93.183.203.242
{
"scan_id": 1746533890,
"ip": "93.183.203.242",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "93.183.203.224/27",
"postal_code": "21000",
"coordinates": {
"latitude": "49.2335",
"longitude": "28.4817"
},
"geo_point": "49.2335, 28.4817",
"locale_code": "en",
"continent": "Europe",
"country_code": "UA",
"country_name": "Ukraine",
"city": "Vinnytsia"
},
"location_updated_at": "2025-05-05T00:37:28Z",
"asn": {
"number": "AS3326",
"organization": "Private Joint Stock Company datagroup",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "93.183.200.0/21",
"organization": "PJSC DATAGROUP",
"descr": "PJSC DATAGROUP",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T08:53:25Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-05-05T00:37:28Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-05-05T06:44:35Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-05-05T00:37:28Z"
}
],
"hostnames": [
{
"name": "93.183.203.242.ipv4.datagroup.ua",
"last_updated_at": "2025-05-07T12:57:48.944599754Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "",
"product": "ProFTPD",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:proftpd:proftpd",
"part": "a",
"vendor": "proftpd",
"product": "proftpd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 ProFTPD Server (Debian) [::ffff:93.183.203.242]\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-30T02:21:27.045Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.6p1 Ubuntu 3ubuntu13.11",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.6p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.6p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.11",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"ext-info-s",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "341b8360c31c8e4a3b8a353677e0aa6e0b584673734bc5a9a8c33c8e7f0c29a5",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBccgE1xzUZHI8BFHMKwiHLdHWZABTVxwx4nS5vE8FJVkTCgduTTIZaf1XFBuq9XTdJNsW0FL8GxroJenK2QrOQ="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_9.6p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-51767",
"score": 7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-30T10:57:47.097Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.4.58",
"product": "Apache httpd",
"extra_info": "(Ubuntu)",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.58",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.58",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!doctype html>\n<html lang=\"en\">\n <head>\n <meta charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <title>Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University: Open Access Journals</title>\n\n <script src=\"https://unpkg.com/@phosphor-icons/web\"></script>\n <link href=\"https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-QWTKZyjpPEjISv5WaRU9OFeRpok6YctnYmDr5pNlyT2bRjXh0JMhjY6hW+ALEwIH\" crossorigin=\"anonymous\">\n </head>\n <body>\n<div class=\"container mt-4\">\n<div class=\"list-group\">\n <a href=\"https://vspu.net/sit\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Сучасні інформаційні технології та інноваційні методики навчання у підготовці фахівців: методологія, теорія, досвід, проблеми</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Modern Information Technologies and Innovation Methodologies of Education in Professional Training Methodology Theory Experience Problems</p>\n <small>ISSN: 2412-1142</small>\n </a>\n <a href=\"https://vspu.net/nzhist\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Історія</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of the Vinnytsia Mykhailo Kotsyiubynskyi State Pedagogical University. Series History</p>\n <small>ISSN: 2411-2143</small>\n </a>\n <a href=\"https://vspu.net/nzped\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Педагогіка і