182.79.117.234
{
"scan_id": 1751324060,
"ip": "182.79.117.234",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.79.116.0/23",
"postal_code": "201009",
"coordinates": {
"latitude": "28.6677",
"longitude": "77.4337"
},
"geo_point": "28.6677, 77.4337",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "Ghaziabad"
},
"location_updated_at": "2025-07-01T00:42:56Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.79.112.0/20",
"organization": "Bharti Airtel Limited",
"descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:40Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-07-01T00:42:56Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-07-01T08:27:28Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-07-01T00:42:56Z"
}
],
"services": [
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Linux telnetd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"telnet": {
"banner": "\r\nFortiGate-40F login: "
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-01T17:18:46.005Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "<!DOCTYPE html><html lang=\"en\"><head>\n <meta charset=\"utf-8\">\n <title>FortiGate</title>\n <base href=\"/\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <meta name=\"apple-itunes-app\" content=\"app-id=1157004084, app-argument={{::host_addr}}\">\n <link rel=\"apple-touch-icon\" sizes=\"180x180\" href=\"favicon/apple-touch-icon.png\">\n <link rel=\"shortcut icon\" type=\"image/x-icon\" href=\"favicon/favicon.ico\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"32x32\" href=\"favicon/favicon-32x32.png\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"16x16\" href=\"favicon/favicon-16x16.png\">\n <link rel=\"manifest\" href=\"favicon/site.webmanifest\">\n <link rel=\"mask-icon\" href=\"favicon/safari-pinned-tab.svg\" color=\"#d43527\">\n <link rel=\"shortcut icon\" href=\"favicon/favicon.ico\">\n <meta name=\"msapplication-TileColor\" content=\"#d43527\">\n <meta name=\"msapplication-config\" content=\"favicon/browserconfig.xml\">\n\n <script>\n function login_redirect(error) {\n 'use strict';\n var url = window.location.pathname + window.location.search + window.location.hash;\n if (error) {\n console.warn(`Redirecting to login page: ${error}`);\n } else {\n console.warn('Redirecting to login page');\n }\n window.location.href = '/logout?redir=' + encodeURIComponent(url);\n }\n\n window.__fosLoginRedirect__ = login_redirect;\n\n fetch('/api/v2/monitor/web-ui/extend-session').then(response => {\n if (!response.ok && response.status === 401) {\n login_redirect();\n }\n });\n </script>\n <style>@charset \"UTF-8\";body{font-family:Lato,Helvetica,Arial,sans-serif;}body{font-weight:var(--nu-theme-dimension-normal-font-weight);}body{background-color:rgb(var(--nu-theme-override-text-background,var(--nu-theme-color-background-level0)));color:rgb(var(--nu-theme-on-color-background));font-size:15px!important;}*{scrollbar-width:auto;scrollbar-color:rgb(var(--nu-theme-color-background-level5)) #0000;}@font-face{font-family:Lato;font-style:normal;font-weight:300;src:local(\"☺︎\"),url(lato-light.woff2) format(\"woff2\"),url(lato-light.woff) format(\"woff\");}@font-face{font-family:Lato;font-style:normal;font-weight:400;src:local(\"☺︎\"),url(lato-regular.woff2) format(\"woff2\"),url(lato-regular.woff) format(\"woff\");}@font-face{font-family:Lato;font-style:normal;font-weight:700;src:local(\"☺︎\"),url(lato-bold.woff2) format(\"woff2\"),url(lato-bold.woff) format(\"woff\");}body{margin:0;}</style><link rel=\"stylesheet\" href=\"/c1bf06815af7e73a9394d237e4a19144/styles.css\" media=\"print\" onload=\"this.media='all'\"><noscript><link rel=\"stylesheet\" href=\"/c1bf06815af7e73a9394d237e4a19144/styles.css\"></noscript></head>\n <body>\n <fos-root></fos-root>\n <script src=\"/c1bf06815af7e73a9394d237e4a19144/runtime.js\" defer></script><script src=\"/c1bf06815af7e73a9394d237e4a19144/polyfills.js\" defer></script><script src=\"/c1bf06815af7e73a9394d237e4a19144/main.js\" defer></script>\n\n</body></html>",
"body_murmur": -182393250,
"body_sha256": "e851a8a9002e5f2dc672001ebce12a596a66924d6e79c1c06de969ad565914d3",
"content_length": -1,
"favicon": {
"md5_hash": "2c5169a038c1e0ffc9ee9dc1da26a48e",
"murmur_hash": -404383634,
"path": "http://182.79.117.234:80/favicon/apple-touch-icon.png",
"size": 745
},
"headers": {
"connection": [
"keep-alive"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 01 Jul 2025 18:15:03 GMT"
],
"etag": [
"c1bf06815af7e73a9394d237e4a19144"
],
"strict_transport_security": [
"max-age=15552000"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"date": [
"Tue, 01 Jul 2025 18:15:02 GMT"
],
"location": [
"https://182.79.117.234:443/"
],
"strict_transport_security": [
"max-age=0"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=5"
]
}
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "https://182.79.117.234:443/",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"http://182.79.117.234"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.79.117.234:443",
"path": "/",
"scheme": "https"
}
},
"status_code": 200,
"title": "FortiGate",
"transfer_encoding": [
"chunked"
]
}
},
