grafana-metricsdrilldown-app/module.js\",\"version\":\"1.0.18\",\"preload\":true,\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\",\"extensions\":{\"addedLinks\":[{\"targets\":[\"grafana/dashboard/panel/menu\",\"grafana/explore/toolbar/action\",\"grafana-assistant-app/navigateToDrilldown/v1\",\"grafana/alerting/alertingrule/queryeditor\"],\"title\":\"Open in Grafana Metrics Drilldown\",\"description\":\"Open current query in the Grafana Metrics Drilldown view\"},{\"targets\":[\"grafana-metricsdrilldown-app/grafana-assistant-app/navigateToDrilldown/v0-alpha\"],\"title\":\"Navigate to metrics drilldown\",\"description\":\"Build a url path to the metrics drilldown\"},{\"targets\":[\"grafana/datasources/config/actions\",\"grafana/datasources/config/status\"],\"title\":\"Open in Metrics Drilldown\",\"description\":\"Browse metrics in Grafana Metrics Drilldown\"}],\"addedComponents\":[],\"exposedComponents\":[{\"id\":\"grafana-metricsdrilldown-app/label-breakdown-component/v1\",\"title\":\"Label Breakdown\",\"description\":\"A metrics label breakdown view from the Metrics Drilldown app.\"}],\"extensionPoints\":[{\"id\":\"grafana-exploremetrics-app/investigation/v1\",\"title\":\"\",\"description\":\"\"},{\"id\":\"grafana-metricsdrilldown-app/open-in-logs-drilldown/v1\",\"title\":\"\",\"description\":\"\"}],\"addedFunctions\":[]},\"dependencies\":{\"grafanaDependency\":\"\\u003e=11.6.0\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[]}}},\"grafana-pyroscope-app\":{\"id\":\"grafana-pyroscope-app\",\"path\":\"public/plugins/grafana-pyroscope-app/module.js\",\"version\":\"1.10.1\",\"preload\":true,\"angular\":{\"detected\":false,\"hideDeprecation\":false},\"loadingStrategy\":\"script\",\"extensions\":{\"addedLinks\":[{\"targets\":[\"grafana/explore/toolbar/action\",\"grafana/traceview/details\",\"grafana-assistant-app/navigateToDrilldown/v1\"],\"title\":\"Open in Grafana Profiles Drilldown\",\"description\":\"Try our new queryless experience for profiles\"}],\"addedComponents\":[],\"exposedComponents\":[],\"extensionPoints\":[{\"id\":\"grafana-pyroscope-app/investigation/v1\",\"title\":\"\",\"description\":\"\"},{\"id\":\"grafana-pyroscope-app/settings/v1\",\"title\":\"\",\"description\":\"\"}],\"addedFunctions\":[]},\"dependencies\":{\"grafanaDependency\":\"\\u003e=11.5.0\",\"grafanaVersion\":\"*\",\"plugins\":[],\"extensions\":{\"exposedComponents\":[\"grafana-o11yinsights-app/insights-launcher/v1\"]}}}},\"appUrl\":\"https://gfa.lvfunai.com/\",\"appSubUrl\":\"\",\"allowOrgCreate\":false,\"authProxyEnabled\":false,\"ldapEnabled\":false,\"jwtHeaderName\":\"\",\"jwtUrlLogin\":false,\"liveEnabled\":true,\"liveMessageSizeLimit\":65536,\"autoAssignOrg\":true,\"verifyEmailEnabled\":false,\"sigV4AuthEnabled\":false,\"azureAuthEnabled\":false,\"rbacEnabled\":true,\"exploreEnabled\":true,\"helpEnabled\":true,\"profileEnabled\":true,\"newsFeedEnabled\":true,\"queryHistoryEnabled\":true,\"googleAnalyticsId\":\"\",\"googleAnalytics4Id\":\"\",\"GoogleAnalytics4SendManualPageViews\":false,\"rudderstackWriteKey\":\"\",\"rudderstackDataPlaneUrl\":\"\",\"rudderstackSdkUrl\":\"\",\"rudderstackConfigUrl\":\"\",\"rudderstackIntegrationsUrl\":\"\",\"analyticsConsoleReporting\":false,\"dashboardPerformanceMetrics\":[],\"panelSeriesLimit\":0,\"feedbackLinksEnabled\":true,\"applicationInsightsConnectionString\":\"\",\"applicationInsightsEndpointUrl\":\"\",\"disableLoginForm\":false,\"disableUserSignUp\":true,\"loginHint\":\"\",\"passwordHint\":\"\",\"externalUserMngInfo\":\"\",\"externalUserMngLinkUrl\":\"\",\"externalUserMngLinkName\":\"\",\"externalUserMngAnalytics\":false,\"externalUserMngAnalyticsParams\":\"\",\"viewersCanEdit\":false,\"disableSanitizeHtml\":false,\"trustedTypesDefaultPolicyEnabled\":false,\"cspReportOnlyEnabled\":false,\"enableFrontendSandboxForPlugins\":[\"\"],\"exploreDefaultTimeOffset\":\"1h\",\"exploreHideLogsDownload\":false,\"auth\":{\"AuthProxyEnableLoginToken\":false,\"OAuthSkipOrgRoleUpdateSync\":false,\"SAMLSkipOrgRoleSync\":false,\"LDAPSkipOrgRoleSync\":false,\"GoogleSkipOrgRoleSync\":false,\"GenericOAuthSkipOrgRoleSync\":false,\"JWTAuthSkipOrgRoleSync\":false,\"GrafanaComSkipOrgRoleSync\":false,\"AzureADSkipOrgRoleSync\":false,\"GithubSkipOrgRoleSync\":false,\"GitLabSkipOrgRoleSync\":false,\"OktaSkipOrgRoleSync\":false,\"disableLogin\":false,\"basicAuthStrongPasswordPolicy\":false,\"passwordlessEnabled\":false,\"disableSignoutMenu\":false},\"buildInfo\":{\"hideVersion\":false,\"version\":\"12.1.1\",\"versionString\":\"Grafana v12.1.1 (df5de8219b)\",\"commit\":\"df5de8219b41d1e639e003bf5f3a85913761d167\",\"commitShort\":\"df5de8219b\",\"buildstamp\":1760954700,\"edition\":\"Open Source\",\"latestVersion\":\"12.3.1\",\"hasUpdate\":true,\"env\":\"production\"},\"licenseInfo\":{\"expiry\":0,\"stateInfo\":\"\",\"licenseUrl\":\"https://grafana.com/oss/grafana?utm_source=grafana_footer\",\"edition\":\"Open Source\",\"enabledFeatures\":{}},\"featureToggles\":{\"addFieldFromCalculationStatFunctions\":true,\"alertRuleRestore\":true,\"alertingBulkActionsInUI\":true,\"alertingImportYAMLUI\":true,\"alertingMigrationUI\":true,\"alertingNotificationsStepMode\":true,\"alertingQueryAndExpressionsStepMode\":true,\"alertingRulePermanentlyDelete\":true,\"alertingRuleRecoverDeleted\":true,\"alertingRuleVersionHistoryRestore\":true,\"alertingUIOptimizeReducer\":true,\"annotationPermissionUpdate\":true,\"awsAsyncQueryCaching\":true,\"awsDatasourcesTempCredentials\":true,\"azureMonitorEnableUserAuth\":true,\"azureMonitorPrometheusExemplars\":true,\"cloudWatchCrossAccountQuerying\":true,\"cloudWatchNewLabelParsing\":true,\"cloudWatchRoundUpEndTime\":true,\"correlations\":true,\"dashboardScene\":true,\"dashboardSceneForViewers\":true,\"dashboardSceneSolo\":true,\"dashgpt\":true,\"dataplaneFrontendFallback\":true,\"externalCorePlugins\":true,\"formatString\":true,\"grafanaconThemes\":true,\"groupToNestedTableTransformation\":true,\"improvedExternalSessionHandling\":true,\"improvedExternalSessionHandlingSAML\":true,\"influxdbBackendMigration\":true,\"jaegerBackendMigration\":true,\"kubernetesClientDashboardsFolders\":true,\"logRowsPopoverMenu\":true,\"logsContextDatasourceUi\":true,\"logsExploreTableVisualisation\":true,\"logsInfiniteScrolling\":true,\"logsPanelControls\":true,\"lokiLabelNamesQueryApi\":true,\"lokiQuerySplitting\":true,\"nestedFolders\":true,\"newDashboardSharingComponent\":true,\"newFiltersUI\":true,\"newPDFRendering\":true,\"onPremToCloudMigrations\":true,\"panelMonitoring\":true,\"pinNavItems\":true,\"pluginsDetailsRightPanel\":true,\"preinstallAutoUpdate\":true,\"promQLScope\":true,\"prometheusAzureOverrideAudience\":true,\"publicDashboardsScene\":true,\"recordedQueriesMulti\":true,\"skipTokenRotationIfRecent\":true,\"ssoSettingsLDAP\":true,\"ssoSettingsSAML\":true,\"tabularNumbers\":true,\"teamHttpHeadersMimir\":true,\"tlsMemcached\":true,\"topnav\":true,\"transformationsRedesign\":true,\"unifiedRequestLog\":true,\"unifiedStorageHistoryPruner\":true,\"unifiedStorageSearchPermissionFiltering\":true,\"useSessionStorageForRedirection\":true},\"anonymousEnabled\":false,\"anonymousDeviceLimit\":0,\"rendererAvailable\":false,\"rendererVersion\":\"\",\"rendererDefaultImageWidth\":1000,\"rendererDefaultImageHeight\":500,\"rendererDefaultImageScale\":1,\"http2Enabled\":false,\"grafanaJavascriptAgent\":{\"enabled\":false,\"customEndpoint\":\"/log-grafana-javascript-agent\",\"allInstrumentationEnabeld\":false,\"errorInstrumentalizationEnabled\":true,\"consoleInstrumentalizationEnabled\":false,\"webVitalsInstrumentalizationEnabled\":false,\"tracingInstrumentalizationEnabled\":false,\"internalLoggerLevel\":0,\"apiKey\":\"\"},\"pluginCatalogURL\":\"https://grafana.com/grafana/plugins/\",\"pluginAdminEnabled\":true,\"pluginAdminExternalManageEnabled\":false,\"pluginCatalogHiddenPlugins\":[],\"pluginCatalogManagedPlugins\":[],\"pluginCatalogPreinstalledPlugins\":[{\"id\":\"grafana-lokiexplore-app\",\"version\":\"\"},{\"id\":\"grafana-pyroscope-app\",\"version\":\"\"},{\"id\":\"grafana-exploretraces-app\",\"version\":\"\"},{\"id\":\"grafana-metricsdrilldown-app\",\"version\":\"\"}],\"expressionsEnabled\":true,\"awsAllowedAuthProviders\":[\"default\",\"keys\",\"credentials\"],\"awsAssumeRoleEnabled\":true,\"supportBundlesEnabled\":true,\"snapshotEnabled\":true,\"secureSocksDSProxyEnabled\":false,\"reportingStaticContext\":{},\"azure\":{\"cloud\":\"AzureCloud\"},\"defaultDatasourceManageAlertsUiToggle\":true,\"defaultAllowRecordingRulesTargetAlertsUiToggle\":true,\"caching\":{\"enabled\":true},\"recordedQueries\":{\"enabled\":true},\"reporting\":{\"enabled\":true},\"analytics\":{\"enabled\":true},\"unifiedAlertingEnabled\":true,\"unifiedAlerting\":{\"minInterval\":\"10s\",\"alertStateHistoryBackend\":\"annotations\",\"recordingRulesEnabled\":true},\"oauth\":{},\"samlEnabled\":false,\"samlName\":\"\",\"tokenExpirationDayLimit\":-1,\"sharedWithMeFolderUID\":\"sharedwithme\",\"rootFolderUID\":\"general\",\"passwordlessEnabled\":\"\",\"geomapDisableCustomBaseLayer\":false,\"publicDashboardAccessToken\":\"\",\"publicDashboardsEnabled\":true,\"cloudMigrationIsTarget\":false,\"cloudMigrationPollIntervalMs\":2000,\"dateFormats\":{\"fullDate\":\"YYYY-MM-DD HH:mm:ss\",\"useBrowserLocale\":false,\"interval\":{\"millisecond\":\"HH:mm:ss.SSS\",\"second\":\"HH:mm:ss\",\"minute\":\"HH:mm\",\"hour\":\"MM/DD HH:mm\",\"day\":\"MM/DD\",\"month\":\"YYYY-MM\",\"year\":\"YYYY\"},\"defaultTimezone\":\"browser\",\"defaultWeekStart\":\"browser\"},\"namespace\":\"org-0\",\"sqlConnectionLimits\":{\"maxOpenConns\":100,\"maxIdleConns\":100,\"connMaxLifetime\":14400},\"localFileSystemAvailable\":true,\"listScopesEndpoint\":\"\",\"listDashboardScopesEndpoint\":\"\"},\n navTree: [{\"id\":\"home\",\"text\":\"Home\",\"icon\":\"home-alt\",\"url\":\"/login\",\"sortWeight\":-2000},{\"id\":\"help\",\"text\":\"Help\",\"subTitle\":\"Grafana v12.1.1 (df5de8219b)\",\"icon\":\"question-circle\",\"url\":\"#\",\"sortWeight\":100}],\n assets: {\"jsFiles\":[{\"filePath\":\"public/build/runtime.f411d9fd17caf2c61dab.js\",\"integrity\":\"sha384-tvuf1SjqKlUjWospAA43rALC9nEZZZGzplRLlc4T5IDmfqgTKqzS3vIdViBg2/Ca sha512-1f+j/ZFdn3/E1uR5UWTXpDg47llw+XcYkHBJGje5aEGCmQsUevnsR2W6VRJhPg4cBepVL64o257nZb9f9elaeA==\"},{\"filePath\":\"public/build/6029.0549a3fcb50e73c4b256.js\",\"integrity\":\"sha384-Otd1wLPciZ+tOJke2wbZQse4pmXNMdivu6XYXws1Z9H7Iy5TXpsS6Ja0Ke6p5Ti0 sha512-LFZ8zOE5Cke3SRGx5a2NMChf1LtQ1oTins3n4XA0/w9Wpn7cBzJpSGzuLUtN3pAOtDsZmQp0+CPdOdS/v/E44A==\"},{\"filePath\":\"public/build/2033.bec9d44fd0b4a0c196a7.js\",\"integrity\":\"sha384-+IsDn5YFjeqdlVIHDkuCuYFReg/0Von47cT/fTCIB2lkiw719QRWYQ3WAOQSTmq5 sha512-DlHdq1fgJIA9krsPsKgFi4yzsNJsB0Jbbx8bhrjQhpDcqsdqGW2u+bq40iL3blcnDSRxBDj3wIkPcVMSZUobgQ==\"},{\"filePath\":\"public/build/7777.6c4200e47d2cb766b7e6.js\",\"integrity\":\"sha384-ZRsj5GgSkKHT4OgrAIqvev32yfceK7QQbZ6UT6CehBK7OQaZKa83OVIG2YJ8GJOB sha512-N+Kg11PkW8kPoF6534WZZqcAb8qzjqLIXCPK8h0+aqViMCZnRbap1YrfodGpUgradTUI70nXX71tg/6+QogvdQ==\"},{\"filePath\":\"public/build/5923.236359203b24de0f1036.js\",\"integrity\":\"sha384-gElGy6ORGWk7DdpnJkY2m4nfgnIGSz1ri5iQh6ns4NQEaYy3lHBsXMP6qGR+JDrw sha512-AnVOkiPifVJr37drJgmKQKJuzr10yIl5mTDB/G+cXwKTlmaxZ8nq+rKwn2WjKzijhIWvIdrXmbe6X4yK3vTUIA==\"},{\"filePath\":\"public/build/9414.e32d7f44873b22e671c7.js\",\"integrity\":\"sha384-f3w2sQJxmSygOnVsD5PLYchtXsdxOBFgm/elT8grH5bGlJ0ESs3bY5ohEYeiUbfG