generated from SocialGouv/dashlord
-
Notifications
You must be signed in to change notification settings - Fork 79
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
abd7d76
commit 602b67e
Showing
14 changed files
with
1,145 additions
and
1,134 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/lhr-aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=.html
Large diffs are not rendered by default.
Oops, something went wrong.
2,093 changes: 1,052 additions & 1,041 deletions
2,093
results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/lhr.json
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
# Nmap 7.92 scan initiated Sun Nov 24 11:47:08 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr | ||
# Nmap 7.92 scan initiated Sun Dec 1 11:53:33 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr | ||
Host: 51.38.43.26 (ns3120856.ip-51-38-43.eu) Status: Up | ||
Host: 51.38.43.26 (ns3120856.ip-51-38-43.eu) Ports: 22/open/tcp//ssh//OpenSSH 7.9p1 Debian 10+deb10u4 (protocol 2.0)/, 443/open/tcp//ssl|http//nginx/, 8443/closed/tcp//https-alt/// Ignored State: filtered (997) | ||
# Nmap done at Sun Nov 24 11:47:30 2024 -- 1 IP address (1 host up) scanned in 21.92 seconds | ||
# Nmap done at Sun Dec 1 11:53:57 2024 -- 1 IP address (1 host up) scanned in 23.21 seconds |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"host":"chatbot.fabnum.fr","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"7.9p1 Debian 10+deb10u4","vulnerabilities":[{"cvss":"9.8","id":"CVE-2023-38408","type":"cve","is_exploit":"false"},{"cvss":"9.8","id":"B8190CDB-3EB9-5631-9828-8064A1575B23","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"8AD01159-548E-546E-AA87-2DE89F3927EC","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"0221525F-07F5-5790-912D-F4B9E2D1B587","type":"githubexploit","is_exploit":"true"},{"cvss":"7.8","id":"CVE-2020-15778","type":"cve","is_exploit":"false"},{"cvss":"7.8","id":"CVE-2019-16905","type":"cve","is_exploit":"false"},{"cvss":"7.5","id":"SSV:92579","type":"seebug","is_exploit":"true"},{"cvss":"7.5","id":"PACKETSTORM:173661","type":"packetstorm","is_exploit":"true"},{"cvss":"7.5","id":"F0979183-AE88-53B4-86CF-3AF0523F3807","type":"githubexploit","is_exploit":"true"},{"cvss":"7.5","id":"1337DAY-ID-26576","type":"zdt","is_exploit":"true"},{"cvss":"7.0","id":"CVE-2021-41617","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"EDB-ID:46516","type":"exploitdb","is_exploit":"true"},{"cvss":"6.8","id":"EDB-ID:46193","type":"exploitdb","is_exploit":"true"},{"cvss":"6.8","id":"CVE-2019-6110","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"CVE-2019-6109","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3","type":"githubexploit","is_exploit":"true"},{"cvss":"6.8","id":"10213DBE-F683-58BB-B6D3-353173626207","type":"githubexploit","is_exploit":"true"},{"cvss":"6.5","id":"CVE-2023-51385","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2023-48795","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2020-14145","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2019-6111","type":"cve","is_exploit":"false"},{"cvss":"5.8","id":"EXPLOITPACK:98FE96309F9524B8C84C508837551A19","type":"exploitpack","is_exploit":"true"},{"cvss":"5.8","id":"EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97","type":"exploitpack","is_exploit":"true"},{"cvss":"5.8","id":"1337DAY-ID-32328","type":"zdt","is_exploit":"true"},{"cvss":"5.8","id":"1337DAY-ID-32009","type":"zdt","is_exploit":"true"},{"cvss":"5.3","id":"CVE-2018-20685","type":"cve","is_exploit":"false"},{"cvss":"5.3","id":"CVE-2016-20012","type":"cve","is_exploit":"false"},{"cvss":"0.0","id":"PACKETSTORM:151227","type":"packetstorm","is_exploit":"true"},{"cvss":"0.0","id":"PACKETSTORM:140261","type":"packetstorm","is_exploit":"true"}]}},{"service":{"name":"http","product":"nginx","id":"443","vulnerabilities":[]}},{"service":{"name":"https-alt","id":"8443","vulnerabilities":[]}}],"grade":"F"} | ||
{"host":"chatbot.fabnum.fr","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"7.9p1 Debian 10+deb10u4","vulnerabilities":[{"is_exploit":"false","type":"cve","cvss":"9.8","id":"CVE-2023-38408"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"B8190CDB-3EB9-5631-9828-8064A1575B23"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"8AD01159-548E-546E-AA87-2DE89F3927EC"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"0221525F-07F5-5790-912D-F4B9E2D1B587"},{"is_exploit":"false","type":"cve","cvss":"7.8","id":"CVE-2020-15778"},{"is_exploit":"false","type":"cve","cvss":"7.8","id":"CVE-2019-16905"},{"is_exploit":"true","type":"seebug","cvss":"7.5","id":"SSV:92579"},{"is_exploit":"true","type":"packetstorm","cvss":"7.5","id":"PACKETSTORM:173661"},{"is_exploit":"true","type":"githubexploit","cvss":"7.5","id":"F0979183-AE88-53B4-86CF-3AF0523F3807"},{"is_exploit":"true","type":"zdt","cvss":"7.5","id":"1337DAY-ID-26576"},{"is_exploit":"false","type":"cve","cvss":"7.0","id":"CVE-2021-41617"},{"is_exploit":"true","type":"exploitdb","cvss":"6.8","id":"EDB-ID:46516"},{"is_exploit":"true","type":"exploitdb","cvss":"6.8","id":"EDB-ID:46193"},{"is_exploit":"false","type":"cve","cvss":"6.8","id":"CVE-2019-6110"},{"is_exploit":"false","type":"cve","cvss":"6.8","id":"CVE-2019-6109"},{"is_exploit":"true","type":"githubexploit","cvss":"6.8","id":"C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3"},{"is_exploit":"true","type":"githubexploit","cvss":"6.8","id":"10213DBE-F683-58BB-B6D3-353173626207"},{"is_exploit":"false","type":"cve","cvss":"6.5","id":"CVE-2023-51385"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2023-48795"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2020-14145"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2019-6111"},{"is_exploit":"true","type":"exploitpack","cvss":"5.8","id":"EXPLOITPACK:98FE96309F9524B8C84C508837551A19"},{"is_exploit":"true","type":"exploitpack","cvss":"5.8","id":"EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97"},{"is_exploit":"true","type":"zdt","cvss":"5.8","id":"1337DAY-ID-32328"},{"is_exploit":"true","type":"zdt","cvss":"5.8","id":"1337DAY-ID-32009"},{"is_exploit":"false","type":"cve","cvss":"5.3","id":"CVE-2018-20685"},{"is_exploit":"false","type":"cve","cvss":"5.3","id":"CVE-2016-20012"},{"is_exploit":"true","type":"packetstorm","cvss":"0.0","id":"PACKETSTORM:151227"},{"is_exploit":"true","type":"packetstorm","cvss":"0.0","id":"PACKETSTORM:140261"}]}},{"service":{"name":"http","product":"nginx","id":"443","vulnerabilities":[]}},{"service":{"name":"https-alt","id":"8443","vulnerabilities":[]}}],"grade":"F"} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.