178.128.225.219
{
"scan_id": 1745367268,
"ip": "178.128.225.219",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "178.128.224.0/20",
"postal_code": "M5A",
"coordinates": {
"latitude": "43.6547",
"longitude": "-79.3623"
},
"geo_point": "43.6547, -79.3623",
"locale_code": "en",
"continent": "North America",
"country_code": "CA",
"country_name": "Canada",
"city": "Toronto"
},
"location_updated_at": "2025-04-23T16:40:43Z",
"asn": {
"number": "AS14061",
"organization": "DIGITALOCEAN-ASN",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "",
"organization": "",
"descr": "",
"_encoding": {
"raw": ""
}
},
"whois_updated_at": "0001-01-01T00:00:00Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-04-23T16:40:43Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-04-23T18:21:51Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-04-23T16:40:43Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.6p1 Ubuntu 3ubuntu13.8",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.6p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.6p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.8",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"ext-info-s",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "544aceac242e5eea6406af84632f8834b88bcd0fc1cb0674ffcc1180e7a8eb15",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL+D0EwcA3GI2nTYJqwVhACPTiWKaTiqzeDp7VjN/UO/9ZOPTE2VQwSwCRLBM0gaDvWjpgkwY33xm/BrmapruK8="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_9.6p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-51767",
"score": 7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-21T14:36:55.856Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.4.58",
"product": "Apache httpd",
"extra_info": "(Ubuntu)",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.58",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.58",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html lang=\"en\" data-bs-theme=\"light\"><!-- don't change !!! data-bs-theme is changed dynamically in the C++ code when the index.html file is loaded or when the custom css is loaded for dev setups-->\n <head>\n <meta charset=\"UTF-8\" />\n <link rel=\"icon\" href=\"./favicon.ico\" />\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" />\n <title>Orthanc Explorer 2</title>\n <script type=\"module\" crossorigin src=\"./assets/main-CQf_IQnt.js\"></script>\n <link rel=\"modulepreload\" crossorigin href=\"./assets/index-DR66USrC.js\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/index-aTg5w7qo.css\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/main-BgOTm_cd.css\">\n </head>\n <body>\n <div id=\"app\"></div>\n </body>\n</html>\n",
"body_murmur": -1621228535,
"body_sha256": "ac367b75df2f5b6952a5c13609bb78af1612b083d6d87a138ec6828a60eccc5c",
"component": [
"Ubuntu",
"Apache HTTP Server:2.4.58"
],
"content_length": -1,
"favicon": {
"md5_hash": "6e028d7cc65a1430c68a581f8064e8e2",
"murmur_hash": -478834633,
"path": "http://178.128.225.219:80/./favicon.ico",
"size": 4286
},
"headers": {
"content_type": [
"text/html"
],
"date": [
"Wed, 23 Apr 2025 22:30:23 GMT"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"vary": [
"Accept-Encoding"
],
"x_content_type_options": [
"nosniff"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"content_length": [
"0"
],
"date": [
"Wed, 23 Apr 2025 22:30:23 GMT"
],
"location": [
"ui/app/"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"x_content_type_options": [
"nosniff"
]
},
"location": "ui/app/",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"http://178.128.225.219"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "178.128.225.219",
"path": "/ui/app/",
"scheme": "http"
}
},
"status_code": 200,
