182.75.160.212
{
"scan_id": 1770475284,
"ip": "182.75.160.212",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.75.160.0/21",
"postal_code": "110002",
"coordinates": {
"latitude": "28.6327",
"longitude": "77.2198"
},
"geo_point": "28.6327, 77.2198",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "New Delhi"
},
"location_updated_at": "2026-02-08T16:44:38Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.75.160.0/22",
"organization": "Bharti Airtel Limited",
"descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:57Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-02-08T16:44:38Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-02-08T18:47:47Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-02-08T16:44:38Z"
}
],
"hostnames": [
{
"name": "nsg-static-212.160.75.182-airtel.com",
"last_updated_at": "2026-02-08T18:47:47Z"
}
],
"services": [
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smtp": {
"banner": "220 Sophos ESMTP ready\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "keyid17a245089874a186422a5d687839f045338acf1b\ndirname/c=in/st=maharashatra/l=pune/o=ait global india/ou=it/cn=gmail.com/[email protected]\nserial96555430d96380d7",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "17a245089874a186422a5d687839f045338acf1b"
},
"fingerprint_md5": "5D0965C72860ED581EFFD5A625DEEF4A",
"fingerprint_sha1": "4BE2E4E313FB778E0E0C957AD77288D09C7C312E",
"fingerprint_sha256": "E8CAFF2AC4B3D3E5193DEA00734F0A4D73416EE230A93F740171B2C174DEDE8B",
"issuer": {
"common_name": [
"gmail.com"
],
"country": [
"IN"
],
"email_address": [
"[email protected]"
],
"locality": [
"Pune"
],
"organization": [
"AIT Global India"
],
"organizational_unit": [
"IT"
],
"province": [
"Maharashatra"
]
},
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "10832657047491936471",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true
},
"subject": {
"common_name": [
"gmail.com"
],
"country": [
"IN"
],
"email_address": [
"[email protected]"
],
"locality": [
"Pune"
],
"organization": [
"AIT Global India"
],
"organizational_unit": [
"IT"
],
"province": [
"Maharashatra"
]
},
"subject_alt_name": {
"dns_names": [
"gmail.com"
],
"extended_dns_names": [
{
"domain": "gmail",
"fld": "gmail.com",
"tld": "com"
}
]
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "7efa9d0287ff9c1a61110a9f616ab2d16599a781736225f589b70a79cca1b8f5",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "60bf91d67ca4f986a5276d7da126f2773b4a00e2506207e68507f134466d5b36",
"validation_level": "OV",
"validity": {
"length_seconds": 613094400,
"not_after": "2036-12-31T15:54:51",
"not_before": "2017-07-28T15:54:51"
},
"version": 2
},
"fingerprint_sha256": "E8CAFF2AC4B3D3E5193DEA00734F0A4D73416EE230A93F740171B2C174DEDE8B",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T16:44:00.663Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.18.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.18\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -1758226450,
"body_sha256": "340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87",
"component": [
"Nginx:1.18.0",
"Ubuntu"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 09 Feb 2026 16:48:49 GMT"
],
"server": [
"nginx/1.18.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"status_code": 404,
"title": "404 Not Found",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"severity": "low"
}
],
"url": "http://182.75.160.212/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T16:48:49.912Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.18.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.18.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.18\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -102029642,
"body_sha256": "1c3742cbd82cc7bebbf086740a7ffd2f59b76e90e85e4d29a96db78104d0fc36",
"component": [
"Ubuntu",
"Nginx:1.18.0",
"React"
],
"content_length": -1,
"favicon": {
"md5_hash": "c92b85a5b907c70211f4ec25e29a8c4a",
"murmur_hash": -2009722838,
"path": "https://182.75.160.212:443/favicon.ico",
"size": 3870
},
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 09 Feb 2026 08:45:09 GMT"
],
"etag": [
"W/\"6915944b-287\""
],
"last_modified": [
"Thu, 13 Nov 2025 08:18:19 GMT"
],
"server": [
"nginx/1.18.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"status_code": 200,
