Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.61.148.219

SummaryCVE DetailsRaw Data
06 Feb 2026, 14:55:50 UTC
{
  "scan_id": 1770384002,
  "ip": "182.61.148.219",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.61.0.0/16",
    "postal_code": "",
    "coordinates": {
      "latitude": "34.7732",
      "longitude": "113.722"
    },
    "geo_point": "34.7732, 113.722",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "CN",
    "country_name": "China",
    "city": ""
  },
  "location_updated_at": "2026-02-03T16:41:47Z",
  "asn": {
    "number": "AS38365",
    "organization": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.61.0.0/16",
    "organization": "Baidu",
    "descr": "Baidu",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:26:58Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-02-03T16:41:47Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-02-03T19:19:42Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-02-03T16:41:47Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "8.2p1 Ubuntu 4ubuntu0.5",
      "product": "OpenSSH",
      "extra_info": "Ubuntu Linux; protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:openbsd:openssh:8.2p1",
          "part": "a",
          "vendor": "openbsd",
          "product": "openssh",
          "version": "8\\.2p1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:linux:linux_kernel",
          "part": "o",
          "vendor": "linux",
          "product": "linux_kernel",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.5",
          "client_to_server_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]"
          ],
          "client_to_server_compression": [
            "none",
            "[email protected]"
          ],
          "client_to_server_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "host_key_algorithms": [
            "rsa-sha2-512",
            "rsa-sha2-256",
            "ssh-rsa",
            "ecdsa-sha2-nistp256",
            "ssh-ed25519"
          ],
          "kex_algorithms": [
            "curve25519-sha256",
            "[email protected]",
            "ecdh-sha2-nistp256",
            "ecdh-sha2-nistp384",
            "ecdh-sha2-nistp521",
            "diffie-hellman-group-exchange-sha256",
            "diffie-hellman-group16-sha512",
            "diffie-hellman-group18-sha512",
            "diffie-hellman-group14-sha256"
          ],
          "key": {
            "algorithm": "ecdsa-sha2-nistp256",
            "fingerprint_sha256": "6f0868f544e8644c8b496e8976b7fe4b12d49a84be731d4bd241431cf1a3176f",
            "raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBO0EaRmzwkyYJjPt5NazPCs9w2WrGYPBFgT2vn88AHfU4WITUkwX/4Oo3b5Q4wuVyctKODLzoaiLA85Dl+0+bQc="
          },
          "server_to_client_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]"
          ],
          "server_to_client_compression": [
            "none",
            "[email protected]"
          ],
          "server_to_client_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "software": "OpenSSH_8.2p1",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-2768",
          "score": 4.3,
          "severity": "medium"
        },
        {
          "id": "CVE-2008-3844",
          "score": 9.3,
          "severity": "high"
        },
        {
          "id": "CVE-2016-20012",
          "score": 5.3,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-02T17:28:58.218Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html>\n<head>\n<title>LNMP一键安装包 by Licess</title>\n<meta charset=\"utf-8\">\n<meta name=\"author\" content=\"Licess\">\n<meta name=\"keywords\" content=\"lnmp,lnmp一键安装包,一键安装包\">\n<meta name=\"description\" content=\"您已成功安装LNMP一键安装包!\">\n<style type=\"text/css\">\n<!--\nbody {\ncolor:#333333;\nfont-family:\"Helvetica Neue\", Helvetica, Arial, \"PingFang SC\", \"Hiragino Sans GB\", \"Heiti SC\", \"Microsoft YaHei\", \"WenQuanYi Micro Hei\", sans-serif;\n}\n.links {color: #009900}\n#main {\n    margin-top: 50px;\n    margin-right: auto;\n    margin-left: auto;\n    width: 80%;\n}\n-->\n</style>\n</head>\n<body>\n<div id=\"main\">\n<div align=\"center\"><b>恭喜您,LNMP一键安装包安装成功!</b></div>\n<div align=\"center\"><img src=\"lnmp.gif\" alt=\"LNMP一键安装包\"></div>\n<br><h2 style=\"word-break:break-all;\"><a href=\"https://lnmp.org\" target=\"_blank\">LNMP一键安装包</a>是一个用Linux Shell编写的可以为CentOS/RHEL/Fedora/Aliyun/Amazon Linux、Debian/Ubuntu/Raspbian/Deepin/Mint Linux VPS或独立主机安装LNMP(Nginx/MySQL/PHP)、LNMPA(Nginx/MySQL/PHP/Apache)、LAMP(Apache/MySQL/PHP)生产环境的Shell程序。</h2>\n<h3>支持自定义Nginx、PHP编译参数及网站和数据库目录、支持生成Let’s Ecrypt免费证书及自备证书、支持HTTP2、TLS 1.3等新特性、LNMP模式支持多PHP版本、支持单独安装Nginx/MySQL/MariaDB/Pureftpd服务器、支持无人值守安装,同时提供一些实用的辅助工具如:虚拟主机管理、FTP用户管理、Nginx/MySQL/MariaDB/PHP/PHPMyAdmin的升级、常用缓存组件Redis/Xcache等的安装、重置MySQL root密码、502自动重启、日志切割、SSH防护DenyHosts/Fail2Ban、备份等许多实用脚本。</h3>\n\n<p>查看本地环境: <a href=\"/p.php\" target=\"_blank\" class=\"links\">探针</a>&nbsp;&nbsp;<a href=\"/phpinfo.php\" target=\"_blank\" class=\"links\">phpinfo</a>&nbsp;&nbsp;<a href=\"/phpmyadmin/\" target=\"_blank\" class=\"links\">phpMyAdmin</a>(为了安全,建议将phpmyadmin目录重命名为不容易猜到的目录!)</p>\n\n<p>更多LNMP一键安装包信息请访问: <a href=\"https://lnmp.org\" target=\"_blank\">https://lnmp.org</a></p>\n<p>LNMP一键安装包常见问题: <a href=\"https://lnmp.org/faq.html\" target=\"_blank\">https://lnmp.org/faq.html</a></p>\n<p>LNMP一键安装包问题反馈&使用交流: <a href=\"https://bbs.vpser.net/forum-25-1.html\" target=\"_blank\">https://bbs.vpser.net/forum-25-1.html</a></p>\n<p>VPS相关教程: <a href=\"https://www.vpser.net/vps-howto\" target=\"_blank\">https://www.vpser.net/vps-howto</a></p>\n<p>美国VPS推荐: <a href=\"https://www.vpser.net/ten-dollars-vps\" target=\"_blank\">https://www.vpser.net/ten-dollars-vps</a></p>\n\n<div align=\"center\"><b>声明:出现该页面只说明您当前访问的域名/网站使用了LNMP一键安装包搭建的环境,当前域名/网站与LNMP一键安装包、VPS侦探和licess不存在任何关系!</b></div>\n\n<div align=\"center\"><h3><a href=\"https://lnmp.org\" target=\"_blank\">LNMP一键安装包</a> by <a href=\"http://blog.licess.com\" target=\"_blank\">Licess</a> & <a href=\"https://www.vpser.net\" target=\"_blank\">VPS侦探</a></h3></div>\n</div>\n</body>\n</html>",
          "body_murmur": 1216927613,
          "body_sha256": "b784eef19ab0594352033920907dec59ea39abeca6f53e684a2d7f0fe48a33fc",
          "component": [
            "Nginx"
          ],
          "content_length": -1,
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Sat, 31 Jan 2026 05:32:29 GMT"
            ],
            "etag": [
              "W/\"6411f843-c7c\""
            ],
            "last_modified": [
              "Wed, 15 Mar 2023 16:54:27 GMT"
            ],
            "server": [
              "nginx"
            ],
            "vary": [
              "Accept-Encoding"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.61.148.219",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200,
          "title": "LNMP一键安装包 by Licess",
          "transfer_encoding": [
            "chunked"
          ]
        }
      },
      "url": "http://182.61.148.219/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-31T05:32:30.944Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html class=\"devise-layout-html\">\n<head prefix=\"og: http://ogp.me/ns#\">\n<meta charset=\"utf-8\">\n<title>Sign in · JiHu GitLab</title>\n<link rel=\"preload\" href=\"/assets/application_utilities-09ecae1be7ceb26fc30e17dd062258411a2e095ca1ed03470162376846422b2d.css\" as=\"style\" type=\"text/css\">\n<link rel=\"preload\" href=\"/assets/application-52a064762a7ad98c1683fb1168218a4855f4428affd0571430551906558c82c9.css\" as=\"style\" type=\"text/css\">\n<link rel=\"preload\" href=\"/assets/highlight/themes/white-685d923b3c75de8cdc526132926410f968d77f11c2980dbc3840da37b7ddf578.css\" as=\"style\" type=\"text/css\">\n\n<meta content=\"IE=edge\" http-equiv=\"X-UA-Compatible\">\n\n\n\n<link rel=\"shortcut icon\" type=\"image/png\" href=\"/assets/favicon-72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef.png\" id=\"favicon\" data-original-href=\"/assets/favicon-72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef.png\" />\n<style>\n@keyframes blinking-dot{0%{opacity:1}25%{opacity:0.4}75%{opacity:0.4}100%{opacity:1}}@keyframes gl-spinner-rotate{0%{transform:rotate(0)}100%{transform:rotate(360deg)}}body.ui-indigo{--gl-theme-accent: #6666c4}body.ui-indigo .navbar-gitlab{background-color:#292961}body.ui-indigo .navbar-gitlab .navbar-collapse{color:#d1d1f0}body.ui-indigo .navbar-gitlab .container-fluid .navbar-toggler{border-left:1px solid #6868b9;color:#d1d1f0}body.ui-indigo .navbar-gitlab .navbar-sub-nav>li>a:hover,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li>a:focus,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li>button:hover,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li>button:focus,body.ui-indigo .navbar-gitlab .navbar-nav>li>a:hover,body.ui-indigo .navbar-gitlab .navbar-nav>li>a:focus,body.ui-indigo .navbar-gitlab .navbar-nav>li>button:hover,body.ui-indigo .navbar-gitlab .navbar-nav>li>button:focus{background-color:rgba(209,209,240,0.2)}body.ui-indigo .navbar-gitlab .navbar-sub-nav>li.active>a,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li.active>button,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li.dropdown.show>a,body.ui-indigo .navbar-gitlab .navbar-sub-nav>li.dropdown.show>button,body.ui-indigo .navbar-gitlab .navbar-nav>li.active>a,body.ui-indigo .navbar-gitlab .navbar-nav>li.active>button,body.ui-indigo .navbar-gitlab .navbar-nav>li.dropdown.show>a,body.ui-indigo .navbar-gitlab .navbar-nav>li.dropdown.show>button{color:#292961;background-color:#fff}body.ui-indigo .navbar-gitlab .navbar-sub-nav>li.line-separator,body.ui-indigo .navbar-gitlab .navbar-nav>li.line-separator{border-left:1px solid rgba(209,209,240,0.2)}body.ui-indigo .navbar-gitlab .navbar-sub-nav{color:#d1d1f0}body.ui-indigo .navbar-gitlab .nav>li{color:#d1d1f0}body.ui-indigo .navbar-gitlab .nav>li.header-search-new{color:#333238}body.ui-indigo .navbar-gitlab .nav>li>a .notification-dot{border:2px solid #292961}body.ui-indigo .navbar-gitlab .nav>li>a.header-help-dropdown-toggle .notification-dot{background-color:#d1d1f0}body.ui-indigo .navbar-gitlab .nav>li>a.header-user-dropdown-toggle .header-user-avatar{border-color:#d1d1f0}@media (min-width: 576px){body.ui-indigo .navbar-gitlab .nav>li>a:hover,body.ui-indigo .navbar-gitlab .nav>li>a:focus{background-color:rgba(209,209,240,0.2)}}body.ui-indigo .navbar-gitlab .nav>li>a:hover svg,body.ui-indigo .navbar-gitlab .nav>li>a:focus svg{fill:currentColor}body.ui-indigo .navbar-gitlab .nav>li>a:hover .notification-dot,body.ui-indigo .navbar-gitlab .nav>li>a:focus .notification-dot{will-change:border-color, background-color;border-color:#4a4a82}body.ui-indigo .navbar-gitlab .nav>li>a.header-help-dropdown-toggle:hover .notification-dot,body.ui-indigo .navbar-gitlab .nav>li>a.header-help-dropdown-toggle:focus .notification-dot{background-color:#fff}body.ui-indigo .navbar-gitlab .nav>li.active>a,body.ui-indigo .navbar-gitlab .nav>li.dropdown.show>a{color:#292961;background-color:#fff}body.ui-indigo .navbar-gitlab .nav>li.active>a:hover svg,body.ui-indigo .navbar-gitlab .nav>li.dropdown.show>a:hover svg{fill:#292961}body.ui-indigo .navbar-gitlab .nav>li.active>a .notification-dot,body.ui-indigo .navbar-gitlab .nav>li.dropdown.show>a .notification-dot{border-color:#fff}body.ui-indigo .navbar-gitlab .nav>li.active>a.header-help-dropdown-toggle .notification-dot,body.ui-indigo .navbar-gitlab .nav>li.dropdown.show>a.header-help-dropdown-toggle .notification-dot{background-color:#292961}body.ui-indigo .navbar-gitlab .nav>li .impersonated-user svg,body.ui-indigo .navbar-gitlab .nav>li .impersonated-user:hover svg{fill:#292961}body.ui-indigo .navbar .title>a:hover,body.ui-indigo .navbar .title>a:focus{background-color:rgba(209,209,240,0.2)}body.ui-indigo .header-search{background-color:rgba(209,209,240,0.2) !important;border-radius:4px}body.ui-indigo .header-search:hover{background-color:rgba(209,209,240,0.3) !important}body.ui-indigo .header-search svg.gl-search-box-by-type-search-icon{color:rgba(209,209,240,0.8)}body.ui-indigo .header-search input{background-color:transparent;color:rgba(209,209,240,0.8);box-shadow:inset 0 0 0 1px rgba(209,209,240,0.4)}body.ui-indigo .header-search input::placeholder{color:rgba(209,209,240,0.8)}body.ui-indigo .header-search input:focus::placeholder,body.ui-indigo .header-search input:active::placeholder{color:#89888d}body.ui-indigo .header-search .keyboard-shortcut-helper{color:#d1d1f0;background-color:rgba(209,209,240,0.2)}body.ui-indigo .search form{background-color:rgba(209,209,240,0.2)}body.ui-indigo .search form:hover{background-color:rgba(209,209,240,0.3)}body.ui-indigo .search .search-input::placeholder{color:rgba(209,209,240,0.8)}body.ui-indigo .search .search-input-wrap .search-icon,body.ui-indigo .search .search-input-wrap .clear-icon{fill:rgba(209,209,240,0.8)}body.ui-indigo .search.search-active form{background-color:#fff}body.ui-indigo .search.search-active .search-input-wrap .search-icon{fill:rgba(209,209,240,0.8)}body.ui-indigo .search-sidebar .nav-link.active,body.ui-indigo .search-sidebar .nav-link:hover{background-color:rgba(236,236,239,0.8);color:#333238}body.ui-indigo .nav-sidebar li.active>a{color:#333238}body.ui-indigo .nav-sidebar .fly-out-top-item a,body.ui-indigo .nav-sidebar .fly-out-top-item a:hover,body.ui-indigo .nav-sidebar .fly-out-top-item.active a,body.ui-indigo .nav-sidebar .fly-out-top-item .fly-out-top-item-container{background-color:var(--gray-100, #ececef);color:var(--gray-900, #333238)}body.ui-indigo .branch-header-title{color:#4b4ba3}body.ui-indigo .ide-sidebar-link.active{color:#4b4ba3}body.ui-indigo .ide-sidebar-link.active.is-right{box-shadow:inset -3px 0 #4b4ba3}\n\n*,*::before,*::after{box-sizing:border-box}html{font-family:sans-serif;line-height:1.15}header{display:block}body{margin:0;font-family:var(--default-regular-font, -apple-system),BlinkMacSystemFont,\"Segoe UI\",Roboto,\"Noto Sans\",Ubuntu,Cantarell,\"Helvetica Neue\",sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\",\"Segoe UI Symbol\",\"Noto Color Emoji\";font-size:1rem;font-weight:400;line-height:1.5;color:#333238;text-align:left;background-color:#fff}hr{box-sizing:content-box;height:0;overflow:visible}h1,h3{margin-top:0;margin-bottom:0.25rem}p{margin-top:0;margin-bottom:1rem}a{color:#1f75cb;text-decoration:none;background-color:transparent}a:not([href]):not([class]){color:inherit;text-decoration:none}img{vertical-align:middle;border-style:none}svg{overflow:hidden;vertical-align:middle}label{display:inline-block;margin-bottom:0.5rem}button{border-radius:0}input,button{margin:0;font-family:inherit;font-size:inherit;line-height:inherit}button,input{overflow:visible}button{text-transform:none}[role=\"button\"]{cursor:pointer}button:not(:disabled),[type=\"button\"]:not(:disabled),[type=\"submit\"]:not(:disabled){cursor:pointer}button::-moz-focus-inner,[type=\"button\"]::-moz-focus-inner,[type=\"submit\"]::-moz-focus-inner{padding:0;border-style:none}input[type=\"checkbox\"]{box-sizing:border-box;padding:0}fieldset{min-width:0;padding:0;margin:0;border:0}[hidden]{display:none !important}h1,h3{margin-bottom:0.25rem;font-weight:600;line-height:1.2;color:#333238}h1{font-size:2.1875rem}h3{font-size:1.53125rem}hr{margin-top:0.5rem;margin-bottom:0.5rem;border:0;border-top:1px solid rgba(0,0,0,0.1)}.container{width:100%;padding-right:15px;padding-left:15px;margin-right:auto;margin-left:auto}@media (min-width: 576px){.container{max-width:540px}}@media (min-width: 768px){.container{max-width:720px}}@media (min-width: 992px){.container{max-width:960px}}@media (min-width: 1200px){.container{max-width:1140px}}.row{display:flex;flex-wrap:wrap;margin-right:-15px;margin-left:-15px}.col-md-6,.col-sm-12{position:relative;width:100%;padding-right:15px;padding-left:15px}.order-1{order:1}.order-12{order:12}@media (min-width: 576px){.col-sm-12{flex:0 0 100%;max-width:100%}.order-sm-1{order:1}.order-sm-12{order:12}}@media (min-width: 768px){.col-md-6{flex:0 0 50%;max-width:50%}}.form-control{display:block;width:100%;height:32px;padding:0.375rem 0.75rem;font-size:0.875rem;font-weight:400;line-height:1.5;color:#333238;background-color:#fff;background-clip:padding-box;border:1px solid #89888d;border-radius:0.25rem}.form-control::placeholder{color:#626168;opacity:1}.form-control:disabled{background-color:#fbfafd;opacity:1}.form-group{margin-bottom:1rem}.btn{display:inline-block;font-weight:400;color:#333238;text-align:center;vertical-align:middle;-webkit-user-select:none;user-select:none;background-color:transparent;border:1px solid transparent;padding:0.375rem 0.75rem;font-size:1rem;line-height:20px;border-radius:0.25rem}.btn:disabled{opacity:0.65}.btn:not(:disabled):not(.disabled){cursor:pointer}fieldset:disabled a.btn{pointer-events:none}.btn-block{display:block;width:100%}.btn-block+.btn-block{margin-top:0.5rem}input.btn-block[type=\"submit\"],input.btn-block[type=\"button\"]{width:100%}.custom-control{position:relative;z-index:1;display:block;min-height:1.5rem;padding-left:1.5rem;print-color-adjust:exact}.custom-control-input{position:absolute;left:0;z-index:-1;width:1rem;height:1.25rem;opacity:0}.custom-control-input:checked~.custom-control-label::before{color:#fff;border-color:#007bff;background-color:#007bff}.custom-control-input:not(:disabled):active~.custom-control-label::before{color:#fff;background-color:#b3d7ff;border-color:#b3d7ff}.custom-control-input:disabled~.custom-control-label{color:#626168}.custom-control-input:disabled~.custom-control-label::before{background-color:#fbfafd}.custom-control-label{position:relative;margin-bottom:0;vertical-align:top}.custom-control-label::before{position:absolute;top:0.25rem;left:-1.5rem;display:block;width:1rem;height:1rem;pointer-events:none;content:\"\";background-color:#fff;border:1px solid #737278}.custom-control-label::after{position:absolute;top:0.25rem;left:-1.5rem;display:block;width:1rem;height:1rem;content:\"\";background:50% / 50% 50% no-repeat}.custom-checkbox .custom-control-label::before{border-radius:0.25rem}.custom-checkbox .custom-control-input:checked~.custom-control-label::after{background-image:url(\"data:image/svg+xml,%3csvg xmlns='http://www.w3.org/2000/svg' width='8' height='8' viewBox='0 0 8 8'%3e%3cpath fill='%23fff' d='M6.564.75l-3.59 3.612-1.538-1.55L0 4.26l2.974 2.99L8 2.193z'/%3e%3c/svg%3e\")}.custom-checkbox .custom-control-input:indeterminate~.custom-control-label::before{border-color:#007bff;background-color:#007bff}.custom-checkbox .custom-control-input:indeterminate~.custom-control-label::after{background-image:url(\"data:image/svg+xml,%3csvg xmlns='http://www.w3.org/2000/svg' width='4' height='4' viewBox='0 0 4 4'%3e%3cpath stroke='%23fff' d='M0 2h4'/%3e%3c/svg%3e\")}.custom-checkbox .custom-control-input:disabled:checked~.custom-control-label::before{background-color:rgba(0,123,255,0.5)}.custom-checkbox .custom-control-input:disabled:indeterminate~.custom-control-label::before{background-color:rgba(0,123,255,0.5)}.tab-content>.tab-pane{display:none}.tab-content>.active{display:block}.navbar{position:relative;display:flex;flex-wrap:wrap;align-items:center;justify-content:space-between;padding:0.25rem 0.5rem}.navbar .container{display:flex;flex-wrap:wrap;align-items:center;justify-content:space-between}.clearfix::after{display:block;clear:both;content:\"\"}.fixed-top{position:fixed;top:0;right:0;left:0;z-index:1030}.mt-3{margin-top:1rem !important}.mb-3{margin-bottom:1rem !important}.text-nowrap{white-space:nowrap !important}.font-weight-normal{font-weight:400 !important}.gl-form-input,.gl-form-input.form-control{background-color:#fff;font-family:var(--default-regular-font, -apple-system),BlinkMacSystemFont,\"Segoe UI\",Roboto,\"Noto Sans\",Ubuntu,Cantarell,\"Helvetica Neue\",sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\",\"Segoe UI Symbol\",\"Noto Color Emoji\";font-size:0.875rem;line-height:1rem;padding-top:0.5rem;padding-bottom:0.5rem;padding-left:0.75rem;padding-right:0.75rem;height:auto;color:#333238;box-shadow:inset 0 0 0 1px #89888d;border-style:none;-webkit-appearance:none;appearance:none;-moz-appearance:none}.gl-form-input:disabled,.gl-form-input:not(.form-control-plaintext):not([type=\"color\"]):read-only,.gl-form-input.form-control:disabled,.gl-form-input.form-control:not(.form-control-plaintext):not([type=\"color\"]):read-only{background-color:#fbfafd;box-shadow:inset 0 0 0 1px #dcdcde}.gl-form-input:disabled,.gl-form-input.form-control:disabled{cursor:not-allowed;color:#737278}.gl-form-input::placeholder,.gl-form-input.form-control::placeholder{color:#89888d}.gl-form-checkbox{font-size:0.875rem;line-height:1rem;color:#333238}.gl-form-checkbox .custom-control-input:disabled,.gl-form-checkbox .custom-control-input:disabled~.custom-control-label{cursor:not-allowed;color:#89888d}.gl-form-checkbox.custom-control .custom-control-input~.custom-control-label{cursor:pointer}.gl-form-checkbox.custom-control .custom-control-input~.custom-control-label::before,.gl-form-checkbox.custom-control .custom-control-input~.custom-control-label::after{top:0}.gl-form-checkbox.custom-control .custom-control-input~.custom-control-label::before{background-color:#fff;border-color:#89888d}.gl-form-checkbox.custom-control .custom-control-input:checked~.custom-control-label::before{background-color:#1f75cb;border-color:#1f75cb}.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:checked~.custom-control-label::after,.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:indeterminate~.custom-control-label::after{background:none;background-color:#fff;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-position:center center;mask-position:center center}.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:checked~.custom-control-label::after{-webkit-mask-image:url('data:image/svg+xml,%3Csvg width=\"8\" height=\"7\" viewBox=\"0 0 8 7\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"%3E%3Cpath d=\"M1 3.05299L2.99123 5L7 1\" stroke=\"white\" stroke-width=\"2\"/%3E%3C/svg%3E%0A');mask-image:url('data:image/svg+xml,%3Csvg width=\"8\" height=\"7\" viewBox=\"0 0 8 7\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"%3E%3Cpath d=\"M1 3.05299L2.99123 5L7 1\" stroke=\"white\" stroke-width=\"2\"/%3E%3C/svg%3E%0A')}.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:indeterminate~.custom-control-label::after{-webkit-mask-image:url('data:image/svg+xml,%3Csvg width=\"8\" height=\"2\" viewBox=\"0 0 8 2\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"%3E%3Cpath d=\"M0 1L8 1\" stroke=\"white\" stroke-width=\"2\"/%3E%3C/svg%3E%0A');mask-image:url('data:image/svg+xml,%3Csvg width=\"8\" height=\"2\" viewBox=\"0 0 8 2\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"%3E%3Cpath d=\"M0 1L8 1\" stroke=\"white\" stroke-width=\"2\"/%3E%3C/svg%3E%0A')}.gl-form-checkbox.custom-control.custom-checkbox .custom-control-input:indeterminate~.custom-control-label::before{background-color:#1f75cb;border-color:#1f75cb}.gl-form-checkbox.custom-control .custom-control-input:disabled~.custom-control-label{cursor:not-allowed}.gl-form-checkbox.custom-control .custom-control-input:disabled~.custom-control-label::before{background-color:#ececef;border-color:#dcdcde;pointer-events:auto}.gl-form-checkbox.custom-control .custom-control-input:checked:disabled~.custom-control-label::before,.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:indeterminate:disabled~.custom-control-label::before{background-color:#dcdcde;border-color:#dcdcde}.gl-form-checkbox.custom-control .custom-control-input:checked:disabled~.custom-control-label::after,.gl-form-checkbox.custom-control .custom-control-input[type=\"checkbox\"]:indeterminate:disabled~.custom-control-label::after{background-color:#737278}.gl-button{display:inline-flex}.gl-button:not(.btn-link):active{text-decoration:none}.gl-button.gl-button,.gl-button.gl-button.btn-block{border-width:0;padding-top:0.5rem;padding-bottom:0.5rem;padding-left:0.75rem;padding-right:0.75rem;background-color:transparent;line-height:1rem;color:#333238;fill:currentColor;box-shadow:inset 0 0 0 1px #bfbfc3;justify-content:center;align-items:center;font-size:0.875rem;border-radius:0.25rem}.gl-button.gl-button .gl-button-text,.gl-button.gl-button.btn-block .gl-button-text{overflow:hidden;text-overflow:ellipsis;white-space:nowrap;padding-top:1px;padding-bottom:1px;margin-top:-1px;margin-bottom:-1px}.gl-button.gl-button .gl-button-icon,.gl-button.gl-button.btn-block .gl-button-icon{height:1rem;width:1rem;flex-shrink:0;margin-right:0.25rem;top:auto}.gl-button.gl-button.btn-default,.gl-button.gl-button.btn-block.btn-default{background-color:#fff}.gl-button.gl-button.btn-default:active,.gl-button.gl-button.btn-default.active,.gl-button.gl-button.btn-block.btn-default:active,.gl-button.gl-button.btn-block.btn-default.active{box-shadow:inset 0 0 0 1px #626168, 0 0 0 1px #fff, 0 0 0 3px #428fdc;outline:none;background-color:#dcdcde}.gl-button.gl-button.btn-confirm,.gl-button.gl-button.btn-block.btn-confirm{color:#fff}.gl-button.gl-button.btn-confirm,.gl-button.gl-button.btn-block.btn-confirm{background-color:#1f75cb;box-shadow:inset 0 0 0 1px #1068bf}.gl-button.gl-button.btn-confirm:active,.gl-button.gl-button.btn-confirm.active,.gl-button.gl-button.btn-block.btn-confirm:active,.gl-button.gl-button.btn-block.btn-confirm.active{box-shadow:inset 0 0 0 1px #033464, 0 0 0 1px #fff, 0 0 0 3px #428fdc;outline:none;background-color:#0b5cad}body{font-size:0.875rem}button,html [type=\"button\"],[type=\"submit\"],[role=\"button\"]{cursor:pointer}h1,h3{margin-top:20px;margin-bottom:10px}hr{overflow:hidden}svg{vertical-align:baseline}.form-control{font-size:0.875rem}.hidden{display:none !important;visibility:hidden !important}html{overflow-y:scroll}body.navless{background-color:#fff !important}.container{padding-top:0;z-index:5}.container .content{margin:0}@media (max-width: 575.98px){.container .content{margin-top:20px}}.navless-container{margin-top:var(--header-height, 48px);padding-top:32px}.btn{border-radius:4px;font-size:0.875rem;font-weight:400;padding:6px 10px;background-color:#fff;border-color:#dcdcde;color:#333238;color:#333238;white-space:nowrap}.btn:active{background-color:#ececef;box-shadow:none}.btn:active,.btn.active{background-color:#e6e6ea;border-color:#dedee3;color:#333238}.btn svg{height:15px;width:15px}.btn svg:not(:last-child){margin-right:5px}.btn-block{width:100%;margin:0}.btn-block.btn{padding:6px 0}.tab-content{overflow:visible}@media (max-width: 767.98px){.tab-content{isolation:isolate}}hr{margin:1.5rem 0;border-top:1px solid #ececef}.footer-links{margin-bottom:20px}.footer-links a{margin-right:15px}.flash-container{margin:0;margin-bottom:16px;font-size:14px;position:relative;z-index:1}.flash-container.sticky{position:sticky;top:48px;z-index:251}.flash-container.flash-container-page{margin-bottom:0}.flash-container:empty{margin:0}input{border-radius:0.25rem;color:#333238;background-color:#fff}label{font-weight:600}label.custom-control-label{font-weight:400}label.label-bold{font-weight:600}.form-control{border-radius:4px;padding:6px 10px}.form-control::placeholder{color:#89888d}.gl-show-field-errors .form-control:not(textarea){height:32px}.navbar-empty{justify-content:center;height:var(--header-height, 48px);background:#fff;border-bottom:1px solid #dcdcde}.navbar-empty .tanuki-logo,.navbar-empty .brand-header-logo{max-height:100%}.tanuki-logo .tanuki{fill:#e24329}.tanuki-logo .left-cheek,.tanuki-logo .right-cheek{fill:#fc6d26}.tanuki-logo .chin{fill:#fca326}input::-moz-placeholder{color:#89888d;opacity:1}input::-ms-input-placeholder{color:#89888d}input:-ms-input-placeholder{color:#89888d}svg{fill:currentColor}.login-page .container{max-width:960px}.login-page .navbar-gitlab .container{max-width:none}.login-page .flash-container{margin-bottom:16px;position:relative;top:8px}.login-page .brand-holder{font-size:18px;line-height:1.5}.login-page .brand-holder p{font-size:16px;color:#888}.login-page .brand-holder h3{font-size:22px}.login-page .brand-holder img{max-width:100%;margin-bottom:30px}.login-page .brand-holder a{font-weight:600}.login-page p{font-size:13px}.login-page .signin-text p{margin-bottom:0;line-height:1.5}.login-page .borderless .login-box,.login-page .borderless .omniauth-container{box-shadow:none}.login-page .borderless .g-recaptcha>div{margin-left:auto;margin-right:auto}.login-page .login-box,.login-page .omniauth-container{box-shadow:0 0 0 1px #dcdcde;border-radius:0.25rem}.login-page .login-box .login-heading h3,.login-page .omniauth-container .login-heading h3{font-weight:400;line-height:1.5;margin:0 0 10px}.login-page .login-box .login-footer,.login-page .omniauth-container .login-footer{margin-top:10px}.login-page .login-box .login-footer p:last-child,.login-page .omniauth-container .login-footer p:last-child{margin-bottom:0}.login-page .login-box a.forgot,.login-page .omniauth-container a.forgot{float:right;padding-top:6px}.login-page .login-box .nav .active a,.login-page .omniauth-container .nav .active a{background:transparent}.login-page .login-box .login-body,.login-page .omniauth-container .login-body{font-size:13px}.login-page .login-box .login-body input+p,.login-page .login-box .login-body input~p.field-validation,.login-page .omniauth-container .login-body input+p,.login-page .omniauth-container .login-body input~p.field-validation{margin-top:5px}.login-page .login-box .login-body .username .validation-success,.login-page .omniauth-container .login-body .username .validation-success{color:#217645}.login-page .login-box .login-body .username .validation-error,.login-page .omniauth-container .login-body .username .validation-error{color:#dd2b0e}.login-page .omniauth-container{border-radius:0.25rem;font-size:13px}.login-page .omniauth-container p{margin:0}.login-page .omniauth-container form{padding:0;border:0;background:none}.login-page .new-session-tabs{display:flex;box-shadow:0 0 0 1px #dcdcde;border-top-right-radius:4px;border-top-left-radius:4px}.login-page .new-session-tabs.nav-links-unboxed{border-color:transparent;box-shadow:none}.login-page .new-session-tabs.nav-links-unboxed .nav-item{border-left:0;border-right:0;border-bottom:1px solid #dcdcde;background-color:transparent}.login-page .new-session-tabs.custom-provider-tabs{flex-wrap:wrap}.login-page .new-session-tabs.custom-provider-tabs li{min-width:85px;flex-basis:auto}.login-page .new-session-tabs.custom-provider-tabs li:nth-child(n + 5){border-top:1px solid #dcdcde}.login-page .new-session-tabs.custom-provider-tabs a{font-size:16px}.login-page .new-session-tabs li{flex:1;text-align:center;border-left:1px solid #dcdcde}.login-page .new-session-tabs li:first-of-type{border-left:0;border-top-left-radius:4px}.login-page .new-session-tabs li:last-of-type{border-top-right-radius:4px}.login-page .new-session-tabs li:not(.active){background-color:#fbfafd}.login-page .new-session-tabs li a{width:100%;font-size:18px}.login-page .new-session-tabs li.active>a{cursor:default}.login-page .form-control:active,.login-page .form-control:focus{background-color:#fff}.login-page .submit-container{margin-top:16px}.login-page input[type=\"submit\"]{margin-bottom:0;display:block;width:100%}.login-page .devise-errors h2{margin-top:0;font-size:14px;color:#ae1800}@media (max-width: 575.98px){.login-page .col-md-5.float-right{float:none !important;margin-bottom:45px}}.devise-layout-html{margin:0;padding:0;height:100%}.devise-layout-html body{height:calc(100% - 51px);margin:0;padding:0}.devise-layout-html body.navless{height:calc(100% - 11px)}.devise-layout-html body .page-wrap{min-height:100%;position:relative}.devise-layout-html body .footer-container,.devise-layout-html body hr.footer-fixed{position:fixed;bottom:0;left:0;right:0;height:40px;background:#fff}.devise-layout-html body .login-page-broadcast{margin-top:40px}.devise-layout-html body .navless-container{padding:0 15px 65px}.devise-layout-html body .flash-container{padding-bottom:65px}@media (max-width: 575.98px){.devise-layout-html body .flash-container{padding-bottom:0}}.gl-display-flex{display:flex}.gl-display-inline-block{display:inline-block}.gl-flex-wrap{flex-wrap:wrap}.gl-justify-content-center{justify-content:center}.gl-justify-content-space-between{justify-content:space-between}.gl-float-right{float:right}.gl-w-10{width:3.5rem}.gl-w-half{width:50%}.gl-w-90p{width:90%}.gl-w-full{width:100%}@media (max-width: 575.98px){.gl-xs-w-full{width:100%}}.gl-p-5{padding:1rem}.gl-px-5{padding-left:1rem;padding-right:1rem}.gl-pt-5{padding-top:1rem}.gl-mt-3{margin-top:0.5rem}.gl-mt-5{margin-top:1rem}.gl-mr-auto{margin-right:auto}.gl-mr-2{margin-right:0.25rem}.gl-mb-1{margin-bottom:0.125rem}.gl-mb-2{margin-bottom:0.25rem}.gl-mb-3{margin-bottom:0.5rem}.gl-ml-auto{margin-left:auto}.gl-ml-2{margin-left:0.25rem}@media (min-width: 576px){.gl-sm-mt-0{margin-top:0}}.gl-text-center{text-align:center}.gl-font-size-h2{font-size:1.1875rem}.gl-font-weight-normal{font-weight:400}.gl-font-weight-bold{font-weight:600}.cloak-startup,.content-wrapper>.alert-wrapper,#content-body,.modal-dialog{display:none}@keyframes blinking-dot{0%{opacity:1}25%{opacity:0.4}75%{opacity:0.4}100%{opacity:1}}@keyframes gl-spinner-rotate{0%{transform:rotate(0)}100%{transform:rotate(360deg)}}.gl-flex-fill-1{flex:1}.gl-mt-3{margin-top:0.5rem}.gl-ml-3{margin-left:0.5rem}.gl-flex-grow-1{flex-grow:1}.gl-align-items-flex-start{align-items:flex-start}.phone-input .form-group,.verification-code-input .form-group{margin-bottom:0}.phone-input p,.verification-code-input p{margin-bottom:0}.verification-code.form-group .js-verification-btn{min-width:120px;flex:1}.phone-form{padding:16px}@media (min-width: 768px){.phone-form.inline{display:flex}.phone-form.inline .phone,.phone-form.inline .verification-code{flex:none;margin-right:0.75rem;width:360px}}.login-page .omniauth-container.restyle-login-page form,.login-page .omniauth-container.restyle-login-page .js-oauth-login{flex-basis:calc(50% - 0.25rem)}\n\n</style>\n\n\n<link rel=\"stylesheet\" media=\"print\" href=\"/assets/application-52a064762a7ad98c1683fb1168218a4855f4428affd0571430551906558c82c9.css\" />\n<link rel=\"stylesheet\" media=\"print\" href=\"/assets/page_bundles/signin-6a4f0bb6de997dbbba5b0c2f90c2a3dbc78654cabfff720c594b1823a8de0c34.css\" />\n<link rel=\"stylesheet\" media=\"print\" href=\"/assets/application_utilities-09ecae1be7ceb26fc30e17dd062258411a2e095ca1ed03470162376846422b2d.css\" />\n\n\n<link rel=\"stylesheet\" media=\"print\" href=\"/assets/fonts-3dcf267c9a9dc2c5b7a0ae5b757830104751a7ece87820521d6bb22dd665b2f8.css\" />\n<link rel=\"stylesheet\" media=\"print\" href=\"/assets/highlight/themes/white-685d923b3c75de8cdc526132926410f968d77f11c2980dbc3840da37b7ddf578.css\" />\n<script>\n//<![CDATA[\ndocument.querySelectorAll('link[media=\"print\"]').forEach(linkTag => {\n  linkTag.setAttribute('data-startupcss', 'loading');\n  const startupLinkLoadedEvent = new CustomEvent('CSSStartupLinkLoaded');\n  linkTag.addEventListener('load',function(){this.media='all';this.setAttribute('data-startupcss', 'loaded');document.dispatchEvent(startupLinkLoadedEvent);},{once: true});\n})\n\n//]]>\n</script>\n\n<script>\n//<![CDATA[\nwindow.gon={};gon.features={\"arkoseLabsLoginChallenge\":false};\n//]]>\n</script>\n<script src=\"/assets/locale/en/app-da504b804bb6e1a30251242b70070e573efecd0d3a53443cf30a8b77416d2775.js\" defer=\"defer\"></script>\n\n\n\n\n\n\n\n<script src=\"/assets/webpack/runtime.19f53938.bundle.js\" defer=\"defer\"></script>\n<script src=\"/assets/webpack/main.f9353e3f.chunk.js\" defer=\"defer\"></script>\n<script src=\"/assets/webpack/pages.sessions.new.ffe31d7e.chunk.js\" defer=\"defer\"></script>\n\n<meta content=\"object\" property=\"og:type\">\n<meta content=\"JiHu GitLab\" property=\"og:site_name\">\n<meta content=\"Sign in · JiHu GitLab\" property=\"og:title\">\n<meta content=\"JiHu GitLab\" property=\"og:description\">\n<meta content=\"https://182.61.148.219/assets/twitter_card-67324091d206ba0e63f4810d745f0b886bedcaa9fa620763cfb90bf3fc9c05f2.jpg\" property=\"og:image\">\n<meta content=\"64\" property=\"og:image:width\">\n<meta content=\"64\" property=\"og:image:height\">\n<meta content=\"https://182.61.148.219/users/sign_in\" property=\"og:url\">\n<meta content=\"summary\" property=\"twitter:card\">\n<meta content=\"Sign in · JiHu GitLab\" property=\"twitter:title\">\n<meta content=\"JiHu GitLab\" property=\"twitter:description\">\n<meta content=\"https://182.61.148.219/assets/twitter_card-67324091d206ba0e63f4810d745f0b886bedcaa9fa620763cfb90bf3fc9c05f2.jpg\" property=\"twitter:image\">\n\n<meta content=\"JiHu GitLab\" name=\"description\">\n<link href=\"/-/manifest.json\" rel=\"manifest\">\n<meta content=\"width=device-width, initial-scale=1, maximum-scale=1\" name=\"viewport\">\n<meta content=\"#292961\" name=\"theme-color\">\n<meta name=\"csrf-param\" content=\"authenticity_token\" />\n<meta name=\"csrf-token\" content=\"49Y8UTP7ImtF04cgGyoXkiYlEXpbue5T7wise0BJ9kZ3Jru1m_RLAM2qbO-kLNg0jgAZxRR1KaRLEZt9oirvlw\" />\n<meta name=\"csp-nonce\" />\n<meta name=\"action-cable-url\" content=\"/-/cable\" />\n<link rel=\"apple-touch-icon\" type=\"image/x-icon\" href=\"/assets/apple-touch-icon-b049d4bc0dd9626f31db825d61880737befc7835982586d015bded10b4435460.png\" />\n<link href=\"/search/opensearch.xml\" rel=\"search\" title=\"Search GitLab\" type=\"application/opensearchdescription+xml\">\n\n\n\n\n<!-- Tencent RUM -->\n<!-- End Tencent Code -->\n\n</head>\n\n<body class=\"login-page application navless ui-indigo gl-browser-generic gl-platform-other\" data-page=\"sessions:new\" data-qa-selector=\"login_page\">\n<div class=\"jh-language-switcher position-fixed gl-display-flex gl-align-items-center gl-w-full gl-flex-direction-row-reverse pr-3\" style=\"top: 0; left: 0; height: 40px; z-index: 252;\">\n<div class=\"js-language-switcher\" data-locales=\"[{&quot;value&quot;:&quot;en&quot;,&quot;percentage&quot;:100,&quot;text&quot;:&quot;English&quot;},{&quot;value&quot;:&quot;fr&quot;,&quot;percentage&quot;:99,&quot;text&quot;:&quot;français&quot;},{&quot;value&quot;:&quot;zh_TW&quot;,&quot;percentage&quot;:98,&quot;text&quot;:&quot;繁體中文 (台灣)&quot;},{&quot;value&quot;:&quot;zh_CN&quot;,&quot;percentage&quot;:96,&quot;text&quot;:&quot;简体中文&quot;}]\"></div>\n\n</div>\n\n<script>\n//<![CDATA[\ngl = window.gl || {};\ngl.client = {\"isGeneric\":true,\"isOther\":true};\n\n\n//]]>\n</script>\n<div class=\"page-wrap borderless\">\n<div class=\"login-page-broadcast\">\n\n\n</div>\n<div class=\"container navless-container\">\n<div class=\"content\">\n<div class=\"flash-container flash-container-page sticky\" data-qa-selector=\"flash_container\">\n</div>\n\n<div class=\"mt-3\">\n<div class=\"col-sm-12 gl-text-center\">\n<img alt=\"JiHu GitLab\" class=\"gl-w-10 lazy\" data-src=\"/assets/logo-cb4bd87a021ad08fa0b5a04a6ea54d42771a1c6bc5fd67cbd2fef454accc8e25.svg\" src=\"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" />\n<h1 class=\"mb-3 gl-font-size-h2\">\nJiHu GitLab\n</h1>\n\n</div>\n</div>\n<div class=\"mb-3\">\n<div class=\"gl-w-half gl-xs-w-full gl-ml-auto gl-mr-auto bar\">\n\n<div id=\"signin-container\">\n<div class=\"tab-content\">\n<div class=\"login-box tab-pane active\" id=\"login-pane\" role=\"tabpanel\">\n<div class=\"login-body\">\n<form class=\"new_user gl-show-field-errors js-arkose-labs-form\" id=\"new_user\" aria-live=\"assertive\" data-testid=\"sign-in-form\" action=\"/users/sign_in\" accept-charset=\"UTF-8\" method=\"post\"><input type=\"hidden\" name=\"authenticity_token\" value=\"Gv4jgrYJQiS-h2AsxEdlc7ZHjKWgp8N_Jz2gvFpqMVGODqRmHgYrTzb-i-N7QarVHmKEGu9rBIiDJJe6uAkogA\" autocomplete=\"off\" /><div class=\"form-group gl-px-5 gl-pt-5\">\n<label for=\"user_login\" class=\"label-bold gl-mb-1\">Username or email</label>\n\n\n<input class=\"form-control gl-form-input top js-username-field\" autofocus=\"autofocus\" autocapitalize=\"off\" autocorrect=\"off\" required=\"required\" title=\"This field is required.\" data-qa-selector=\"login_field\" data-testid=\"username-field\" type=\"text\" name=\"user[login]\" id=\"user_login\" />\n</div>\n<div class=\"form-group gl-px-5\">\n<label class=\"label-bold gl-mb-1\" for=\"user_password\">Password</label>\n<input class=\"form-control gl-form-input bottom\" autocomplete=\"current-password\" required=\"required\" title=\"This field is required.\" data-qa-selector=\"password_field\" data-testid=\"password-field\" type=\"password\" name=\"user[password]\" id=\"user_password\" />\n</div>\n<div class=\"gl-px-5\">\n<div class=\"gl-display-inline-block\">\n<div class=\"gl-form-checkbox custom-control custom-checkbox\">\n<input name=\"user[remember_me]\" type=\"hidden\" value=\"0\" autocomplete=\"off\" /><input class=\"custom-control-input\" type=\"checkbox\" value=\"1\" name=\"user[remember_me]\" id=\"user_remember_me\" />\n<label class=\"custom-control-label\" for=\"user_remember_me\"><span>Remember me</span></label>\n</div>\n\n</div>\n<div class=\"gl-float-right\">\n<a href=\"/users/password/new\">Forgot your password?</a>\n</div>\n</div>\n<div></div>\n<div class=\"submit-container move-submit-down gl-px-5\">\n<button name=\"button\" type=\"submit\" class=\"gl-button btn btn-block btn-confirm js-sign-in-button\" data-qa-selector=\"sign_in_button\" data-testid=\"sign-in-button\">Sign in</button>\n</div>\n</form>\n</div>\n</div>\n\n</div>\n<p class=\"gl-px-5\">\nBy signing in you accept the <a href='/-/users/terms' target='_blank' rel='noreferrer noopener'>Terms of Use and acknowledge the Privacy Policy and Cookie Policy</a>.\n</p>\n</div>\n\n</div>\n</div>\n</div>\n</div>\n<hr class=\"footer-fixed\">\n<div class=\"container footer-container gl-lg-display-flex gl-align-items-center gl-justify-content-space-between\">\n<div class=\"footer-links gl-display-flex\">\n<a href=\"/explore\">Explore</a>\n<a href=\"/help\">Help</a>\n<a href=\"https://about.gitlab.cn\">About JiHu GitLab</a>\n</div>\n</div>\n\n\n</div>\n</body>\n</html>\n",