психологія</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Series: Pedagogy and Psychology</p>\n <small>ISSN: 2415-7872</small>\n </a>\n <a href=\"https://vspu.net/movoznavstvo\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Філологія (мовознавство)</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Notes of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Series: Philology (Linguistics)</p>\n <small>ISSN: 2521-1293</small>\n </a>\n <a href=\"https://vspu.net/naturalscience\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Теорія та методика навчання природничих наук</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Section: Theory and Methods of Teaching Natural Sciences</p>\n <small></small>\n </a>\n</div>\n</div>\n <script src=\"https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-YvpcrYf0tY3lHB60NNkmXc5s9fDVZLESaAA55NDzOxhy9GkcIdslK1eN7N6jIeHz\" crossorigin=\"anonymous\"></script>\n </body>\n</html>\n",
"body_murmur": 154495688,
"body_sha256": "a8575afef42aa89c165932d0061c76a2627f5a4f13311b235bccec0204b50d32",
"component": [
"Apache HTTP Server:2.4.58",
"Ubuntu",
"Bootstrap:5.3.3"
],
"content_length": -1,
"headers": {
"accept_ranges": [
"bytes"
],
"connection": [
"Upgrade"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 07 May 2025 11:51:41 GMT"
],
"etag": [
"\"1096-620067211dfc6-gzip\""
],
"last_modified": [
"Mon, 19 Aug 2024 10:05:15 GMT"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"upgrade": [
"h2,h2c"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "93.183.203.242",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University: Open Access Journals"
}
},
"cve": [
{
"id": "CVE-2024-27316",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-38474",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38476",
"score": 9.8,
"severity": "critical"
}
],
"url": "http://93.183.203.242/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-07T11:51:54.929Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "2.4.58",
"product": "Apache httpd",
"extra_info": "(Ubuntu)",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.58",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.58",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!doctype html>\n<html lang=\"en\">\n <head>\n <meta charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <title>Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University: Open Access Journals</title>\n\n <script src=\"https://unpkg.com/@phosphor-icons/web\"></script>\n <link href=\"https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-QWTKZyjpPEjISv5WaRU9OFeRpok6YctnYmDr5pNlyT2bRjXh0JMhjY6hW+ALEwIH\" crossorigin=\"anonymous\">\n </head>\n <body>\n<div class=\"container mt-4\">\n<div class=\"list-group\">\n <a href=\"https://vspu.net/sit\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Сучасні інформаційні технології та інноваційні методики навчання у підготовці фахівців: методологія, теорія, досвід, проблеми</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Modern Information Technologies and Innovation Methodologies of Education in Professional Training Methodology Theory Experience Problems</p>\n <small>ISSN: 2412-1142</small>\n </a>\n <a href=\"https://vspu.net/nzhist\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Історія</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of the Vinnytsia Mykhailo Kotsyiubynskyi State Pedagogical University. Series History</p>\n <small>ISSN: 2411-2143</small>\n </a>\n <a href=\"https://vspu.net/nzped\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Педагогіка і психологія</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Series: Pedagogy and Psychology</p>\n <small>ISSN: 2415-7872</small>\n </a>\n <a href=\"https://vspu.net/movoznavstvo\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Філологія (мовознавство)</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Notes