"url": "http://182.79.117.234/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-01T18:15:05.006Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body": "<!DOCTYPE html><html lang=\"en\"><head>\n <meta charset=\"utf-8\">\n <title>FortiGate</title>\n <base href=\"/\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <meta name=\"apple-itunes-app\" content=\"app-id=1157004084, app-argument={{::host_addr}}\">\n <link rel=\"apple-touch-icon\" sizes=\"180x180\" href=\"favicon/apple-touch-icon.png\">\n <link rel=\"shortcut icon\" type=\"image/x-icon\" href=\"favicon/favicon.ico\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"32x32\" href=\"favicon/favicon-32x32.png\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"16x16\" href=\"favicon/favicon-16x16.png\">\n <link rel=\"manifest\" href=\"favicon/site.webmanifest\">\n <link rel=\"mask-icon\" href=\"favicon/safari-pinned-tab.svg\" color=\"#d43527\">\n <link rel=\"shortcut icon\" href=\"favicon/favicon.ico\">\n <meta name=\"msapplication-TileColor\" content=\"#d43527\">\n <meta name=\"msapplication-config\" content=\"favicon/browserconfig.xml\">\n\n <script>\n function login_redirect(error) {\n 'use strict';\n var url = window.location.pathname + window.location.search + window.location.hash;\n if (error) {\n console.warn(`Redirecting to login page: ${error}`);\n } else {\n console.warn('Redirecting to login page');\n }\n window.location.href = '/logout?redir=' + encodeURIComponent(url);\n }\n\n window.__fosLoginRedirect__ = login_redirect;\n\n fetch('/api/v2/monitor/web-ui/extend-session').then(response => {\n if (!response.ok && response.status === 401) {\n login_redirect();\n }\n });\n </script>\n <style>@charset \"UTF-8\";body{font-family:Lato,Helvetica,Arial,sans-serif;}body{font-weight:var(--nu-theme-dimension-normal-font-weight);}body{background-color:rgb(var(--nu-theme-override-text-background,var(--nu-theme-color-background-level0)));color:rgb(var(--nu-theme-on-color-background));font-size:15px!important;}*{scrollbar-width:auto;scrollbar-color:rgb(var(--nu-theme-color-background-level5)) #0000;}@font-face{font-family:Lato;font-style:normal;font-weight:300;src:local(\"☺︎\"),url(lato-light.woff2) format(\"woff2\"),url(lato-light.woff) format(\"woff\");}@font-face{font-family:Lato;font-style:normal;font-weight:400;src:local(\"☺︎\"),url(lato-regular.woff2) format(\"woff2\"),url(lato-regular.woff) format(\"woff\");}@font-face{font-family:Lato;font-style:normal;font-weight:700;src:local(\"☺︎\"),url(lato-bold.woff2) format(\"woff2\"),url(lato-bold.woff) format(\"woff\");}body{margin:0;}</style><link rel=\"stylesheet\" href=\"/c1bf06815af7e73a9394d237e4a19144/styles.css\" media=\"print\" onload=\"this.media='all'\"><noscript><link rel=\"stylesheet\" href=\"/c1bf06815af7e73a9394d237e4a19144/styles.css\"></noscript></head>\n <body>\n <fos-root></fos-root>\n <script src=\"/c1bf06815af7e73a9394d237e4a19144/runtime.js\" defer></script><script src=\"/c1bf06815af7e73a9394d237e4a19144/polyfills.js\" defer></script><script src=\"/c1bf06815af7e73a9394d237e4a19144/main.js\" defer></script>\n\n</body></html>",
"body_murmur": -182393250,
"body_sha256": "e851a8a9002e5f2dc672001ebce12a596a66924d6e79c1c06de969ad565914d3",
"content_length": -1,
"favicon": {
"md5_hash": "2c5169a038c1e0ffc9ee9dc1da26a48e",
"murmur_hash": -404383634,
"path": "https://182.79.117.234:443/favicon/apple-touch-icon.png",
"size": 745
},
"headers": {
"connection": [
"keep-alive"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 01 Jul 2025 04:58:22 GMT"
],
"etag": [
"c1bf06815af7e73a9394d237e4a19144"
],
"strict_transport_security": [
"max-age=15552000"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.79.117.234",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"title": "FortiGate",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
}
},
"fingerprint_md5": "BED6EB0D72A2FAE02DA56A71A159B6AF",
"fingerprint_sha1": "6C0A6884ECB9CB287F18CA7F8D55ED63686A8B0D",
"fingerprint_sha256": "B91C1198BAF8ADF2F2E78CBA613017C85E0FDB77AA654D303033E245CF3ECDEB",
"issuer": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"issuer_dn": "/O=Fortinet Ltd./CN=FortiGate",
"jarm": "0bd0bd0000bd0bd00042d42d0000009f6c10cf2baa8e8566d140ba89a7485c",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "5210916227404052491",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"subject_alt_name": {
"dns_names": [
"FortiGate"
],
"extended_dns_names": []
},
"subject_dn": "/O=Fortinet Ltd./CN=FortiGate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "6f866776e2170da8cf6f81959946724cad263f890527d80ae38b6e810236f4c4",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "9b4c10544878256aa46ebcc2b9a9c0aa195d143a2fc13b8aa5be6536838d0747",
"validation_level": "OV",
"validity": {
"length_seconds": 71280000,
"not_after": "2027-05-10T05:37:16",
"not_before": "2025-02-04T05:37:16"
},
"version": 2
},
"fingerprint_sha256": "B91C1198BAF8ADF2F2E78CBA613017C85E0FDB77AA654D303033E245CF3ECDEB",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://182.79.117.234/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-01T04:58:26.832Z"
}
],
"services_hash": "8a8487f1410f923a325131db9cc46d53adb80c865485c235d68aba344471a197",
"last_updated_at": "2025-07-01T18:15:05.006Z",
"banner": [
"telnet",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"23/telnet"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}