"title": "Invoicify.AI",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://e7.i.lencr.org/"
]
},
"authority_key_id": "ae489edc871d44a06fdaa2e560740478c29c0080",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://e7.c.lencr.org/23.crl"
],
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
},
"subject_alt_name": {
"dns_names": [
"demo.invoicify.ai.aitglobalindia.com"
]
},
"subject_key_id": "50a64b0062099ee8396170f08924fd9bdaec5437"
},
"fingerprint_md5": "F3EA267C400E920F13CB1502D3BF5014",
"fingerprint_sha1": "9C72632AF6DC1E5892ACE580B9480E4713C512C8",
"fingerprint_sha256": "AFC07D01A1E4DD31035325D200008981FA7638F1B6677C1F1DC726B264F64B76",
"issuer": {
"common_name": [
"E7"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"jarm": "27d40d40d00040d00042d43d0000004ac24e77d76646867f0f6a0c6d9b9bb0",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2026-02-18T08:33:11",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "496493983142065094592909951863192905043094",
"signature": {
"algorithm": {
"name": "ecdsa-with-SHA384",
"oid": "1.2.840.10045.4.3.3"
},
"self_signed": false
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "499c9b69de1d7cecfc36decd8764a6b85baf0a878019d15552fbe9eb29ddf8c3",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022078fd8992db0a460430b1074b8e7443f50c98e9724359df719d05a045b8149191022100c8bd31a6d67fe2ee94de2d07e831dbb24d5a274491cf57b0a2d4e68c0e150e63"
},
"timestamp": "2025-12-15T11:18:10.332000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100c049dfb910f16eda3488596db6d053f5765607f871b2cac306ce155aa5e62c75022100f070f64a3fdc2f0baa3c3a8a7efe608dadb639e0d935c78fc2a5a4ea54d50b6d"
},
"timestamp": "2025-12-15T11:18:10.334000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"demo.invoicify.ai.aitglobalindia.com"
]
},
"subject_alt_name": {
"dns_names": [
"demo.invoicify.ai.aitglobalindia.com"
],
"extended_dns_names": [
{
"domain": "aitglobalindia",
"fld": "aitglobalindia.com",
"subdomain": "demo.invoicify.ai",
"tld": "com"
}
]
},
"subject_key_info": {
"_key": "ecdsa",
"dh": [],
"dsa": [],
"ecdsa": {
"b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
"curve": "p256",
"gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
"gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
"length": 256,
"p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
"x": "28138330959229364972987533668230770754086580707535318780518545628017368233294",
"y": "30681762585780716457443130950975551105619229013424002798487373529227141104926"
},
"fingerprint_sha256": "b722387ef903e06c1af93284dded40e33b5d577d30e7bcac77b254f7b40b2c9f",
"key_algorithm": "Elliptic_curve_cryptography",
"rsa": []
},
"tbs_fingerprint": "7823823845d1032d305b8b70f7c60af8464d6cb59a12d69ff8f0fd12732f3873",
"tbs_noct_fingerprint": "93ea3275aaaf6b1d10c35c1925af96272474e421442c16febd4887b3f1972671",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2026-03-15T10:19:39",
"not_before": "2025-12-15T10:19:40"
},
"version": 2
},
"fingerprint_sha256": "AFC07D01A1E4DD31035325D200008981FA7638F1B6677C1F1DC726B264F64B76",
"precert": false,
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"severity": "low"
}
],
"url": "https://182.75.160.212/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-09T08:49:46.11Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Uvicorn",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:encode:uvicorn",
"part": "a",
"vendor": "encode",
"product": "uvicorn",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": -588268024,
"body_sha256": "02f7cd7e49bd0031093e745ceecf822d92e16a5abf40b37943aa8db983cb555a",
"component": [
"Uvicorn",
"Python"
],
"content_length": 29,
"headers": {
"content_length": [
"29"
],
"content_type": [
"application/json"
],
"date": [
"Tue, 20 Jan 2026 20:56:44 GMT"
],
"server": [
"uvicorn"
]
},
"protocol": "HTTP/1.1",
"status_code": 200
}
},
"url": "http://182.75.160.212:8000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-02-04T16:01:45.984Z"
}
],
"services_hash": "96bd80706933d70b4a281f513b9e5c4eac69a9f27613d98a8b38a16bb0922524",
"last_updated_at": "2026-02-09T16:48:49.912Z",
"banner": [
"smtp",
"tls",
"http"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"80/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"80/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"80/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}