sha512-t4m15KfuBEvRCeEaz/XCNMr2w4lbe52vG+7wYWVaaP+HJpvPpSLNX4U7Pi8oRln35G4DbvG7YsKLCnNZhSCBTQ==\"},{\"filePath\":\"public/build/app.e299abd209cd47ad567d.js\",\"integrity\":\"sha384-mJk92Arnsh9UpHZPnXaaJ387s/x0e9ULyEFshvFXphnbr//fMnVOmtcrpcjBLsFH sha512-lKcZCYHzpvBFI97u/77vkIP37k+KQmjJuIQkcZLgJCcfr+z35b8mf0hraUyQI0uhQJZgWLJPGSN38VmoFNP8PQ==\"}],\"cssFiles\":[{\"filePath\":\"public/build/grafana.app.236e53eabc3f6ade9d45.css\",\"integrity\":\"sha384-olpStxJ044VwQDmMgxX0o53NEt8XyvrkTxJICvUnHCiZoFPV7/BJfHJiEoGZIXX6 sha512-EjyLSbiqqJBsgRVlv6tZkK6EKBWLkm2dIFDc9hiuJ8Bqgx3nduxRlpCNlBKlJY1J4h77ifbrbz8/l63/kavtIQ==\"}],\"dark\":\"public/build/grafana.dark.23c5425b7a9e1580d499.css\",\"light\":\"public/build/grafana.light.7fb85ddc153a7c559092.css\",\"swagger\":[{\"filePath\":\"public/build/runtime.f411d9fd17caf2c61dab.js\",\"integrity\":\"sha384-tvuf1SjqKlUjWospAA43rALC9nEZZZGzplRLlc4T5IDmfqgTKqzS3vIdViBg2/Ca sha512-1f+j/ZFdn3/E1uR5UWTXpDg47llw+XcYkHBJGje5aEGCmQsUevnsR2W6VRJhPg4cBepVL64o257nZb9f9elaeA==\"},{\"filePath\":\"public/build/6029.0549a3fcb50e73c4b256.js\",\"integrity\":\"sha384-Otd1wLPciZ+tOJke2wbZQse4pmXNMdivu6XYXws1Z9H7Iy5TXpsS6Ja0Ke6p5Ti0 sha512-LFZ8zOE5Cke3SRGx5a2NMChf1LtQ1oTins3n4XA0/w9Wpn7cBzJpSGzuLUtN3pAOtDsZmQp0+CPdOdS/v/E44A==\"},{\"filePath\":\"public/build/2033.bec9d44fd0b4a0c196a7.js\",\"integrity\":\"sha384-+IsDn5YFjeqdlVIHDkuCuYFReg/0Von47cT/fTCIB2lkiw719QRWYQ3WAOQSTmq5 sha512-DlHdq1fgJIA9krsPsKgFi4yzsNJsB0Jbbx8bhrjQhpDcqsdqGW2u+bq40iL3blcnDSRxBDj3wIkPcVMSZUobgQ==\"},{\"filePath\":\"public/build/7249.9de82c6a1993870a636e.js\",\"integrity\":\"sha384-6kiKxXQ4AsR5wNSdaeJxcmss081DBr+Y1zMwg1ctzMPvMp2X7QYUt6nxYnM6xNwr sha512-/+5mlzFx2hP2ijUnd+pZ2S90lVgkdfimv6//EaEhylX9RsYmYTaf0m0M7WXVp/+P2ncUJeexftlPjr4TrGqQYg==\"},{\"filePath\":\"public/build/5923.236359203b24de0f1036.js\",\"integrity\":\"sha384-gElGy6ORGWk7DdpnJkY2m4nfgnIGSz1ri5iQh6ns4NQEaYy3lHBsXMP6qGR+JDrw sha512-AnVOkiPifVJr37drJgmKQKJuzr10yIl5mTDB/G+cXwKTlmaxZ8nq+rKwn2WjKzijhIWvIdrXmbe6X4yK3vTUIA==\"},{\"filePath\":\"public/build/swagger.b7fa6c04bd44a97237e6.js\",\"integrity\":\"sha384-JxJFMKZjQuPuukoJmylKIKGM88zMYxAD1qGa0/Oo8RZ+yoqNsqfQGYFHZ5SsMdTg sha512-oT3/iCX2Oqhkz3HIadzUCOskPXiQReqEWGYLIq87+2PDw9Mwws0+wQYjUdmbck8OCtjZetEqlhMSYB/1EGBAog==\"}],\"swaggerCssFiles\":[{\"filePath\":\"public/build/grafana.swagger.d0a2da197b9827204ac1.css\",\"integrity\":\"sha384-WCNS9FySedugIyb8fkjUCt0U2ZQWKifCFICWKaBB/1X1roVDZiilm+hPnmFyt35H sha512-InI1FqWH/FNfgMiG9BCcL+2MIiBDQVc9nq7A5Ik4LFbbEhQ11exrTCBjOV6c35XvLVho87+z0uVbh4UbgkHxBA==\"}]}\n };\n\n \n window.__grafana_boot_data_promise = Promise.resolve();\n\n \n \n if (window.grafanaBootData.user.theme === \"system\") {\n document.body.classList.remove(\"theme-system\");\n var darkQuery = window.matchMedia(\"(prefers-color-scheme: dark)\");\n var cssLink = document.createElement(\"link\");\n cssLink.rel = 'stylesheet';\n\n if (darkQuery.matches) {\n document.body.classList.add(\"theme-dark\");\n cssLink.href = window.grafanaBootData.assets.dark;\n window.grafanaBootData.user.lightTheme = false;\n } else {\n document.body.classList.add(\"theme-light\");\n cssLink.href = window.grafanaBootData.assets.light;\n window.grafanaBootData.user.lightTheme = true;\n }\n document.head.appendChild(cssLink);\n }\n\n window.__grafana_load_failed = function() {\n var preloader = document.getElementsByClassName(\"preloader\");\n if (preloader.length) {\n preloader[0].className = \"preloader preloader--done\";\n }\n }\n\n \n window.onload = function() {\n if (window.__grafana_app_bundle_loaded) {\n return;\n }\n window.__grafana_load_failed();\n };\n\n \n \n </script>\n\n \n\n \n \n <script\n nonce=\"\"\n src=\"public/build/runtime.f411d9fd17caf2c61dab.