WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb583e3d39867420e8d67420e8d67420e8d67420e8d
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.6 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb583e3d39d05f5693405f5693405f5693405f56934
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.3 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50006c01975095da075095da075095da075095da0
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.5 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The Kafka instance is available to the public without authentication.
An attacker could connect to the queue to extract private/confidential information in real-time.
Fingerprint: 43224224eeda9da960defeaaf874f2b28f544574f9650f8537865fbed9dcb73a
NoAuth Found topic warehouse Found topic new_order Found topic order Found topic test4 Found topic customer Found topic district Found topic stock Found topic order_line Found topic history
Fingerprint: 43224224eeda9da960defeaa832aea543b6c1ded023e0f56f4fee7f65131e5da
NoAuth Found topic order_line Found topic history Found topic customer Found topic warehouse Found topic stock Found topic new_order Found topic order Found topic test4 Found topic district
Fingerprint: 43224224eeda9da960defeaac0f8604de14e67afe50798d4a7b8aaadcfa3a730
NoAuth Found topic stock Found topic order_line Found topic history Found topic district Found topic warehouse Found topic new_order Found topic order Found topic customer Found topic test4
Fingerprint: 43224224eeda9da960defeaa4875bc2b72f984560241c6f6689c3ee9124fbfc2
NoAuth Found topic test4 Found topic district Found topic warehouse Found topic stock Found topic new_order Found topic customer Found topic order_line Found topic history Found topic order
Fingerprint: 43224224eeda9da960defeaa832aea54832aea54832aea54832aea54832aea54
NoAuth Found topic order_line
Fingerprint: 43224224eeda9da960defeaac0f8604d6a2f051621003db1c204871486249ab7
NoAuth Found topic stock Found topic t Found topic customer Found topic district Found topic order_line Found topic history Found topic new_order Found topic order Found topic test4 Found topic warehouse
Fingerprint: 43224224eeda9da960defeaac0f8604d52eb36363a1d5ee08f8e7869013fd6c3
NoAuth Found topic stock Found topic history Found topic new_order Found topic order Found topic customer Found topic warehouse Found topic order_line Found topic t Found topic test4 Found topic district
Fingerprint: 43224224eeda9da960defeaa832aea54025b1cd9ed1abcfcd40005e320507b6d
NoAuth Found topic order_line Found topic test4 Found topic district Found topic customer Found topic warehouse Found topic stock Found topic history Found topic t Found topic new_order Found topic order
Fingerprint: 43224224eeda9da960defeaa4875bc2b4875bc2b4875bc2b4875bc2b4875bc2b
NoAuth Found topic test4
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522656c89b4
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git://git.moodle.org/moodle.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master [branch "MOODLE_35_STABLE"] remote = origin merge = refs/heads/MOODLE_35_STABLE [branch "MOODLE_36_STABLE"] remote = origin merge = refs/heads/MOODLE_36_STABLE [branch "MOODLE_37_STABLE"] remote = origin merge = refs/heads/MOODLE_37_STABLE
Open service 35.237.5.135:22
2024-11-01 00:40
Open service 35.237.5.135:22
2024-10-29 23:12
Open service 35.237.5.135:22
2024-10-21 21:40
Open service 35.237.5.135:22
2024-10-19 21:55
Open service 35.237.5.135:22
2024-10-17 22:02
Open service 35.237.5.135:22
2024-10-16 00:25
Open service 35.237.5.135:22
2024-10-01 21:41
Open service 35.237.5.135:22
2024-09-29 23:06
Open service 35.237.5.135:22
2024-09-27 22:01