Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.239.242.158

SummaryCVE DetailsRaw Data
07 Feb 2026, 20:12:52 UTC
{
  "scan_id": 1770475284,
  "ip": "182.239.242.158",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.239.242.128/26",
    "postal_code": "2028",
    "coordinates": {
      "latitude": "-33.8741",
      "longitude": "151.2416"
    },
    "geo_point": "-33.8741, 151.2416",
    "locale_code": "en",
    "continent": "Oceania",
    "country_code": "AU",
    "country_name": "Australia",
    "city": "Sydney"
  },
  "location_updated_at": "2026-02-07T00:42:33Z",
  "asn": {
    "number": "AS7545",
    "organization": "TPG Telecom Limited",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.239.128.0/17",
    "organization": "ORG-IL1-AP",
    "descr": "iiNet Limited",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:54Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-02-07T00:42:33Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-02-07T05:25:21Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-02-07T00:42:33Z"
    }
  ],
  "hostnames": [
    {
      "name": "182-239-242-158.tpgi.com.au",
      "last_updated_at": "2026-02-07T05:25:21Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.19.4",
      "product": "BusyBox http",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:busybox:busybox:1.19.4",
          "part": "a",
          "vendor": "busybox",
          "product": "busybox",
          "version": "1\\.19\\.4",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n<head>\n<meta http-equiv=\"refresh\" content=\"0; URL=/webpages/index.html\" />\n</head>\n</html>\n",
          "body_murmur": -592851547,
          "body_sha256": "a0e089d1aca81cbe85313ac63b02086d5067eb0424bfa57c56b037314ccbd18a",
          "content_length": 272,
          "headers": {
            "cache_control": [
              "no-cache"
            ],
            "content_length": [
              "272"
            ],
            "content_security_policy": [
              "frame-ancestors 'none'"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 31 Jan 2026 20:04:56 GMT"
            ],
            "etag": [
              "\"2f9-110-65b8cd1b\""
            ],
            "expires": [
              "0"
            ],
            "last_modified": [
              "Tue, 30 Jan 2024 10:19:07 GMT"
            ],
            "x_frame_options": [
              "deny"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "content_length": -1,
              "headers": {
                "location": [
                  "https://182.239.242.158:443/"
                ]
              },
              "location": "https://182.239.242.158:443/",
              "protocol": "HTTP/1.1",
              "status_code": 302,
              "status_line": "302 Found"
            }
          ],
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "referer": [
                "http://182.239.242.158"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.239.242.158:443",
              "path": "/",
              "scheme": "https"
            }
          },
          "status_code": 200
        }
      },
      "cve": [
        {
          "id": "CVE-2011-2716",
          "score": 6.8,
          "severity": "medium"
        },
        {
          "id": "CVE-2011-5325",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2013-1813",
          "score": 7.2,
          "severity": "high"
        }
      ],
      "url": "http://182.239.242.158/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-31T20:04:59.49Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "1.19.4",
      "product": "BusyBox http",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:busybox:busybox:1.19.4",
          "part": "a",
          "vendor": "busybox",
          "product": "busybox",
          "version": "1\\.19\\.4",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n<head>\n<meta http-equiv=\"refresh\" content=\"0; URL=/webpages/index.html\" />\n</head>\n</html>\n",
          "body_murmur": -592851547,
          "body_sha256": "a0e089d1aca81cbe85313ac63b02086d5067eb0424bfa57c56b037314ccbd18a",
          "content_length": 272,
          "headers": {
            "cache_control": [
              "no-cache"
            ],
            "content_length": [
              "272"
            ],
            "content_security_policy": [
              "frame-ancestors 'none'"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 07 Feb 2026 19:34:00 GMT"
            ],
            "etag": [
              "\"2f9-110-65b8cd1b\""
            ],
            "expires": [
              "0"
            ],
            "last_modified": [
              "Tue, 30 Jan 2024 10:19:07 GMT"
            ],
            "x_frame_options": [
              "deny"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.239.242.158",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "c65d42473307ce4cdccede699fe49b0cd4adf4a6",
              "basic_constraints": {
                "is_ca": true
              },