          "body_murmur": 1308004865,
          "body_sha256": "53dcaa13e7995e3f40227f8031c15973b8a6c1ca079bbb81c13abee536715111",
          "component": [
            "Nginx",
            "Ruby on Rails",
            "Ruby"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "66f9a1c3f2cfd0df1b570990e86d3095",
            "murmur_hash": 1265477436,
            "path": "https://182.61.148.219:443/assets/favicon-72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef.png",
            "size": 591
          },
          "headers": {
            "cache_control": [
              "max-age=0, private, must-revalidate"
            ],
            "connection": [
              "keep-alive"
            ],
            "content_security_policy": [
              ""
            ],
            "content_type": [
              "text/html; charset=utf-8"
            ],
            "date": [
              "Thu, 05 Feb 2026 12:47:24 GMT"
            ],
            "etag": [
              "W/\"53dcaa13e7995e3f40227f8031c15973\""
            ],
            "link": [
              "</assets/application_utilities-09ecae1be7ceb26fc30e17dd062258411a2e095ca1ed03470162376846422b2d.css>; rel=preload; as=style; type=text/css,</assets/application-52a064762a7ad98c1683fb1168218a4855f4428affd0571430551906558c82c9.css>; rel=preload; as=style; type=text/css,</assets/highlight/themes/white-685d923b3c75de8cdc526132926410f968d77f11c2980dbc3840da37b7ddf578.css>; rel=preload; as=style; type=text/css"
            ],
            "server": [
              "nginx"
            ],
            "set_cookie": [
              "preferred_language=en; path=/; Secure; SameSite=None",
              "_gitlab_session=afee1027bf7b58adfec6f12a9c754b8c; path=/; expires=Thu, 05 Feb 2026 14:47:24 GMT; secure; HttpOnly; SameSite=None"
            ],
            "unknown": [
              {
                "key": "referrer_policy",
                "value": [
                  "strict-origin-when-cross-origin"
                ]
              },
              {
                "key": "x_download_options",
                "value": [
                  "noopen"
                ]
              },
              {
                "key": "x_request_id",
                "value": [
                  "01KGPXFM8GQHJ0QQHFTZ196MAZ"
                ]
              },
              {
                "key": "permissions_policy",
                "value": [
                  "interest-cohort=()"
                ]
              },
              {
                "key": "x_permitted_cross_domain_policies",
                "value": [
                  "none"
                ]
              },
              {
                "key": "x_runtime",
                "value": [
                  "0.063791"
                ]
              }
            ],
            "vary": [
              "Accept-Encoding",
              "Accept"
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "SAMEORIGIN"
            ],
            "x_ua_compatible": [
              "IE=edge"
            ],
            "x_xss_protection": [
              "1; mode=block"
            ]
          },
          "protocol": "HTTP/1.1",
          "redirects": [
            {
              "body": "<html><body>You are being <a href=\"https://182.61.148.219/users/sign_in\">redirected</a>.</body></html>",
              "body_murmur": 2044319527,
              "body_sha256": "517150ba046bfcfbc1e120029d102f91a722ec2139c17aa7f2dcc1753510df7f",
              "content_length": 102,
              "headers": {
                "cache_control": [
                  "no-cache"
                ],
                "connection": [
                  "keep-alive"
                ],
                "content_length": [
                  "102"
                ],
                "content_security_policy": [
                  ""
                ],
                "content_type": [
                  "text/html; charset=utf-8"
                ],
                "date": [
                  "Thu, 05 Feb 2026 12:47:24 GMT"
                ],
                "location": [
                  "https://182.61.148.219/users/sign_in"
                ],
                "server": [
                  "nginx"
                ],
                "unknown": [
                  {
                    "key": "permissions_policy",
                    "value": [
                      "interest-cohort=()"
                    ]
                  },
                  {
                    "key": "referrer_policy",
                    "value": [
                      "strict-origin-when-cross-origin"
                    ]
                  },
                  {
                    "key": "x_download_options",
                    "value": [
                      "noopen"
                    ]
                  },
                  {
                    "key": "x_permitted_cross_domain_policies",
                    "value": [
                      "none"
                    ]
                  },
                  {
                    "key": "x_request_id",
                    "value": [
                      "01KGPXFKY3CJB6M2PJWTEJPW4K"
                    ]
                  },
                  {
                    "key": "x_runtime",
                    "value": [
                      "0.044750"
                    ]
                  }
                ],
                "x_content_type_options": [
                  "nosniff"
                ],
                "x_frame_options": [
                  "SAMEORIGIN"
                ],
                "x_ua_compatible": [
                  "IE=edge"
                ],
                "x_xss_protection": [
                  "1; mode=block"
                ]
              },
              "location": "https://182.61.148.219/users/sign_in",
              "protocol": "HTTP/1.1",
              "status_code": 302,
              "status_line": "302 Found"
            }
          ],
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "referer": [
                "https://182.61.148.219"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.61.148.219",
              "path": "/users/sign_in",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "Sign in · JiHu GitLab",
          "transfer_encoding": [
            "chunked"
          ]
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://i.pki.goog/wr1.crt"
                ],
                "ocsp_urls": [
                  "http://o.pki.goog/s/wr1/HQY"
                ]
              },
              "authority_key_id": "666949d4de2a9c9103cf890e24b80e30036e882e",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "crl_distribution_points": [
                "http://c.pki.goog/wr1/oR7YbPzYLLw.crl"
