Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.253.143.41

SummaryCVE DetailsRaw Data
27 Jun 2025, 10:26:53 UTC
{
  "scan_id": 1750904362,
  "ip": "182.253.143.41",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.253.142.0/23",
    "postal_code": "50136",
    "coordinates": {
      "latitude": "-6.9932",
      "longitude": "110.4215"
    },
    "geo_point": "-6.9932, 110.4215",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "ID",
    "country_name": "Indonesia",
    "city": "Semarang"
  },
  "location_updated_at": "2025-06-26T00:43:14Z",
  "asn": {
    "number": "AS17451",
    "organization": "BIZNET NETWORKS",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.253.0.0/16",
    "organization": "Biznet Networks",
    "descr": "Biznet Networks,\nInternet Service Provider,\nJakarta, Indonesia",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:54Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-06-26T00:43:14Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-06-26T03:52:42Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-06-26T00:43:14Z"
    }
  ],
  "services": [
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.18.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.18\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>001-default</title>\n</head>\n</html>\n",
          "body_murmur": 1674814224,
          "body_sha256": "91a512072c2b34237c522054489f6eb99c28c18fd98dd4236278c5bf98092486",
          "component": [
            "Nginx:1.18.0",
            "Ubuntu"
          ],
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 27 Jun 2025 10:26:44 GMT"
            ],
            "etag": [
              "\"49-60927e6dece80-gzip\""
            ],
            "last_modified": [
              "Thu, 02 Nov 2023 09:20:42 GMT"
            ],
            "server": [
              "nginx/1.18.0 (Ubuntu)"
            ],
            "vary": [
              "Accept-Encoding"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.253.143.41",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "001-default"
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "score": 2.1,
          "severity": "low"
        }
      ],
      "url": "http://182.253.143.41/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-27T10:26:53.599Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "1.18.0",
      "product": "nginx",
      "extra_info": "Ubuntu",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.18\\.0",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>001-default</title>\n</head>\n</html>\n",
          "body_murmur": 1674814224,
          "body_sha256": "91a512072c2b34237c522054489f6eb99c28c18fd98dd4236278c5bf98092486",
          "component": [
            "Nginx:1.18.0",
            "Ubuntu"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "78a923f285db20cf2fbce8a74af74666",
            "murmur_hash": 378475193,
            "path": "https://182.253.143.41:443/favicon.ico",
            "size": 878
          },
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Fri, 27 Jun 2025 03:25:57 GMT"
            ],
            "etag": [
              "\"49-60927e6dece80-gzip\""
            ],
            "last_modified": [
              "Thu, 02 Nov 2023 09:20:42 GMT"
            ],
            "server": [
              "nginx/1.18.0 (Ubuntu)"
            ],
            "vary": [
              "Accept-Encoding"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.253.143.41",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "001-default"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "e8203ae26425dfd187b8c520f96011f1e357a96f",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "ip_address": [
                  "192.168.1.57"
                ]
              }
            },
            "fingerprint_md5": "1FEBB701DED574FB91A2A6FF479D64FD",
            "fingerprint_sha1": "A433682C53B33ADAE301D40865F40AF41C3F4177",
            "fingerprint_sha256": "076B206E8181EBDA3D6166C52B0F4D633866E346639C8B3ECE90ADE3B226E763",
            "issuer": {
              "common_name": [
                "mkcert ubuntu-rr@ubuntu-rr"
              ],
              "organization": [
