WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb522ed691452962179529621795296217952962179
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.0p1 Ubuntu-1ubuntu7.3 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc591c07d5a1c735b3c30f0dc21df9d717c640499
Found host file trough Directory traversal: server|45.76.184.130 port|17091 type|1 #maint|http server beta_server|127.0.0.1 beta_port|17091 beta_type|1 meta|defined rtendmarkerbs1001|unknown
Open service 45.76.184.130:22
2024-12-21 23:01
Open service 45.76.184.130:22
2024-12-19 22:00
Open service 45.76.184.130:22
2024-12-18 00:31
Open service 45.76.184.130:22
2024-12-15 22:01
Open service 45.76.184.130:22
2024-12-13 22:13
Open service 45.76.184.130:22
2024-12-12 00:10
Open service 45.76.184.130:22
2024-12-01 23:34
Open service 45.76.184.130:22
2024-11-30 00:08
Open service 45.76.184.130:22
2024-11-28 00:39