              "ns_comment": "OpenSSL Generated Certificate",
              "subject_key_id": "36d94b285f551bc047ef9955d3ae324d21c580b3"
            },
            "fingerprint_md5": "1189C603E40028EA0F3F7AB85A589CAD",
            "fingerprint_sha1": "AD8D7F4FD5E69B498F890B7DCC1A08E7DB24E6BF",
            "fingerprint_sha256": "B66DC82BFC28A4F96F5CC009E54E9124CF0A5B52D3F4DA8E1BD41EEB34FDB89B",
            "issuer": {
              "common_name": [
                "tplinkwifi.net"
              ],
              "country": [
                "CN"
              ]
            },
            "issuer_dn": "/C=CN/CN=tplinkwifi.net",
            "jarm": "29d29d00029d29d00029d29d29d29dce49238b62fc566f8bdb579566d23d07",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "13047747140822408030",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "YWEwYWZmZTkyM2NmNjYxMzVlYTE0ZGMxNzUwZDgxMzQ5NTBlNTAyNzY2NTdjOWY0MDRiNjVhNzBhNDE3YjZiY2U2NjU0ZGJmMDU0MDkxZjRmZWViMDBhMTI3ZmIxM2I5ZmQ4NDJkNmVhM2NjODZiNDlkOTIwN2YzOGI5NWM2MmRjNjZmMWZmMmI5MDA3ZTU1ZWJlOGZkYWU0Y2ZlOTY5MzY1MzI4ODdlMGM2ZGUxOTlkMGY5YTU2YjVhOGNiZDUwNTI5Y2UwNmEyMzI2NWQzZDllZTU4NWRiODVmY2NkM2ZjZTI3YmQzN2IyYTg0MjM5YmFjZmFkNDEyOGUwZTAyNDEyODI4ODJkMGIzN2MyNzgzMjkwMmY5ZDZiNzA4N2ViMDgzODJmMGIzYjIxZjJmZTNkOThiYzgxMWU0NDIwZTg2ODJhYWNmN2NjZGZlYWZkYTU4YmJmM2NiOWIzYjBmNGVmZTZiNGFhZDQ2Y2I3YTQ2OGUxYzdmNDFkNTQ5NDVkNzg2ZmRiMzA5NmIxYmY3NzkxZDQ3ZWEyMDIxMmViNTgwMDdiYTAzNjRiOTI4NjNiOGMzOWQ1M2VmOWFlYzcwY2NjZDdjNjVhOWJiZWQyNmVkNmQ1N2E3OGIzYTZlNWE5M2IzMjU2ZWFjZmIwOTQ3YWJjOTk2MjVjNjJjM2YwYmU="
            },
            "subject": {
              "common_name": [
                "tplinkwifi.net"
              ],
              "country": [
                "CN"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "tplinkwifi.net"
              ],
              "extended_dns_names": [
                {
                  "domain": "tplinkwifi",
                  "fld": "tplinkwifi.net",
                  "tld": "net"
                }
              ]
            },
            "subject_dn": "/C=CN/CN=tplinkwifi.net",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "44e731e8963fad011c88bd20e94e1624292a67ceb5caf7d0edeeb48d4ee37315",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "dc9b743a1b3bbe52375ebd91efe362e51122ac4bdd86fe75340c6c1ac1560ed4",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 662601600,
              "not_after": "2030-12-31T00:00:00",
              "not_before": "2010-01-01T00:00:00"
            },
            "version": 2
          },
          "fingerprint_sha256": "B66DC82BFC28A4F96F5CC009E54E9124CF0A5B52D3F4DA8E1BD41EEB34FDB89B",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2011-2716",
          "score": 6.8,
          "severity": "medium"
        },
        {
          "id": "CVE-2011-5325",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2013-1813",
          "score": 7.2,
          "severity": "high"
        }
      ],
      "url": "https://182.239.242.158/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T20:12:52.437Z"
    }
  ],
  "services_hash": "a1fff52fe15146ab9b8d050884ab2549994a3767282cfef61fc6342926047c0d",
  "last_updated_at": "2026-02-07T20:12:52.437Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "443/http"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2011-2716": {
      "id": "CVE-2011-2716",
      "references": [
        "http://downloads.avaya.com/css/P8/documents/100158840",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://rhn.redhat.com/errata/RHSA-2012-0810.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://secunia.com/advisories/45363",
        "http://www.busybox.net/news.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129",
        "http://www.securityfocus.com/bid/48879",
        "https://bugs.busybox.net/show_bug.cgi?id=3979",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://support.t-mobile.com/docs/DOC-21994",
        "http://downloads.avaya.com/css/P8/documents/100158840",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://rhn.redhat.com/errata/RHSA-2012-0810.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://secunia.com/advisories/45363",
        "http://www.busybox.net/news.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129",
        "http://www.securityfocus.com/bid/48879",
        "https://bugs.busybox.net/show_bug.cgi?id=3979",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://support.t-mobile.com/docs/DOC-21994"
      ],
      "score": 6.8,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.",
      "vector_string": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2011-5325": {
      "id": "CVE-2011-5325",
      "references": [
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2015/10/21/7",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1274215",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2015/10/21/7",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1274215",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-22"
    },
    "CVE-2013-1813": {