                "mkcert development CA"
              ],
              "organizational_unit": [
                "ubuntu-rr@ubuntu-rr"
              ]
            },
            "issuer_dn": "/O=mkcert development CA/OU=ubuntu-rr@ubuntu-rr/CN=mkcert ubuntu-rr@ubuntu-rr",
            "jarm": "2ad2ad0002ad2ad00042d42d000000301510f56407964db9434a9bb0d4ee4a",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "321312739946691509963723479739611855142",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "subject": {
              "organization": [
                "mkcert development certificate"
              ],
              "organizational_unit": [
                "ubuntu-rr@ubuntu-rr"
              ]
            },
            "subject_alt_name": {
              "extended_dns_names": []
            },
            "subject_dn": "/O=mkcert development certificate/OU=ubuntu-rr@ubuntu-rr",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "937bc39cef6f569cf2783635272cb2d9f6b98948850fc3370d8ac305d8f0ee14",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "3b289d6fe40836eff8bc76f55b562e915eac9b8fd9e4986c05535c9d93ffd480",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 71107200,
              "not_after": "2024-11-22T06:30:01",
              "not_before": "2022-08-22T06:30:01"
            },
            "version": 2
          },
          "fingerprint_sha256": "076B206E8181EBDA3D6166C52B0F4D633866E346639C8B3ECE90ADE3B226E763",
          "precert": false,
          "raw": "MIIEDjCCAnagAwIBAgIRAPG6lS5LU/fTMQlSKWYNuSYwDQYJKoZIhvcNAQELBQAwYzEeMBwGA1UEChMVbWtjZXJ0IGRldmVsb3BtZW50IENBMRwwGgYDVQQLDBN1YnVudHUtcnJAdWJ1bnR1LXJyMSMwIQYDVQQDDBpta2NlcnQgdWJ1bnR1LXJyQHVidW50dS1ycjAeFw0yMjA4MjIwNjMwMDFaFw0yNDExMjIwNjMwMDFaMEcxJzAlBgNVBAoTHm1rY2VydCBkZXZlbG9wbWVudCBjZXJ0aWZpY2F0ZTEcMBoGA1UECwwTdWJ1bnR1LXJyQHVidW50dS1ycjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3jqSkgBwZe9FkCeWjT8pkynk7yXokm8dGqCXj5UnIRNCwKXTv56vhWqf8bjwr2xM1eKxp8J06HxrmgrNf+miFuiV/Jy7ubCTDckglJopdUXkTW/1rFZiEhlnQGEJnaeRSWUBXu6vnn7DXpcvX4hpYEJ72A/q1T8RGml2PWxoOuCvuV6XcVZV2uLWgJhVqUFFHLKvIVM8A01R/8NiDwi5bKQ9fbjPR3vhT7zhRachdOmOhjzOdZuHFTeBUBJ6wO/uFaweY3Inb5LUvSD7Yh2k4ibtDykKxSBEuBT1v6xkx+BDcgC/PVFfmKjva4xguTzbBDwwb8ElGpjxWCzBAHtH0CAwEAAaNZMFcwDgYDVR0PAQH/BAQDAgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB8GA1UdIwQYMBaAFOggOuJkJd/Rh7jFIPlgEfHjV6lvMA8GA1UdEQQIMAaHBMCoATkwDQYJKoZIhvcNAQELBQADggGBAI4RWLKX1yexcq3ztj4hDYBH9rrZq0JS+tnFqUuR8XpzqrlbzgWhAGwJTfhwNYgV7FON8YOiGlylOvu2bREIrDB2+AdPco0gPS7ePNwuzn9yImbDpfPpbkWQSS9292MMHgPKNHZwwI9ouiORw3Dpk+A2/Mmu/ZEXej8sofqkOmr9dMC6pCKPLnOWHMRarTyhN/uLIgUDfD7RfwucNX9iwk1dUFtAJfgGCQn3e/s7iwWPh/Y0Wijwab2ZGHUkWCcjqO5gTJXfstErHyM+QVAR/m1h7NzIYy6kyJTOMBfiYEbs1SoAth0alz9mq/0++DHrcrEnhU8BSKQ6vh+ysUN3Q9j0RGZD7OZf2Bc0tjeM6nug1oth6jinYrAUeDur658f1AR+5TVErNedyZlUeaSU7vv2mX0H2+X2A4RYh+oxkN+ZJYgWFnQuLI7yeHQqOF23Wy4CSGWQ4KxlqSwT0sWjgT/3DYr7pA0eYGP/xYvDyh3gHYHfuOB49E4QMFku+hWBEA==",
          "tags": [
            "ov"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-0431",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-0656",
          "score": 5,
          "severity": "medium"
        },
        {
          "id": "CVE-1999-1285",
          "score": 2.1,
          "severity": "low"
        }
      ],
      "url": "https://182.253.143.41/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-27T03:26:12.917Z"
    },
    {
      "port": 5000,
      "protocol": "tcp",
      "name": "postgresql",
      "version": "",
      "product": "PostgreSQL DB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postgresql:postgresql",
          "part": "a",
          "vendor": "postgresql",
          "product": "postgresql",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "postgres": {
          "errors": [
            {
              "code": "08P01",
              "file": "",
              "line": "",
              "message": "bad packet header: '0000000800ff00ff'",
              "routine": "",
              "severity": "FATAL"
            },
            {
              "code": "08P01",
              "file": "",
              "line": "",
              "message": "bad packet header: '0000003100000000'",