"title": "Orthanc Explorer 2",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-2024-27316",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-38474",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38476",
"score": 9.8,
"severity": "critical"
}
],
"url": "http://178.128.225.219/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-23T22:30:25.091Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "2.4.58",
"product": "Apache httpd",
"extra_info": "(Ubuntu)",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.58",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.58",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html lang=\"en\" data-bs-theme=\"light\"><!-- don't change !!! data-bs-theme is changed dynamically in the C++ code when the index.html file is loaded or when the custom css is loaded for dev setups-->\n <head>\n <meta charset=\"UTF-8\" />\n <link rel=\"icon\" href=\"./favicon.ico\" />\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" />\n <title>Orthanc Explorer 2</title>\n <script type=\"module\" crossorigin src=\"./assets/main-CQf_IQnt.js\"></script>\n <link rel=\"modulepreload\" crossorigin href=\"./assets/index-DR66USrC.js\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/index-aTg5w7qo.css\">\n <link rel=\"stylesheet\" crossorigin href=\"./assets/main-BgOTm_cd.css\">\n </head>\n <body>\n <div id=\"app\"></div>\n </body>\n</html>\n",
"body_murmur": -1621228535,
"body_sha256": "ac367b75df2f5b6952a5c13609bb78af1612b083d6d87a138ec6828a60eccc5c",
"component": [
"Apache HTTP Server:2.4.58",
"Ubuntu"
],
"content_length": -1,
"favicon": {
"md5_hash": "6e028d7cc65a1430c68a581f8064e8e2",
"murmur_hash": -478834633,
"path": "https://178.128.225.219:443/./favicon.ico",
"size": 4286
},
"headers": {
"content_type": [
"text/html"
],
"date": [
"Wed, 23 Apr 2025 10:50:45 GMT"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"vary": [
"Accept-Encoding"
],
"x_content_type_options": [
"nosniff"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"content_length": [
"0"
],
"date": [
"Wed, 23 Apr 2025 10:50:45 GMT"
],
"location": [
"ui/app/"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"x_content_type_options": [
"nosniff"
]
},
"location": "ui/app/",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://178.128.225.219"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "178.128.225.219",
"path": "/ui/app/",
"scheme": "https"
}
},
"status_code": 200,
"title": "Orthanc Explorer 2",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r11.i.lencr.org/"
],
"ocsp_urls": [
"http://r11.o.lencr.org"
]
},
"authority_key_id": "c5cf46a4eaf4c3c07a6c95c42db05e922f26e3b9",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:\n D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50\n Timestamp : Mar 3 14:59:15.842 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:A9:E3:3E:0B:1F:AB:4D:F7:D0:63:AC:\n B5:27:1F:5D:70:9B:CF:39:24:A6:E2:8D:47:86:14:CE:\n D9:4D:C5:DE:FA:02:21:00:F3:92:46:89:98:FE:D6:B0:\n 42:BE:75:C6:C4:6A:04:B7:CE:FD:36:2E:3E:D3:76:73:\n 8B:5B:1D:22:E9:CB:29:BE\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : E0:92:B3:FC:0C:1D:C8:E7:68:36:1F:DE:61:B9:96:4D:\n 0A:52:78:19:8A:72:D6:72:C4:B0:4D:A5:6D:6F:54:04\n Timestamp : Mar 3 14:59:16.087 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:47:2B:50:89:99:C2:21:32:E0:15:D1:F2:\n 35:1A:04:F3:EF:F1:E0:7A:ED:D8:48:36:D3:9E:CD:79:\n FB:CA:25:4F:02:21:00:84:97:44:F7:8B:62:C2:82:06:\n 32:4A:FF:56:4F:64:B0:54:6B:82:27:87:BD:7E:55:D0:\n D2:62:62:6E:35:E6:BA",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"images.compendiumradiologique.info"
]
},
"subject_key_id": "7918caeebc2903cb2b0a0977b773ed990cb4affd"
},