of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Series: Philology (Linguistics)</p>\n <small>ISSN: 2521-1293</small>\n </a>\n <a href=\"https://vspu.net/naturalscience\" class=\"list-group-item list-group-item-action\" aria-current=\"true\">\n <div class=\"d-flex w-100 justify-content-between\">\n <h5 class=\"mb-1\">Наукові записки Вінницького державного педагогічного університету імені Михайла Коцюбинського. Серія: Теорія та методика навчання природничих наук</h5>\n <span><i class=\"ph ph-arrow-up-right\"></i></span>\n </div>\n <p class=\"mb-1\">Scientific Papers of Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Section: Theory and Methods of Teaching Natural Sciences</p>\n <small></small>\n </a>\n</div>\n</div>\n <script src=\"https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-YvpcrYf0tY3lHB60NNkmXc5s9fDVZLESaAA55NDzOxhy9GkcIdslK1eN7N6jIeHz\" crossorigin=\"anonymous\"></script>\n </body>\n</html>\n",
"body_murmur": 154495688,
"body_sha256": "a8575afef42aa89c165932d0061c76a2627f5a4f13311b235bccec0204b50d32",
"component": [
"Ubuntu",
"Apache HTTP Server:2.4.58",
"Bootstrap:5.3.3"
],
"content_length": -1,
"headers": {
"accept_ranges": [
"bytes"
],
"connection": [
"Upgrade"
],
"content_type": [
"text/html"
],
"date": [
"Wed, 07 May 2025 00:09:53 GMT"
],
"etag": [
"\"1096-620067211dfc6-gzip\""
],
"last_modified": [
"Mon, 19 Aug 2024 10:05:15 GMT"
],
"server": [
"Apache/2.4.58 (Ubuntu)"
],
"strict_transport_security": [
"max-age=15552000; includeSubDomains"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"no-referrer"
]
}
],
"upgrade": [
"h2"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "93.183.203.242",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"title": "Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University: Open Access Journals"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r10.i.lencr.org/"
],
"ocsp_urls": [
"http://r10.o.lencr.org"
]
},
"authority_key_id": "bbbcc347a5e4bca9c6c3a4720c108da235e1c8e8",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://r10.c.lencr.org/19.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:\n 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0\n Timestamp : Apr 21 03:22:59.389 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:8C:37:F8:DB:C4:27:CB:B7:28:70:06:\n FB:BF:5A:40:49:CC:44:B3:B5:7D:03:E6:1E:08:D9:C6:\n 5E:E5:6B:0B:60:02:20:56:B6:02:49:E3:2F:6B:37:35:\n F9:FB:EA:9B:85:CE:24:D7:CD:D9:ED:DA:02:60:30:B9:\n 06:A2:32:90:4B:20:B6\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:\n 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0\n Timestamp : Apr 21 03:22:59.365 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:B5:99:18:BF:ED:E3:44:50:C1:60:57:\n 10:7B:D0:00:58:CC:BB:FF:1D:E9:83:91:FF:80:E4:68:\n 05:F5:BD:69:FF:02:20:4F:AD:6C:CF:F8:A2:95:91:4B:\n 83:EA:CB:AE:DD:7F:72:1C:04:FC:20:A8:DA:1B:76:7E:\n 36:D5:B6:B2:9C:DF:72",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"intranet.vspu.edu.ua",
"vspu.net"
]
},
"subject_key_id": "bbc4d553c8a5ed67561abbab6fd62d7855565c51"
},
"fingerprint_md5": "37A8F360B7ACC445E9B6C87D7BADA8F6",
"fingerprint_sha1": "2EC15AD47539889B53069B322DFF29AA49528FC8",
"fingerprint_sha256": "D7623CF09FEE15613B38DFCB954A7E1B901FBF339B4424CDA76B9DA62DF7C0EE",
"issuer": {
"common_name": [
"R10"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R10",