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:\n                1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF\n    Timestamp : Feb 17 02:41:00.532 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:C2:D0:FD:11:F3:74:8B:D1:0E:B0:7A:\n                A5:E8:77:F8:BE:D4:C7:14:2C:F4:9E:58:20:83:EC:FB:\n                94:A9:67:93:3E:02:21:00:D2:92:DB:22:E8:32:17:7E:\n                6B:8F:8C:8B:0B:8A:F1:BF:C8:97:5A:54:0B:A8:08:22:\n                27:C2:4D:F4:B8:DD:07:60\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : DE:85:81:D7:50:24:7C:6B:CD:CB:AF:56:37:C5:E7:81:\n                C6:4C:E4:6E:D6:17:63:9F:8F:34:A7:26:C9:E2:BD:37\n    Timestamp : Feb 17 02:41:00.549 2025 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:E7:A9:58:25:AC:6A:A0:41:EC:F3:64:\n                44:1F:22:26:BA:8B:D8:52:CE:6B:2F:07:5C:FF:54:99:\n                E7:76:F6:6D:DB:02:21:00:8F:B6:66:B7:AC:5D:EF:25:\n                36:82:38:53:BF:21:48:E8:6E:A4:15:6D:43:AA:3B:06:\n                C5:A1:BE:CA:FB:6A:32:ED",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": false
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.bang-tai.top",
                  "bang-tai.top"
                ]
              },
              "subject_key_id": "fcf534052278c434a83f4a90f21eb4e628bd008f"
            },
            "fingerprint_md5": "BED5FB2AC4C5A5FBE2F622A91653B310",
            "fingerprint_sha1": "183F03A76B188BFDD549E8A9CEA9EBC15DB6863E",
            "fingerprint_sha256": "5E5BD291F1065DA5FB012AC5F4864E61176EEF9CBC8A18BEBF8264CE84B6B284",
            "issuer": {
              "common_name": [
                "WR1"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "Google Trust Services"
              ]
            },
            "issuer_dn": "/C=US/O=Google Trust Services/CN=WR1",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "38583919633106425669548473850722311158",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "4e75a3275c9a10c3385b6cd4df3f52eb1df0e08e1b8d69c0b1fa64b1629a39df",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c2d0fd11f3748bd10eb07aa5e877f8bed4c7142cf49e582083ecfb94a967933e022100d292db22e832177e6b8f8c8b0b8af1bfc8975a540ba8082227c24df4b8dd0760"
                },
                "timestamp": "2025-02-17T02:41:00.532000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "de8581d750247c6bcdcbaf5637c5e781c64ce46ed617639f8f34a726c9e2bd37",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100e7a95825ac6aa041ecf364441f2226ba8bd852ce6b2f075cff5499e776f66ddb0221008fb666b7ac5def2536823853bf2148e86ea4156d43aa3b06c5a1becafb6a32ed"
                },
                "timestamp": "2025-02-17T02:41:00.549000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.bang-tai.top"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.bang-tai.top",
                "bang-tai.top"
              ],
              "extended_dns_names": [
                {
                  "domain": "bang-tai",
                  "fld": "bang-tai.top",
                  "subdomain": "*",
                  "tld": "top"
                },
                {
                  "domain": "bang-tai",
                  "fld": "bang-tai.top",
                  "tld": "top"
                }
              ]
            },
            "subject_dn": "/CN=*.bang-tai.top",
            "subject_key_info": {
              "_key": "ecdsa",
              "dh": [],
              "dsa": [],
              "ecdsa": {
                "b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
                "curve": "p256",
                "gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
                "gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
                "length": 256,
                "p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
                "x": "26399838381639133377684488675092511674455993634101811484467508510803697797318",
                "y": "19405446240208678390273534544950784975907689764003756715269945973781683811377"
              },
              "fingerprint_sha256": "982a397944a550166f5175e6980800b07e8341de25942a0e8428d5935688f7cd",
              "key_algorithm": "Elliptic_curve_cryptography",
              "rsa": []
            },
            "tbs_fingerprint": "383cad7e830d1eb930f77605d8ae528c0d51a8b6260bad3b438d650fe1574ea7",
            "tbs_noct_fingerprint": "0df9ac3302ce28c57d7be0c3d03cfade1f6b54d99a044cba20073fce1f6efd59",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7775999,
              "not_after": "2025-05-18T01:40:58",
              "not_before": "2025-02-17T01:40:59"
            },
            "version": 2
          },
          "fingerprint_sha256": "5E5BD291F1065DA5FB012AC5F4864E61176EEF9CBC8A18BEBF8264CE84B6B284",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://182.61.148.219/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-06T02:31:02.811Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.7.38-log",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.7.38-log",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.7\\.38\\-log",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_SSL": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.7.38-log"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              }
            },
            "fingerprint_md5": "0AA7ACE968C72269C89CF71D76DA0317",
            "fingerprint_sha1": "D3B93FF846C81D3AD9220D4D496B7D85969E0587",
            "fingerprint_sha256": "94E9B408254BB6B6033F2EAF94C66D81D8606183ADFB48DDC5737B9F43760A45",
            "issuer": {
              "common_name": [
                "MySQL_Server_5.7.38_Auto_Generated_CA_Certificate"
              ]
            },
            "issuer_dn": "/CN=MySQL_Server_5.7.38_Auto_Generated_CA_Certificate",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "NDg5NzJkNzI2NWRjZDI3OTlkYzAxNGM0ODcwM2MyYTMyODVhNmM0NzMyNzkwYWVjZmE5Yzg5MmI0Y2FiNDU0MmIxYzViOWRjZjdkNDExYjMzY2RmMWZhZjA2ODM4OWEwYWUyOWJlOWViNDM3MTkzNWU3ZDZiMmM0MjkzMWVjODI5MDE1MmYyM2FhODBiYWM3OGNlYzFkMDE5YmE0MzE2MzIwYzcwMjFiYjI1ZmM5ZTc4MGE5OTEzMGMxMzI5YWI3ZTBmYTdkMmJmYTNhY2EyNDhjZGEyOThhMWZmMjc2MTViOWRiYjRmYTNiMGFhYmQzZWE1NmNmZTM3ZjU0OWQ2NTcxNGE4OTYzNDRkNmUyOGY5MTIwZDFiNDExMWZlOGViODUwMTA2MzZiM2QyMDFjYzIzODQ5YmQxZmU2NTk1ZjFlMGIyZGQwOTA1NTUxMDE0MWJjMjlmOTA2MTQ5ODNiYzJiMWJiZDEwN2IxZDVmNjdkZTk4Y2FkMzMxMjhjNTdhNzU4MWZmMmZjZDJiNTUwNDgwOGFlMTU3Nzk1MWU2NDBjMzMwZGMyYWQ5YTFlYTExOTYzMzI3Y2Q2Njk0ZjY3MWYwNTkxOWVmMmJjOGY2ZGI0ZTE1NDExMzg4YWNiODE1YTQxNzgzODdjYjQyZWU0MjdkNzQ1YjI5NDQ1ZTYxMmM="
            },
            "subject": {
              "common_name": [
                "MySQL_Server_5.7.38_Auto_Generated_Server_Certificate"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "MySQL_Server_5.7.38_Auto_Generated_Server_Certificate"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=MySQL_Server_5.7.38_Auto_Generated_Server_Certificate",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fd43ac77d76ef4c5ebea2ca96d849273984e5749a5d3287535e6c859cdf93a31",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "MHhmZDgzOWU3YjZmZDU0M2Y3MWM5NmY3NDVhNjI4Zjc0MjlkNzVhYzJmMGY2ODE4ZjM4NTk5MzJjMGVlNzM5MDM0ZmYwN2Q4ZDQyN2ZhOWZhNzc5ODAyMzQyZGQ2ZGU1YWIxM2UxMTg0NDBlODY0ODM2NWQzN2UzYzkxZDAzZTJmZTgwY2IwNzI2ZTVlYTYxMTgyZWFmNDhhMWQ0Y2E1YTAzMTA0NmEzNjQ1OTZiMTgyOTMwYzYxOTVhOGYwYmEwZDM2ODVjZWE2N2EzZmVjNDY3MmQ3YjY5YTljMmFjZDIzNzBlMGM2OWU4MGNiYWUwMjNmYTgyN2E0MTRmYjlkMzcyZGM1ZDE3OWI5N2Q1MzBkMzNkYzQxMGFiMDQ0NjUxZDM1MmQ0M2Q2N2RmYmI0NTk3MDljNDNkZTBiOWExNTViOTEwM2JlMjc2ZTY1ZTAwNmE0MjQzODAwNDM1MzYzYjUzZTk0YjhiNDY2ZjhjYWQyNzNiNWUwNTRlOWVkZTMwODVjZjEwZmJmZmRiYzZmNDRmOTY5YzBlZjAxOTU4NTgwMmFlYmE3YjdiZWM2ZDQxZjkyOTFjZDFjOWY2MmZiYmI5ZGRjMTA5OWY5MWFlZmIxMTA5MDY5Y2ZhNzdmN2M1ZjUwOGJkMDg2YWEwN2ZkZTA5MTY1M2E2YmNlY2M1NDU5Nw=="
              }
            },
            "tbs_fingerprint": "9343130d669b0721c274e7a9ba9c015d2fadc296a8ba5cfc6bac661f49c7f271",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2033-03-12T16:40:34",
              "not_before": "2023-03-15T16:40:34"
            },
            "version": 2
          },
          "fingerprint_sha256": "94E9B408254BB6B6033F2EAF94C66D81D8606183ADFB48DDC5737B9F43760A45",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-06T14:55:50.125Z"
    }
  ],
  "services_hash": "52b4465378c053302315b280a912d66ea6604aa8ff8e39b1ab93a8d59991f7f0",
  "last_updated_at": "2026-02-06T14:55:50.125Z",
  "banner": [
    "mysql",
    "tls",
    "ssh",
    "http"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-0431": {
      "id": "CVE-1999-0431",
      "references": [
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
      ],
      "score": 5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-0656": {
      "id": "CVE-1999-0656",
