WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9a6fcdf7e36fcdf7e36fcdf7e36fcdf7e3
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.11 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1bf890109bf890109bf890109bf890109bf890109bf890109
Public Swagger UI/API detected at path: /api-docs/swagger.json
Open service 104.238.34.252:443 ยท chat.sagheavyequipment.com
2026-01-23 11:30
HTTP/1.1 200 OK Access-Control-Allow-Origin: * Content-Security-Policy: default-src 'self' ; connect-src *; font-src 'self' data:; frame-src *; img-src * data: blob:; media-src * data:; script-src 'self' 'unsafe-eval' 'sha256-jqxtvDkBbRAl9Hpqv68WdNOieepg8tJSYu1xIy7zT34=' 'sha256-aui5xYk3Lu1dQcnsPlNZI+qDTdfzdUv3fzsw80VLJgw=' ; style-src 'self' 'unsafe-inline' Content-Type: text/html; charset=utf-8 Date: Fri, 23 Jan 2026 11:30:51 GMT Vary: Accept-Encoding X-Content-Type-Options: nosniff X-Instance-Id: ff9be730-1023-4f03-a7fa-c721db3201d7 X-Powered-By: Express X-Xss-Protection: 1 Connection: close Transfer-Encoding: chunked
Open service 104.238.34.252:22
2026-01-22 14:29