"fingerprint_md5": "E3106D8E4B60678923A5C8750880C796",
"fingerprint_sha1": "E3D01B90A39A2748AD58027452764696BF44FE6B",
"fingerprint_sha256": "193DE527DFD3A57FDC50ACC863CC84347D352A8E1F0CC1AF1118FDDF535C4B0C",
"issuer": {
"common_name": [
"R11"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R11",
"jarm": "15d3fd16d29d29d00042d43d000000ed1cf37c9a169b41886e27ba8fad60b0",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-04-30T09:33:58",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "309549085959784856610291114543206210599593",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "NDgxMDE2NDIyZjg0YjQ5Mzg0YTUxYTViM2Q4NjUyYWNjNzAwOGYyOGY2NTMxMzk2NGRjZjcxYWExNzE4ODI3OTlkNjM3MWEzZjBhMTQxMGJkN2RlNDhlNjFlZjg4N2Q0ZTUzOThlM2JkNTRkN2JlOWNjNTczZTA4ODY0NzY2YmE2NTllMTk5MzRmMGM4YTdmMDhhYWExOTM4ODU1Mjc3MjFlOGQxY2YzNjg5OTVjZjQ0NTY4ZjU3OWEyZThjOTVhNWQ1MTJlNjM3NTg3NzJhNGFiNmIzMzM5NGRkNWNkOTY3YTgwYTdjZjQ1YTVjNDM1YjljNTE3N2ZhNGQyYTdiNTFiM2U1NzMxNTE3NjMyZTI5MTMwZjhiMjI5NmY3NTBlZjQ1MzU2ZWQ0M2QxMTk0ZDU4ZTllZmE2MjBhYzBlNmI2YTA0YjU5YzI3OTg0NjM1NWE2OTdjYjhiNDBiNzU1Yjk1NGU3MTU2N2M2MTAxMTAxYWU2NDNlZDMwMTMwMGY1ZmEzYzkyYTNmYTRiYWE2ODRkMWJjNmNiZjVmNzgyODdlYmVlMTA3ZTRkZTA4MjhjNDc4NDRjYmIwODZkMWExOWFjODNlZGFmMDg1OWQyYzA2N2Q5ZjYwOWRkNTBhOWY5ODZmZjdmZTkzMTEwNGRjMzQzNmM2NTA0YmM1NTBlYmE="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "e6d2316340778cc1104106d771b9cec1d240f6968486fbba87321dfd1e378e50",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100a9e33e0b1fab4df7d063acb5271f5d709bcf3924a6e28d478614ced94dc5defa022100f392468998fed6b042be75c6c46a04b7cefd362e3ed376738b5b1d22e9cb29be"
},
"timestamp": "2025-03-03T14:59:15.842000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "e092b3fc0c1dc8e768361fde61b9964d0a5278198a72d672c4b04da56d6f5404",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450220472b508999c22132e015d1f2351a04f3eff1e07aedd84836d39ecd79fbca254f022100849744f78b62c28206324aff564f64b0546b822787bd7e55d0d262626e35e6ba"
},
"timestamp": "2025-03-03T14:59:16.087000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"images.compendiumradiologique.info"
]
},
"subject_alt_name": {
"dns_names": [
"images.compendiumradiologique.info"
],
"extended_dns_names": [
{
"domain": "compendiumradiologique",
"fld": "compendiumradiologique.info",
"subdomain": "images",
"tld": "info"
}
]
},
"subject_dn": "/CN=images.compendiumradiologique.info",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fd48b252af619ee230b2ef526e06cf2110bc2c67f26e5bf2d200578e9e05d157",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "70b5a8d6c9e6cc2f7c69c4652deb42a2b595078e39d053b8b6ce2979f473be25",
"tbs_noct_fingerprint": "3691f582b23619f7f2ad55c3da2bdff1e1f827f1e5adc7ae49e5320d0677a824",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-06-01T14:00:44",
"not_before": "2025-03-03T14:00:45"
},
"version": 2
},
"fingerprint_sha256": "193DE527DFD3A57FDC50ACC863CC84347D352A8E1F0CC1AF1118FDDF535C4B0C",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-2024-27316",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-38474",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38476",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://178.128.225.219/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-23T10:52:00.567Z"
}
],
"services_hash": "e98708ffed03e552bba7f878d877c84b2787537eb89b736ef94d84a99a20334f",
"last_updated_at": "2025-04-23T22:30:25.091Z",
"banner": [
"http",
"tls",
"ssh"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-829"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/10",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2024/07/17/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240808-0006/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}