      "references": [
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
        "http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
      ],
      "score": 5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-16"
    },
    "CVE-1999-1285": {
      "id": "CVE-1999-1285",
      "references": [
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
        "http://marc.info/?l=bugtraq&m=91495921611500&w=2",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
      ],
      "score": 2.1,
      "services": [
        "22/ssh"
      ],
      "severity": "low",
      "summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-1999-1442": {
      "id": "CVE-1999-1442",
      "references": [
        "http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
        "http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
        "http://www.securityfocus.com/bid/105"
      ],
      "score": 7.2,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2007-2768": {
      "id": "CVE-2007-2768",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/",
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/"
      ],
      "score": 4.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2008-3844": {
      "id": "CVE-2008-3844",
      "references": [
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
      ],
      "score": 9.3,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.  NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points.  As of 20080827, no unofficial distributions of this software are known.",
      "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2016-20012": {
      "id": "CVE-2016-20012",
      "references": [
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1",
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-14145": {
      "id": "CVE-2020-14145",
      "references": [
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-203"
    },
    "CVE-2020-15778": {
      "id": "CVE-2020-15778",
      "references": [
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html",
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html"
      ],
      "score": 7.4,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
      "vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2021-28041": {
      "id": "CVE-2021-28041",
      "references": [
        "https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQWGII3LQR4AOTPPFXGMTYE7UDEWIUKI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXST2CML2MWY3PNVUXX7FFJE3ATJMNVZ/",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20210416-0002/",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.5",
        "https://www.openwall.com/lists/oss-security/2021/03/03/1",
        "https://www.oracle.com//security-alerts/cpujul2021.html"
      ],
      "score": 7.1,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-415"
    },
    "CVE-2021-36368": {
      "id": "CVE-2021-36368",
      "references": [
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html",
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html"
      ],
      "score": 3.7,
      "services": [
        "22/ssh"
      ],
      "severity": "low",
      "summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-287"
    },
    "CVE-2021-41617": {
      "id": "CVE-2021-41617",
      "references": [
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174",
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2022-3424": {
      "id": "CVE-2022-3424",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
        "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
        "https://security.netapp.com/advisory/ntap-20230406-0005/",
        "https://www.spinics.net/lists/kernel/msg4518970.html"
      ],
      "score": 7.8,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-3707": {
      "id": "CVE-2022-3707",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
        "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
      ],
      "score": 5.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-460"
    },
    "CVE-2023-0030": {
      "id": "CVE-2023-0030",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
        "https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
        "https://security.netapp.com/advisory/ntap-20230413-0010/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
      ],
      "score": 7.8,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2023-1390": {
      "id": "CVE-2023-1390",
      "references": [
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/",
        "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
        "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
        "https://infosec.exchange/%40_mattata/109427999461122360",
        "https://security.netapp.com/advisory/ntap-20230420-0001/"
      ],
      "score": 7.5,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-1050"
    },
    "CVE-2023-28466": {
      "id": "CVE-2023-28466",
      "references": [
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/",
        "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
        "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
        "https://security.netapp.com/advisory/ntap-20230427-0006/"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2023-38408": {
      "id": "CVE-2023-38408",
      "references": [
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
      ],
      "score": 9.8,
      "services": [
        "22/ssh"
      ],
      "severity": "critical",
      "summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-428"
    },
    "CVE-2023-48795": {
      "id": "CVE-2023-48795",
      "references": [
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html",
        "https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-354"
    },
    "CVE-2023-51384": {
      "id": "CVE-2023-51384",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 5.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-51385": {
      "id": "CVE-2023-51385",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "http://www.openwall.com/lists/oss-security/2025/10/07/1",
        "http://www.openwall.com/lists/oss-security/2025/10/12/1",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 6.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
      "weakness": "CWE-78"
    },
    "CVE-2023-51767": {
      "id": "CVE-2023-51767",
      "references": [
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767",
        "https://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/2",
        "http://www.openwall.com/lists/oss-security/2025/09/23/1",
        "http://www.openwall.com/lists/oss-security/2025/09/23/3",
        "http://www.openwall.com/lists/oss-security/2025/09/23/4",
        "http://www.openwall.com/lists/oss-security/2025/09/23/5",
        "http://www.openwall.com/lists/oss-security/2025/09/24/4",
        "http://www.openwall.com/lists/oss-security/2025/09/24/7",
        "http://www.openwall.com/lists/oss-security/2025/09/25/2",
        "http://www.openwall.com/lists/oss-security/2025/09/25/6",
        "http://www.openwall.com/lists/oss-security/2025/09/26/2",
        "http://www.openwall.com/lists/oss-security/2025/09/26/4",
        "http://www.openwall.com/lists/oss-security/2025/09/27/1",
        "http://www.openwall.com/lists/oss-security/2025/09/27/2",
        "http://www.openwall.com/lists/oss-security/2025/09/27/3",
        "http://www.openwall.com/lists/oss-security/2025/09/27/4",
        "http://www.openwall.com/lists/oss-security/2025/09/27/5",
        "http://www.openwall.com/lists/oss-security/2025/09/27/6",
        "http://www.openwall.com/lists/oss-security/2025/09/27/7",
        "http://www.openwall.com/lists/oss-security/2025/09/28/7",
        "http://www.openwall.com/lists/oss-security/2025/09/29/1",
        "http://www.openwall.com/lists/oss-security/2025/09/29/4",
        "http://www.openwall.com/lists/oss-security/2025/09/29/5",
        "http://www.openwall.com/lists/oss-security/2025/09/29/6",
        "http://www.openwall.com/lists/oss-security/2025/10/01/1",
        "http://www.openwall.com/lists/oss-security/2025/10/01/2",
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    }
  }
}