182.236.89.139
{
"scan_id": 1739625356,
"ip": "182.236.89.139",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.236.64.0/19",
"postal_code": "151-0053",
"coordinates": {
"latitude": "35.6893",
"longitude": "139.6899"
},
"geo_point": "35.6893, 139.6899",
"locale_code": "en",
"continent": "Asia",
"country_code": "JP",
"country_name": "Japan",
"city": "Tokyo"
},
"location_updated_at": "2025-02-20T16:40:56Z",
"asn": {
"number": "AS15830",
"organization": "Equinix (EMEA) Acquisition Enterprises B.V.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.236.64.0/19",
"organization": "Equinix Japan Enterprise K.K.",
"descr": "Equinix Japan Enterprise K.K.,\nMidtown East 8F, 9-7-2 Akasaka, Minato City, Tokyo",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:03:53Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-02-20T16:40:56Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-02-20T19:54:50Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-02-20T16:40:56Z"
}
],
"hostnames": [
{
"name": "meicon.il-buddy.com",
"last_updated_at": "2025-02-22T02:32:45.067036714Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-22T01:29:32.948Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.18.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.18\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\n body {\n width: 35em;\n margin: 0 auto;\n font-family: Tahoma, Verdana, Arial, sans-serif;\n }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
"body_murmur": 1651973090,
"body_sha256": "38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521",
"component": [
"Ubuntu",
"Nginx:1.18.0"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 18 Feb 2025 07:56:20 GMT"
],
"etag": [
"W/\"64f9360f-264\""
],
"last_modified": [
"Thu, 07 Sep 2023 02:31:43 GMT"
],
"server": [
"nginx/1.18.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.236.89.139",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to nginx!",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "http://182.236.89.139/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-18T07:56:21.162Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.18.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.18\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "Forbidden",
"body_murmur": -159404350,
"body_sha256": "78342a0905a72ce44da083dcb5d23b8ea0c16992ba2a82eece97e033d76ba3d3",
"component": [
"Ubuntu",
"Nginx:1.18.0"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/plain"
],
"date": [
"Mon, 17 Feb 2025 23:12:18 GMT"
],
"server": [
"nginx/1.18.0 (Ubuntu)"
],
"x_powered_by": [
"Express"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.236.89.139",
"path": "",
"scheme": "https"
}
},
"status_code": 403,
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://secure.globalsign.com/cacert/gsgccr6alphasslca2023.crt"
],
"ocsp_urls": [
"http://ocsp.globalsign.com/gsgccr6alphasslca2023"
]
},
"authority_key_id": "bd05b7f38a933c73cb79fa0f8512a17796189174",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
},
{
"cps": [
"https://www.globalsign.com/repository/"
],
"id": "1.3.6.1.4.1.4146.10.1.3"
}
],
"crl_distribution_points": [
"http://crl.globalsign.com/gsgccr6alphasslca2023.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n Timestamp : Jan 17 01:22:25.421 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:2E:B8:D4:69:B4:31:0D:0D:73:B6:C8:7F:\n 03:3B:90:BF:8F:06:92:39:BF:C8:C3:23:8D:7F:5C:4F:\n 2D:79:08:A6:02:20:3D:61:DB:13:97:F5:86:B9:40:5F:\n 70:18:38:90:0C:59:93:6E:D5:EB:E8:E7:BA:3C:4C:C0:\n CE:B2:39:AA:BD:53\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:\n DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21\n Timestamp : Jan 17 01:22:25.756 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:62:61:93:C1:B3:A2:AE:3C:E3:1F:4A:33:\n