WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9a6fcdf7e36fcdf7e36fcdf7e36fcdf7e3
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.11 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50d5282808aff06958aff06958aff06958aff0695
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.8 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50d52828d37a3aa8437a3aa8437a3aa8437a3aa84
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.5 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50d52828c64fb433164fb433164fb433164fb4331
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.4 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07be0604acbe0604acbe0604acbe0604acbe0604ac
Symfony profiler enabled: https://app.staging.secretaligner.com/_profiler/empty/search/results
Open service 135.125.66.222:22
2026-01-22 15:50