              "routine": "",
              "severity": "FATAL"
            },
            {
              "code": "08P01",
              "file": "",
              "line": "",
              "message": "bad packet header: '0000003f00000000'",
              "routine": "",
              "severity": "FATAL"
            }
          ],
          "is_ssl": false,
          "supported_versions": "SFATAL\u0000C08P01\u0000Mbad packet header: '0000000800000000'"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-23T05:20:28.849Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "postgresql",
      "version": "13.5 - 13.9",
      "product": "PostgreSQL DB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postgresql:postgresql:13",
          "part": "a",
          "vendor": "postgresql",
          "product": "postgresql",
          "version": "13",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "postgres": {
          "errors": [
            {
              "code": "0A000",
              "file": "postmaster.c",
              "line": "2127",
              "message": "unsupported frontend protocol 255.255: server supports 2.0 to 3.0",
              "routine": "ProcessStartupPacket",
              "severity": "FATAL"
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            }
          ],
          "is_ssl": true,
          "supported_versions": "FATAL:  unsupported frontend protocol 0.0: server supports 2.0 to 3.0"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "ubuntu"
                ]
              }
            },
            "fingerprint_md5": "503D3042EFA5F2C6C2BD8CAA5F5B8FAF",
            "fingerprint_sha1": "94110381DA060E54C6E40E57598E64303C1CD3E2",
            "fingerprint_sha256": "FC21DADD9ACE2E426507CB400826446321A24AF4CD8ECC8EEE4A1235948ABBDF",
            "issuer": {
              "common_name": [
                "ubuntu"
              ]
            },
            "issuer_dn": "/CN=ubuntu",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "632507081794207866667054083097915910055119026223",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "ubuntu"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "ubuntu"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=ubuntu",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "9a615516b2af0a1ade62d9ab85efa84730f5a5c94e4d2ccc4561343e34c3db5c",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "6663e64ae58c6ecc83060b5be3455b3f5b9f5eb64758bf3afb509bbf1046cedb",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2032-01-08T05:02:18",
              "not_before": "2022-01-10T05:02:18"
            },
            "version": 2
          },
          "fingerprint_sha256": "FC21DADD9ACE2E426507CB400826446321A24AF4CD8ECC8EEE4A1235948ABBDF",
          "precert": false,
          "raw": "MIIC0DCCAbigAwIBAgIUbsqZNcKtKNikYuOEgp6TBDJX+C8wDQYJKoZIhvcNAQELBQAwETEPMA0GA1UEAwwGdWJ1bnR1MB4XDTIyMDExMDA1MDIxOFoXDTMyMDEwODA1MDIxOFowETEPMA0GA1UEAwwGdWJ1bnR1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw02VWiZxrQhS8AqbRrOOzrEqIYUJqFUSeYTO3195jQEjLNi/n3kMhQDNf62IOUkOkB/Gug+Yb8/QATjCothzNRR/Ivckaeui+i+hjyBvhkoj7XF0s+z/Q7ZokpVfG2N8IYXiumWpET54IfVcv8jf0fqcjpQWEESTTSl5oIMWLKIOEJTAvJS0Sg8xVPyIqFouCIT0JYybCnmeP8YGyHCMSlMWIW5u9tHlr6eGCFZmYaEVYHrgK6Z62pFbAleSJOnzAUSNehPjfln/maiFdpV9VNosOHgee9mxp4POy3BwAQt6Udi6dlk2wAuuKvXbJ+lWryCW87H2SYfxOBZqa4xRBQIDAQABoyAwHjAJBgNVHRMEAjAAMBEGA1UdEQQKMAiCBnVidW50dTANBgkqhkiG9w0BAQsFAAOCAQEAsnhyScuptH4x+N5oRZztkZ0M0zNFe/lJM0FBHGOAp21+XbdZuv3NJLj5ffQ932wERe7mJmCcjWiCojrRtOxqN2NhXk9IZsFtm11/iy0wTNBJtQXkzMuF4TkbsLuMvInqHubEHtp5yaIAuqPmVxZPpRE9yQmuDvWXvueEViVn8HTs/lg024NydBwL0IJ7dxNoNAKdLikTcR/YibYZ3qCd7I0kpeIScjaoQCwGT8n62JVd5+jIKIA6mg1WQtj1SRoKWdgM7B7k3xQXyZYIouezR9dGoWymAHD4+EelTnBw/m9LM6T+jcWVlU9NOuf4Ji7qQaR/uZcIkkRMdda83VnWBg==",
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-26T04:02:36.496Z"
    }
  ],
  "services_hash": "62e96d64cdf1d9d08a4730e7a8622e7d0c11bedd4faaca2e90dd5efa08da3e0b",
  "last_updated_at": "2025-06-27T10:26:53.599Z",
  "banner": [
    "postgres",
    "tls",
    "http"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "80/http"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    }
  }
}