ED:0B:55:CD:4C:5C:13:AE:75:2C:58:6D:A5:7D:CF:FE:\n CB:DD:75:65:02:20:5B:32:EE:AD:7C:FC:0B:1F:C6:A6:\n C8:3B:24:A6:83:E0:20:DA:E2:3D:7D:C4:5E:6F:F0:E8:\n D8:39:68:CB:1B:3F\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 25:2F:94:C2:2B:29:E9:6E:9F:41:1A:72:07:2B:69:5C:\n 5B:52:FF:97:A9:0D:25:40:BB:FC:DC:51:EC:4D:EE:0B\n Timestamp : Jan 17 01:22:25.562 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:C0:93:13:1A:23:58:20:59:C9:9E:54:\n 73:A3:36:0C:22:45:D3:BA:13:A1:F1:70:70:5D:A1:38:\n E4:B3:4A:3B:58:02:21:00:84:C3:49:00:AD:5F:10:C7:\n B8:1C:AD:BC:E8:A9:AD:26:88:25:05:62:D1:79:94:3D:\n 8D:6D:38:88:9E:FC:A3:7B",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"*.il-buddy.com",
"il-buddy.com"
]
},
"subject_key_id": "780a400d265f1184262985f6f20d774c30c77b8e"
},
"fingerprint_md5": "E373671ADA31112E1543B567B11BDC08",
"fingerprint_sha1": "C9C232674D210B7DBFE348A1A45B5720AE981276",
"fingerprint_sha256": "4642616B1F3D743450B3B9AC8E8CD69C018C89DE747F1B2AC8DE812908B9D797",
"issuer": {
"common_name": [
"GlobalSign GCC R6 AlphaSSL CA 2023"
],
"country": [
"BE"
],
"organization": [
"GlobalSign nv-sa"
]
},
"issuer_dn": "/C=BE/O=GlobalSign nv-sa/CN=GlobalSign GCC R6 AlphaSSL CA 2023",
"jarm": "2ad2ad0002ad2ad00042d42d000000301510f56407964db9434a9bb0d4ee4a",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-02-24T12:57:50",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-02-22T00:45:43",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "22991811071107874512549343578",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402202eb8d469b4310d0d73b6c87f033b90bf8f069239bfc8c3238d7f5c4f2d7908a602203d61db1397f586b9405f701838900c59936ed5ebe8e7ba3c4cc0ceb239aabd53"
},
"timestamp": "2025-01-17T01:22:25.421000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30440220626193c1b3a2ae3ce31f4a33ed0b55cd4c5c13ae752c586da57dcffecbdd756502205b32eead7cfc0b1fc6a6c83b24a683e020dae23d7dc45e6ff0e8d83968cb1b3f"
},
"timestamp": "2025-01-17T01:22:25.756000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "252f94c22b29e96e9f411a72072b695c5b52ff97a90d2540bbfcdc51ec4dee0b",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100c093131a23582059c99e5473a3360c2245d3ba13a1f170705da138e4b34a3b5802210084c34900ad5f10c7b81cadbce8a9ad2688250562d179943d8d6d38889efca37b"
},
"timestamp": "2025-01-17T01:22:25.562000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"*.il-buddy.com"
]
},
"subject_alt_name": {
"dns_names": [
"*.il-buddy.com",
"il-buddy.com"
],
"extended_dns_names": [
{
"domain": "il-buddy",
"fld": "il-buddy.com",
"subdomain": "*",
"tld": "com"
},
{
"domain": "il-buddy",
"fld": "il-buddy.com",
"tld": "com"
}
]
},
"subject_dn": "/CN=*.il-buddy.com",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "5a28d68bbccb5192b3659488390f72bc8753608784bca1bd01c81d49ae2cc294",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "6e45abcf98923e4a9bb3a860352aa023f1323795e2097fa6369c239a5e8d3176",
"tbs_noct_fingerprint": "8c29b690a93c69d331701bc6926283b9a6b428c796e7a51ae3ef8d46ffc76929",
"validation_level": "DV",
"validity": {
"length_seconds": 34300800,
"not_after": "2026-02-18T01:22:22",
"not_before": "2025-01-17T01:22:23"
},
"version": 2
},
"fingerprint_sha256": "4642616B1F3D743450B3B9AC8E8CD69C018C89DE747F1B2AC8DE812908B9D797",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "https://182.236.89.139/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-02-18T00:45:50.383Z"
}
],
"services_hash": "48c9ac0a5c102bdddb702dee2c16db394162727eb2f1fb38941695d0fd8dfac8",
"last_updated_at": "2025-02-22T01:29:32.948Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"80/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"80/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"80/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}