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/6029.0549a3fcb50e73c4b256.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/2033.bec9d44fd0b4a0c196a7.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/7777.6c4200e47d2cb766b7e6.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/5923.236359203b24de0f1036.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/9414.e32d7f44873b22e671c7.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n <script\n nonce=\"\"\n src=\"public/build/app.e299abd209cd47ad567d.js\"\n type=\"text/javascript\"\n defer\n ></script>\n \n \n\n <script nonce=\"\">\n performance.mark('frontend_boot_js_done_time_seconds');\n </script>\n </body>\n</html>\n",
"body_murmur": 1562260114,
"body_sha256": "84d946a3e306afa0c18c7287182fd0d55b15ec2de6e1c7946787a35dc012dda4",
"component": [
"Nginx"
],
"content_length": -1,
"favicon": {
"md5_hash": "bcc4933f81eff43e5d9bcc5b2828aa70",
"murmur_hash": 2123863676,
"path": "https://gfa.lvfunai.com:443/public/img/fav32.png",
"size": 1118
},
"headers": {
"alt_svc": [
"quic=\":443\"; h3=\":443\"; h3-29=\":443\"; h3-27=\":443\";h3-25=\":443\"; h3-T050=\":443\"; h3-Q050=\":443\";h3-Q049=\":443\";h3-Q048=\":443\"; h3-Q046=\":443\"; h3-Q043=\":443\""
],
"cache_control": [
"no-store"
],
"connection": [
"keep-alive"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Wed, 07 Jan 2026 11:51:42 GMT"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000"
],
"vary": [
"Accept-Encoding"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"deny"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html>\r\n<head><title>302 Found</title></head>\r\n<body>\r\n<center><h1>302 Found</h1></center>\r\n<hr><center>nginx</center>\r\n</body>\r\n</html>\r\n",
"body_murmur": -23674247,
"body_sha256": "753e0dd54f28c4f7009b9c0b18a68aed175416bd8b7d134858264586eaac56f0",
"content_length": 138,
"headers": {
"alt_svc": [
"quic=\":443\"; h3=\":443\"; h3-29=\":443\"; h3-27=\":443\";h3-25=\":443\"; h3-T050=\":443\"; h3-Q050=\":443\";h3-Q049=\":443\";h3-Q048=\":443\"; h3-Q046=\":443\"; h3-Q043=\":443\""
],
"content_length": [
"138"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 07 Jan 2026 11:51:40 GMT"
],
"location": [
"https://175.27.240.203/"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000"
]
},
"location": "https://175.27.240.203/",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Moved Temporarily"
},
{
"body": "<a href=\"https://gfa.lvfunai.com/\">Moved Permanently</a>.\n\n",
"body_murmur": 223668580,
"body_sha256": "5dba83dc1ced1ecbd0006fe8534ab85e2adfd63e28dc45bff07f330f94025aa2",
"content_length": 59,
"headers": {
"alt_svc": [
"quic=\":443\"; h3=\":443\"; h3-29=\":443\"; h3-27=\":443\";h3-25=\":443\"; h3-T050=\":443\"; h3-Q050=\":443\";h3-Q049=\":443\";h3-Q048=\":443\"; h3-Q046=\":443\"; h3-Q043=\":443\""
],
"cache_control": [
"no-store"
],
"connection": [
"keep-alive"
],
"content_length": [
"59"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Wed, 07 Jan 2026 11:51:41 GMT"
],
"location": [
"https://gfa.lvfunai.com/"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"deny"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "https://gfa.lvfunai.com/",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
},
{
"body": "<a href=\"/login\">Found</a>.\n\n",
"body_murmur": 2016621913,
"body_sha256": "0d1cfad8b38bdd6d8cba9c691708aa38afac21f9c53a22be986464500a0180f1",
"content_length": 29,
"headers": {
"alt_svc": [
"quic=\":443\"; h3=\":443\"; h3-29=\":443\"; h3-27=\":443\";h3-25=\":443\"; h3-T050=\":443\"; h3-Q050=\":443\";h3-Q049=\":443\";h3-Q048=\":443\"; h3-Q046=\":443\"; h3-Q043=\":443\""
],
"cache_control": [
"no-store"
],
"connection": [
"keep-alive"
],
"content_length": [
"29"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Wed, 07 Jan 2026 11:51:42 GMT"