"jarm": "15d3fd16d29d29d00042d43d000000f969de8346060623ff1a681e56326e65",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-05-16T02:34:25",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-05-12T04:13:58",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "467610693642386992903339895619404974746770",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "YTVkYmNhYTBjNzJiMTgxODcyY2IyNmVhYjI2YmU5NDAxZWFhODc0MDRjNGJmZTFiOTYyM2Q1MmVmZDY4N2NiZWNmMmRmODY1MzA4NjQ3ODBkZDVkZTkzM2JiYzk3M2FmNTY1Mjc4ZmU0MDIzZWY2YWFmNzUwZGJiN2IwODlmOGFlN2JiY2UzNDNjOTMzNDE3MjEwOTljMWZmYWEzYTVmN2RmZDg2Y2JkYTQ5MmI5OGExNGMwYzI4MTIxZmVkOTZlMWIzYzQ5NWM1NjE3NjAwMjZmNjliNTI3YTQ1NmViOWFmYWY3ZjlhYWZhYjIzN2FiOGNmOWQzMjI3OWM4ZGNkNjFmMGM5MjYyZTgwYWY0NDNhMjhiMWY4YjY5NThjM2U1ZGMxZTVhOGJmMjI3MzYwNTc4OThlZDEwYTYyYTkwYzBhM2EyOThjMWU3ZjYwNzVhYjczODFjOGU5ZDIxZTkwNzgzOThmYTBjYTM1MWQ2MWJjYjk3N2VmNDFiY2Y5NWQyZjI5YjVjZmRmMDBhOThjYTM4YWI1Mzc3ZTc4ODExYTgxMTExNjE5ZjQ0YWIyYjk4MDVlM2I3NjY2YjUwOTg4ZDVhZmM1N2U5MTQ2NDlhMjNjOGZhY2Q3OTE5NTQ2ZmUxNDdhNjdlYjhmYmNkZDk5YjM2N2EwNDQ1ZGM1NjM2MTY="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "ccfb0f6a85710965fe959b53cee9b27c22e9855c0d978db6a97e54c0fe4c0db0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450221008c37f8dbc427cbb7287006fbbf5a4049cc44b3b57d03e61e08d9c65ee56b0b60022056b60249e32f6b3735f9fbea9b85ce24d7cdd9edda026030b906a232904b20b6"
},
"timestamp": "2025-04-21T03:22:59.389000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "ed3c4bd6e806c2a4a20057dbcb24e23801df512fedc486c5700f20ddb73e3fe0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100b59918bfede34450c16057107bd00058ccbbff1de98391ff80e46805f5bd69ff02204fad6ccff8a295914b83eacbaedd7f721c04fc20a8da1b767e36d5b6b29cdf72"
},
"timestamp": "2025-04-21T03:22:59.365000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"intranet.vspu.edu.ua"
]
},
"subject_alt_name": {
"dns_names": [
"intranet.vspu.edu.ua",
"vspu.net"
],
"extended_dns_names": [
{
"domain": "vspu",
"fld": "vspu.edu.ua",
"subdomain": "intranet",
"tld": "edu.ua"
},
{
"domain": "vspu",
"fld": "vspu.net",
"tld": "net"
}
]
},
"subject_dn": "/CN=intranet.vspu.edu.ua",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b51be9fd6454d726bf2f0c2d85522c77abf5da19e1157f3aeafac538da01e634",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "ec8116505a50a3353bfdd6b26b6aae93b3ade0f9fd3b64d666862844ef054f3d",
"tbs_noct_fingerprint": "f4631bff2a6faea846f935e5088d2cb1844dbc8a77a06504c51987169b65007f",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-07-20T02:24:28",
"not_before": "2025-04-21T02:24:29"
},
"version": 2
},
"fingerprint_sha256": "D7623CF09FEE15613B38DFCB954A7E1B901FBF339B4424CDA76B9DA62DF7C0EE",
"precert": false,
"raw": "MIIFMjCCBBqgAwIBAgISBV4vL7hcI1yUp3XVIcGnQ2ySMA0GCSqGSIb3DQEBCwUAMDMxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQwwCgYDVQQDEwNSMTAwHhcNMjUwNDIxMDIyNDI5WhcNMjUwNzIwMDIyNDI4WjAfMR0wGwYDVQQDExRpbnRyYW5ldC52c3B1LmVkdS51YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANOoLC3cFBiiPcM1XiuXDPza/Ya8aAEv9PO/ePQ4MWLvavtU5Nc5xLNTex8peCsqq/WbeDf8QBlq3kVQsj12RuCpE5TBXnDnV8rSbTTiOWgVZHcinnc6xG2epBt/e3nLctlWhq+fU5dwdQe8/YUKgpS+oC8y+gbwe/EoHNCxKhDxMhYqHE9Ngbyse/HgjeksjOWTDVrK0aAA2j5tnZM8Qtax5k0B24RSsR8xw0kEPh7SuM0c1fKO8HpZXvvCugxN9bZhGgf2aJD/R9Lp6SMq+ThNdiA+BNr4UpdigsY/KXT3AAsbq/ONAeMMmNth3Mv9/EQLZbw45Lj033yCeYANHz0CAwEAAaOCAlIwggJOMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUu8TVU8il7WdWGrurb9YteFVWXFEwHwYDVR0jBBgwFoAUu7zDR6XkvKnGw6RyDBCNojXhyOgwVwYIKwYBBQUHAQEESzBJMCIGCCsGAQUFBzABhhZodHRwOi8vcjEwLm8ubGVuY3Iub3JnMCMGCCsGAQUFBzAChhdodHRwOi8vcjEwLmkubGVuY3Iub3JnLzApBgNVHREEIjAgghRpbnRyYW5ldC52c3B1LmVkdS51YYIIdnNwdS5uZXQwEwYDVR0gBAwwCjAIBgZngQwBAgEwLgYDVR0fBCcwJTAjoCGgH4YdaHR0cDovL3IxMC5jLmxlbmNyLm9yZy8xOS5jcmwwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDM+w9qhXEJZf6Vm1PO6bJ8IumFXA2XjbapflTA/kwNsAAAAZZWXtu9AAAEAwBHMEUCIQCMN/jbxCfLtyhwBvu/WkBJzESztX0D5h4I2cZe5WsLYAIgVrYCSeMvazc1+fvqm4XOJNfN2e3aAmAwuQaiMpBLILYAdgDtPEvW6AbCpKIAV9vLJOI4Ad9RL+3EhsVwDyDdtz4/4AAAAZZWXtulAAAEAwBHMEUCIQC1mRi/7eNEUMFgVxB70ABYzLv/HemDkf+A5GgF9b1p/wIgT61sz/iilZFLg+rLrt1/chwE/CCo2ht2fjbVtrKc33IwDQYJKoZIhvcNAQELBQADggEBAKXbyqDHKxgYcssm6rJr6UAeqodATEv+G5Yj1S79aHy+zy34ZTCGR4DdXekzu8lzr1ZSeP5AI+9qr3UNu3sIn4rnu840PJM0FyEJnB/6o6X339hsvaSSuYoUwMKBIf7Zbhs8SVxWF2ACb2m1J6RW65r69/mq+rI3q4z50yJ5yNzWHwySYugK9EOiix+LaVjD5dweWovyJzYFeJjtEKYqkMCjopjB5/YHWrc4HI6dIekHg5j6DKNR1hvLl370G8+V0vKbXP3wCpjKOKtTd+eIEagREWGfRKsrmAXjt2ZrUJiNWvxX6RRkmiPI+s15GVRv4Uemfrj7zdmbNnoERdxWNhY=",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-2024-27316",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-38474",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38476",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://93.183.203.242/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-07T02:41:39.494Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "8.0.42-0ubuntu0.24.04.1",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:8.0.42-0ubuntu0.24.04.1",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "8\\.0\\.42\\-0ubuntu0\\.24\\.04\\.1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "8.0.42-0ubuntu0.24.04.1"
},
"tls": {
"certificate": {
"fingerprint_md5": "6D3755FE432CDDD3636531D5C3AEBD98",
"fingerprint_sha1": "00FA0D40C6F224BE673819CC4964947845DA5260",
"fingerprint_sha256": "F9DABA5E1319E93C1D3A22B6792D4DF73234F60614C8938E6AC8E1D14430992B",
"issuer": {
"common_name": [
"MySQL_Server_5.7.17_Auto_Generated_CA_Certificate"
]
},
"issuer_dn": "/CN=MySQL_Server_5.7.17_Auto_Generated_CA_Certificate",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"MySQL_Server_5.7.17_Auto_Generated_Server_Certificate"
]
},
"subject_alt_name": {
"dns_names": [
"MySQL_Server_5.7.17_Auto_Generated_Server_Certificate"
],
"extended_dns_names": []
},
"subject_dn": "/CN=MySQL_Server_5.7.17_Auto_Generated_Server_Certificate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "19e7c4cec3a689741cba525f5f4c59c05e5b05318d476cf2617361064d3c281f",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "200c2da450ee997a8483aa35c9ba691cf9b4a52fa09f51b83bf9616fdebba63d",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2027-03-27T09:08:46",
"not_before": "2017-03-29T09:08:46"
}
},
"fingerprint_sha256": "F9DABA5E1319E93C1D3A22B6792D4DF73234F60614C8938E6AC8E1D14430992B",
"precert": false,
"raw": "MIIC8DCCAdgCAQIwDQYJKoZIhvcNAQELBQAwPDE6MDgGA1UEAwwxTXlTUUxfU2VydmVyXzUuNy4xN19BdXRvX0dlbmVyYXRlZF9DQV9DZXJ0aWZpY2F0ZTAeFw0xNzAzMjkwOTA4NDZaFw0yNzAzMjcwOTA4NDZaMEAxPjA8BgNVBAMMNU15U1FMX1NlcnZlcl81LjcuMTdfQXV0b19HZW5lcmF0ZWRfU2VydmVyX0NlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3kTdBiguupfsn7kM1YOqD6zOVeHt/M25MA5cJngBa5jiY7/rDlYadvDfKThoVWz3RsmrarWHior/koF7pX8IPNDYHlD/CjFKEkVcq3WVz/weOYAcEUw8kJ7zASAvsuLEmLQLqITuKj5CV9PLMn+dWt+bXR+syYFGCoSMg9sEwuFCyixjzI/pannIIxrmVRmw0Q3Z4gHnsVxdVNUNSIS5eTTpSSIofG7Su3N/JUoDo7BkMbxuS2Q8YrY5po+dTwsO2Wyru1SdI66f5zC4LNv11oBJxVJ1XMMtMmOEKnGHL0CUhKDs2iT+3NiSKNyefn5JF2/pJBc+MMGMopzxQd0JRwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQCWImu0cXcSVOUke9Rx0sWe5+rlsjfmyO6ZzTqtFhe6y9lEqg1G9EtHZuT8xTH7zUHZ4iNJBaVjeMAtRGXCGaFnYZsdz/MbTHMBq+3EbCqTXMJGaNt7QF4cbg0Vhd5ijz1zSU0CJbB5qchSsYPr9ugdJMZT+V+XYoLkDceI6xlcv81GqTo+qfc0w1QRyV/MoPuv8efer48o0obS/imJomNn5u4QMivuv58O2dTcH3UaXaET6KzM1/bg83G4PMqU7VaBdD1g89MhBj8eLkAJsul+GRa8UvzrjH63eyHEidgGWMRmUbayRMXGl92TiqUL3ZagT2WVINCPr9jLX7Bg515P",
"tags": [
"dv"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-07T07:26:36.189Z"
}
],
"services_hash": "285db530e3fca49001c864e858d88aaa1befe4eb0b35f47d148ea02340243a1d",
"last_updated_at": "2025-05-07T11:51:54.929Z",
"banner": [
"mysql",
"tls",
"http",
"ftp",
"ssh"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-829"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/",
"http://www.openwall.com/lists/oss-security/2024/07/01/10",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"http://www.openwall.com/lists/oss-security/2024/07/17/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240808-0006/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://packetstorm.news/files/id/190587/",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.exploit-db.com/exploits/52269",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}