WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb53ea6237e8f56bf578f56bf578f56bf578f56bf57
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.13 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522ae0f4522
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:Ntiva-Dev/theHub.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master [branch "beta"] remote = origin merge = refs/heads/beta [branch "main"] remote = origin merge = refs/heads/main [branch "crn-2910-vulnerable-JS-library"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library [branch "beta-calendly"] remote = origin merge = refs/heads/beta-calendly [branch "crn-2910-vulnerable-JS-library-registration"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-registration [branch "crn-2910-vulnerable-JS-library-design"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-design [branch "crn-2910-vulnerable-JS-library-live"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live [branch "crn-2910-vulnerable-JS-library-live-calendly"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live-calendly [branch "crn-2910-vulnerable-JS-library-live-calendly-paricipant-import"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live-calendly-paricipant-import
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652289e7e1c4
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:jake-bunting/QMS-Msupply.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522ec1a7cf5
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:jake-bunting/QMS.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522ae0f4522
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:Ntiva-Dev/theHub.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master [branch "beta"] remote = origin merge = refs/heads/beta [branch "main"] remote = origin merge = refs/heads/main [branch "crn-2910-vulnerable-JS-library"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library [branch "beta-calendly"] remote = origin merge = refs/heads/beta-calendly [branch "crn-2910-vulnerable-JS-library-registration"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-registration [branch "crn-2910-vulnerable-JS-library-design"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-design [branch "crn-2910-vulnerable-JS-library-live"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live [branch "crn-2910-vulnerable-JS-library-live-calendly"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live-calendly [branch "crn-2910-vulnerable-JS-library-live-calendly-paricipant-import"] remote = origin merge = refs/heads/crn-2910-vulnerable-JS-library-live-calendly-paricipant-import
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652271ce18f7
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@gitlab.com:treesha.kalpesh/pathfinder.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main [branch "master_dev"] remote = origin merge = refs/heads/master_dev
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522058544b1
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:simplesamlphp/simplesamlphp.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Open service 103.106.22.2:22
2026-01-22 14:39
Open service 103.106.22.2:22
2026-01-08 14:32
Open service 103.106.22.2:22
2026-01-01 17:35