],
"location": [
"/login"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"deny"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "/login",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Found"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://gfa.lvfunai.com/"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "gfa.lvfunai.com",
"path": "/login",
"scheme": "https"
}
},
"status_code": 200,
"title": "Grafana",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r12.i.lencr.org/"
]
},
"authority_key_id": "00b529f22d8e6f31e89b4cad783efadce90cd1d2",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://r12.c.lencr.org/85.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n Timestamp : Nov 9 18:06:32.035 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:79:0F:12:01:10:94:24:9E:A0:CC:3E:26:\n EA:38:49:B3:81:97:46:5D:6C:B6:76:7B:A9:52:93:9C:\n 13:87:A6:90:02:20:76:23:47:E4:17:B3:28:28:5B:E4:\n 41:36:7D:93:7A:24:AE:5A:AB:A1:4E:21:E5:90:B4:1A:\n 0A:86:79:B1:59:A6\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:\n F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7\n Timestamp : Nov 9 18:06:32.062 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:81:87:B4:0D:FF:C8:A0:60:18:16:3C:\n 70:6F:82:DB:BF:5D:17:1D:07:10:BB:48:D3:31:53:3D:\n F3:C0:DA:57:60:02:20:44:8C:8F:39:35:26:0F:5B:5A:\n F9:7B:7A:76:6A:EE:39:29:27:05:1D:10:93:DA:09:05:\n AF:D5:B7:D4:A3:38:F7",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"gfa.lvfunai.com"
]
},
"subject_key_id": "de5b47fddd00706bdcf1ccceb5ae2bb5345cb2b4"
},
"fingerprint_md5": "CDD8091D436E0BD56B6D386E546A54A2",
"fingerprint_sha1": "C40B8A2A22A16988EF5F2E9B171F2CAA47796B30",
"fingerprint_sha256": "8AC374DEF1728F9FE06EDA1A44487B23223A483F60CBD3353B0A2738E26EA5BD",
"issuer": {
"common_name": [
"R12"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R12",
"jarm": "3fd3fd0003fd3fd21c42d42d000000bdfc58c9a46434368cf60aa440385763",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2026-01-16T12:01:20",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "519518442716026403622820442316880788722260",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "NjU5Nzg1MDg4M2E1NWFlNmZmNWQxZjZjNzkyOGVjMDc3YTkwMDJhYjk1OWIyNTJiMjlhOTYwNGNhZDdiNmZlNzYxNThhZGU3M2I2OWM5NDQzZWE1ZGE1MGI3MDFkYjUyNTM2ZjA1ZGU4YTcxMTU3MDYxNTRlNWE2Y2NkMzQ4NmYzZGM4OGMxZDkwNTFkNzJhMmE5MTdkYWFjNDJlYTJlYzcyYWQyMzc4OWJmZWEzNTFjMjBiNWRiNWVhZDljYzFjMWM3ZmNmYmYyNmRhOGQyNzE0OGZjZjYyMTcwZDUyMmUwMTdlOGU2OGQ3ZTg3OGVmYTFmZDAwYmVlODc0YTVhMzBmN2I4OGRiMDQ3YTlmMDQwZmM3YmU4NmIwYTQxNmM4ZTVkMGJmYzM4YTE1ZDlmYWYxNTMxNjVmZmY1MDk1YjQ1NGI5ZTQyMjY3MmIwZGNmMDdlMDhjMzIwM2Q2N2RlMjg5OTQ1Mzg4OGZjOWQ3Njk4ZGNkYTIyNjFiYjFkMWRmNzJmZmIxOTYyMjUyOWZlOWM1ZTFiMmJiY2FlZjc4MzJlODkzYTZmZjI0NDAyZTAwYmQ5MjJhNDkyMzdkZGIzYWZmZDMzMjNkMTgxN2Q1NjcwZTNjOTFmOThkOGY3NzIwZGQ2NjZlM2I2NDQzODI3MzU5NzVjOTU4NjY5OGVjZTU="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30440220790f12011094249ea0cc3e26ea3849b38197465d6cb6767ba952939c1387a6900220762347e417b328285be441367d937a24ae5aaba14e21e590b41a0a8679b159a6"
},
"timestamp": "2025-11-09T18:06:32.035000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "cb38f715897c84a1445f5bc1ddfbc96ef29a59cd470a690585b0cb14c31458e7",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450221008187b40dffc8a06018163c706f82dbbf5d171d0710bb48d331533df3c0da57600220448c8f3935260f5b5af97b7a766aee392927051d1093da0905afd5b7d4a338f7"
},
"timestamp": "2025-11-09T18:06:32.062000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"gfa.lvfunai.com"
]
},
"subject_alt_name": {
"dns_names": [
"gfa.lvfunai.com"
],
"extended_dns_names": [
{
"domain": "lvfunai",
"fld": "lvfunai.com",
"subdomain": "gfa",
"tld": "com"
}
]
},
