WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9f0be3b35a0be3b35a0be3b35a0be3b35a
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.14 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb53ea6237e8f56bf578f56bf578f56bf578f56bf57
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.13 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f5e22fb461c08073bad262b1bbe0d947b38ba5de8abcea7e
Public Swagger UI/API detected at path: /api/swagger.json - sample paths:
DELETE /api-keys/{key_id}
DELETE /invitations/{invitation_id}
DELETE /users/{user_id}
GET /admins
GET /api-keys
GET /invitations
GET /libraries
GET /servers
GET /status
GET /users
POST /users/{user_id}/disable
POST /users/{user_id}/enable
POST /users/{user_id}/extend
POST /users/{user_id}/reset-password
PUT /users/{user_id}/update-expiry
Severity: info
Fingerprint: 5733ddf49ff49cd1f5e22fb461c08073bad262b1bbe0d947b38ba5de09fece9f
Public Swagger UI/API detected at path: /api/swagger.json - sample paths:
DELETE /api-keys/{key_id}
DELETE /invitations/{invitation_id}
DELETE /users/{user_id}
GET /admins
GET /api-keys
GET /invitations
GET /libraries
GET /servers
GET /status
GET /users
POST /users/{user_id}/disable
POST /users/{user_id}/enable
POST /users/{user_id}/extend
PUT /users/{user_id}/update-expiry
Open service 176.96.138.226:22
2026-01-22 14:49