      "id": "CVE-2013-1813",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965",
        "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784",
        "http://lists.busybox.net/pipermail/busybox/2013-January/078864.html",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://rhn.redhat.com/errata/RHSA-2013-1732.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://support.t-mobile.com/docs/DOC-21994",
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965",
        "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784",
        "http://lists.busybox.net/pipermail/busybox/2013-January/078864.html",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://rhn.redhat.com/errata/RHSA-2013-1732.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://support.t-mobile.com/docs/DOC-21994"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-264"
    },
    "CVE-2014-9645": {
      "id": "CVE-2014-9645",
      "references": [
        "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b",
        "http://openwall.com/lists/oss-security/2015/01/24/4",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://www.securityfocus.com/bid/72324",
        "https://bugs.busybox.net/show_bug.cgi?id=7652",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1185707",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu",
        "https://security.gentoo.org/glsa/201503-13",
        "https://usn.ubuntu.com/3935-1/",
        "http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b",
        "http://openwall.com/lists/oss-security/2015/01/24/4",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://www.securityfocus.com/bid/72324",
        "https://bugs.busybox.net/show_bug.cgi?id=7652",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1185707",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu",
        "https://security.gentoo.org/glsa/201503-13",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 5.5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.",
      "vector_string": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-20"
    },
    "CVE-2015-9261": {
      "id": "CVE-2015-9261",
      "references": [
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2022/Jun/36",
        "http://www.openwall.com/lists/oss-security/2015/10/25/3",
        "https://bugs.debian.org/803097",
        "https://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2022/Jun/36",
        "http://www.openwall.com/lists/oss-security/2015/10/25/3",
        "https://bugs.debian.org/803097",
        "https://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 5.5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2016-2147": {
      "id": "CVE-2016-2147",
      "references": [
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2016/03/11/16",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201612-04",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2016/03/11/16",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201612-04",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2016-2148": {
      "id": "CVE-2016-2148",
      "references": [
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2016/03/11/16",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201612-04",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://www.openwall.com/lists/oss-security/2016/03/11/16",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201612-04",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-119"
    },
    "CVE-2016-6301": {
      "id": "CVE-2016-6301",
      "references": [
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://www.openwall.com/lists/oss-security/2016/08/03/7",
        "http://www.securityfocus.com/bid/92277",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1363710",
        "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201701-05",
        "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://www.openwall.com/lists/oss-security/2016/08/03/7",
        "http://www.securityfocus.com/bid/92277",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1363710",
        "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://security.gentoo.org/glsa/201701-05"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-399"
    },
    "CVE-2017-16544": {
      "id": "CVE-2017-16544",
      "references": [
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
        "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://seclists.org/fulldisclosure/2020/Sep/6",
        "http://seclists.org/fulldisclosure/2021/Aug/21",
        "http://seclists.org/fulldisclosure/2021/Jan/39",
        "http://seclists.org/fulldisclosure/2022/Jun/36",
        "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
        "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01",
        "https://usn.ubuntu.com/3935-1/",
        "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html",
        "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