"subject_dn": "/CN=gfa.lvfunai.com",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "8fb167f213fcd04ccf0bc22757bc98814ad7e2311044b16e46f7865891d858c2",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "176486d7cb7e6e03db49f9ac31a57b9502e291da63d2bb10c8aa8f86dcd47ed1",
"tbs_noct_fingerprint": "6754519aaa239e6823a8157baf2f6f52b047b691edac7fbb865e7117f2bdc1ca",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2026-02-07T17:08:01",
"not_before": "2025-11-09T17:08:02"
},
"version": 2
},
"fingerprint_sha256": "8AC374DEF1728F9FE06EDA1A44487B23223A483F60CBD3353B0A2738E26EA5BD",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://175.27.240.203/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-07T12:14:03.413Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Uvicorn",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:encode:uvicorn",
"part": "a",
"vendor": "encode",
"product": "uvicorn",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"url": "http://175.27.240.203:8000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-03T04:10:13.73Z"
}
],
"services_hash": "34457c269a4ce8a10af50f461a4454457dcad3f2f80902ae89aaf61e90800ff1",
"last_updated_at": "2026-01-10T02:15:05.198Z",
"banner": [
"ssh",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2016-20012": {
"id": "CVE-2016-20012",
"references": [
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1",
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2017-15906": {
"id": "CVE-2017-15906",
"references": [
"http://www.securityfocus.com/bid/101552",
"https://access.redhat.com/errata/RHSA-2018:0980",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
"https://security.gentoo.org/glsa/201801-05",
"https://security.netapp.com/advisory/ntap-20180423-0004/",
"https://www.openssh.com/txt/release-7.6",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://www.securityfocus.com/bid/101552",
"https://access.redhat.com/errata/RHSA-2018:0980",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
"https://security.gentoo.org/glsa/201801-05",
"https://security.netapp.com/advisory/ntap-20180423-0004/",
"https://www.openssh.com/txt/release-7.6",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-732"
},
"CVE-2018-15473": {
"id": "CVE-2018-15473",
"references": [
"http://www.openwall.com/lists/oss-security/2018/08/15/5",
"http://www.securityfocus.com/bid/105140",
"http://www.securitytracker.com/id/1041487",
"https://access.redhat.com/errata/RHSA-2019:0711",
"https://access.redhat.com/errata/RHSA-2019:2143",
"https://bugs.debian.org/906236",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
"https://security.gentoo.org/glsa/201810-03",
"https://security.netapp.com/advisory/ntap-20181101-0001/",
"https://usn.ubuntu.com/3809-1/",
"https://www.debian.org/security/2018/dsa-4280",
"https://www.exploit-db.com/exploits/45210/",
"https://www.exploit-db.com/exploits/45233/",
"https://www.exploit-db.com/exploits/45939/",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://www.openwall.com/lists/oss-security/2018/08/15/5",
"http://www.securityfocus.com/bid/105140",
"http://www.securitytracker.com/id/1041487",
"https://access.redhat.com/errata/RHSA-2019:0711",
"https://access.redhat.com/errata/RHSA-2019:2143",
"https://bugs.debian.org/906236",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
"https://security.gentoo.org/glsa/201810-03",
"https://security.netapp.com/advisory/ntap-20181101-0001/",
"https://usn.ubuntu.com/3809-1/",
"https://www.debian.org/security/2018/dsa-4280",
"https://www.exploit-db.com/exploits/45210/",
"https://www.exploit-db.com/exploits/45233/",
"https://www.exploit-db.com/exploits/45939/",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-362"
},
"CVE-2018-15919": {
"id": "CVE-2018-15919",
"references": [
"http://seclists.org/oss-sec/2018/q3/180",
"http://www.securityfocus.com/bid/105163",