        "http://seclists.org/fulldisclosure/2019/Jun/18",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "http://seclists.org/fulldisclosure/2020/Aug/20",
        "http://seclists.org/fulldisclosure/2020/Mar/15",
        "http://seclists.org/fulldisclosure/2020/Sep/6",
        "http://seclists.org/fulldisclosure/2021/Aug/21",
        "http://seclists.org/fulldisclosure/2021/Jan/39",
        "http://seclists.org/fulldisclosure/2022/Jun/36",
        "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
        "https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://seclists.org/bugtraq/2019/Jun/14",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01",
        "https://usn.ubuntu.com/3935-1/",
        "https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/"
      ],
      "score": 8.8,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-94"
    },
    "CVE-2018-1000500": {
      "id": "CVE-2018-1000500",
      "references": [
        "http://lists.busybox.net/pipermail/busybox/2018-May/086462.html",
        "https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91",
        "https://usn.ubuntu.com/4531-1/",
        "http://lists.busybox.net/pipermail/busybox/2018-May/086462.html",
        "https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91",
        "https://usn.ubuntu.com/4531-1/"
      ],
      "score": 8.1,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-295"
    },
    "CVE-2018-1000517": {
      "id": "CVE-2018-1000517",
      "references": [
        "https://git.busybox.net/busybox/commit/?id=8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://usn.ubuntu.com/3935-1/",
        "https://git.busybox.net/busybox/commit/?id=8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e",
        "https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html",
        "https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2018-20679": {
      "id": "CVE-2018-20679",
      "references": [
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "https://bugs.busybox.net/show_bug.cgi?id=11506",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "https://bugs.busybox.net/show_bug.cgi?id=11506",
        "https://busybox.net/news.html",
        "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2019-5747": {
      "id": "CVE-2019-5747",
      "references": [
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "https://bugs.busybox.net/show_bug.cgi?id=11506",
        "https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/",
        "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
        "http://seclists.org/fulldisclosure/2019/Sep/7",
        "https://bugs.busybox.net/show_bug.cgi?id=11506",
        "https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06",
        "https://seclists.org/bugtraq/2019/Sep/7",
        "https://usn.ubuntu.com/3935-1/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2021-42376": {
      "id": "CVE-2021-42376",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 5.5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-42378": {
      "id": "CVE-2021-42378",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2021-42379": {
      "id": "CVE-2021-42379",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2021-42384": {
      "id": "CVE-2021-42384",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2021-42385": {
      "id": "CVE-2021-42385",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2021-42386": {
      "id": "CVE-2021-42386",
      "references": [
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/",
        "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
        "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/",
        "https://security.netapp.com/advisory/ntap-20211223-0002/"
      ],
      "score": 7.2,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-28391": {
      "id": "CVE-2022-28391",
      "references": [
        "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch",
        "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch",
        "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661",
        "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch",
        "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch",
        "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661"
      ],
      "score": 8.8,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "443/http"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2022-48174": {
      "id": "CVE-2022-48174",
      "references": [
        "https://bugs.busybox.net/show_bug.cgi?id=15216",
        "https://bugs.busybox.net/show_bug.cgi?id=15216",
        "https://security.netapp.com/advisory/ntap-20241129-0001/"
      ],
      "score": 9.8,
      "services": [
        "443/http"
      ],
      "severity": "critical",
      "summary": "There is a stack overflow vulnerability in ash.c:6030 in busybox before 1.35. In the environment of Internet of Vehicles, this vulnerability can be executed from command to arbitrary code execution.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    }
  }
}