"https://security.netapp.com/advisory/ntap-20181221-0001/",
"http://seclists.org/oss-sec/2018/q3/180",
"http://www.securityfocus.com/bid/105163",
"https://security.netapp.com/advisory/ntap-20181221-0001/"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2018-20685": {
"id": "CVE-2018-20685",
"references": [
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"weakness": "CWE-863"
},
"CVE-2019-6109": {
"id": "CVE-2019-6109",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-116"
},
"CVE-2019-6110": {
"id": "CVE-2019-6110",
"references": [
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-838"
},
"CVE-2019-6111": {
"id": "CVE-2019-6111",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-22"
},
"CVE-2020-14145": {
"id": "CVE-2020-14145",
"references": [
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-203"
},
"CVE-2020-15778": {
"id": "CVE-2020-15778",
"references": [
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html",
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html"
],
"score": 7.4,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
"vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-78"
},
"CVE-2021-36368": {
"id": "CVE-2021-36368",
"references": [
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html",
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html"
],
"score": 3.7,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-287"
},
"CVE-2021-41617": {
"id": "CVE-2021-41617",
"references": [
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174",
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-38408": {
"id": "CVE-2023-38408",
"references": [
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-428"
},
"CVE-2023-48795": {
"id": "CVE-2023-48795",
"references": [
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html",
"https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-354"
},
"CVE-2023-51384": {
"id": "CVE-2023-51384",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-51385": {
"id": "CVE-2023-51385",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"http://www.openwall.com/lists/oss-security/2025/10/07/1",
"http://www.openwall.com/lists/oss-security/2025/10/12/1",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"weakness": "CWE-78"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/2",
"http://www.openwall.com/lists/oss-security/2025/09/23/1",
"http://www.openwall.com/lists/oss-security/2025/09/23/3",
"http://www.openwall.com/lists/oss-security/2025/09/23/4",
"http://www.openwall.com/lists/oss-security/2025/09/23/5",
"http://www.openwall.com/lists/oss-security/2025/09/24/4",
"http://www.openwall.com/lists/oss-security/2025/09/24/7",
"http://www.openwall.com/lists/oss-security/2025/09/25/2",
"http://www.openwall.com/lists/oss-security/2025/09/25/6",
"http://www.openwall.com/lists/oss-security/2025/09/26/2",
"http://www.openwall.com/lists/oss-security/2025/09/26/4",
"http://www.openwall.com/lists/oss-security/2025/09/27/1",
"http://www.openwall.com/lists/oss-security/2025/09/27/2",
"http://www.openwall.com/lists/oss-security/2025/09/27/3",
"http://www.openwall.com/lists/oss-security/2025/09/27/4",
"http://www.openwall.com/lists/oss-security/2025/09/27/5",
"http://www.openwall.com/lists/oss-security/2025/09/27/6",
"http://www.openwall.com/lists/oss-security/2025/09/27/7",
"http://www.openwall.com/lists/oss-security/2025/09/28/7",
"http://www.openwall.com/lists/oss-security/2025/09/29/1",
"http://www.openwall.com/lists/oss-security/2025/09/29/4",
"http://www.openwall.com/lists/oss-security/2025/09/29/5",
"http://www.openwall.com/lists/oss-security/2025/09/29/6",
"http://www.openwall.com/lists/oss-security/2025/10/01/1",
"http://www.openwall.com/lists/oss-security/2025/10/01/2",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
}
}
}