Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
DashlordBetaGouvBot committed Dec 1, 2024
1 parent abd7d76 commit 602b67e
Show file tree
Hide file tree
Showing 14 changed files with 1,145 additions and 1,134 deletions.
2 changes: 1 addition & 1 deletion results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/ecoindex.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
"ges": 1.62,
"water": 2.43,
"ecoindex_version": "5.4.2",
"date": "2024-11-24 11:41:42.034808",
"date": "2024-12-01 11:47:45.933771",
"page_type": null
}
]

Large diffs are not rendered by default.

2,093 changes: 1,052 additions & 1,041 deletions results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/lhr.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/nmapvuln.gnmap
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Nmap 7.92 scan initiated Sun Nov 24 11:47:08 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr
# Nmap 7.92 scan initiated Sun Dec 1 11:53:33 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr
Host: 51.38.43.26 (ns3120856.ip-51-38-43.eu) Status: Up
Host: 51.38.43.26 (ns3120856.ip-51-38-43.eu) Ports: 22/open/tcp//ssh//OpenSSH 7.9p1 Debian 10+deb10u4 (protocol 2.0)/, 443/open/tcp//ssl|http//nginx/, 8443/closed/tcp//https-alt/// Ignored State: filtered (997)
# Nmap done at Sun Nov 24 11:47:30 2024 -- 1 IP address (1 host up) scanned in 21.92 seconds
# Nmap done at Sun Dec 1 11:53:57 2024 -- 1 IP address (1 host up) scanned in 23.21 seconds
2 changes: 1 addition & 1 deletion results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/nmapvuln.html
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
<h1>Scan Report<br><small>Nmap 7.92</small>
</h1>
<pre style="white-space:pre-wrap; word-wrap:break-word;">nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr</pre>
<p class="lead">Sun Nov 24 11:47:08 2024 – Sun Nov 24 11:47:30 2024<br>1 hosts scanned.
<p class="lead">Sun Dec 1 11:53:33 2024 – Sun Dec 1 11:53:57 2024<br>1 hosts scanned.
1 hosts up.
0 hosts down.
</p>
Expand Down
2 changes: 1 addition & 1 deletion results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/nmapvuln.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"host":"chatbot.fabnum.fr","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"7.9p1 Debian 10+deb10u4","vulnerabilities":[{"cvss":"9.8","id":"CVE-2023-38408","type":"cve","is_exploit":"false"},{"cvss":"9.8","id":"B8190CDB-3EB9-5631-9828-8064A1575B23","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"8AD01159-548E-546E-AA87-2DE89F3927EC","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A","type":"githubexploit","is_exploit":"true"},{"cvss":"9.8","id":"0221525F-07F5-5790-912D-F4B9E2D1B587","type":"githubexploit","is_exploit":"true"},{"cvss":"7.8","id":"CVE-2020-15778","type":"cve","is_exploit":"false"},{"cvss":"7.8","id":"CVE-2019-16905","type":"cve","is_exploit":"false"},{"cvss":"7.5","id":"SSV:92579","type":"seebug","is_exploit":"true"},{"cvss":"7.5","id":"PACKETSTORM:173661","type":"packetstorm","is_exploit":"true"},{"cvss":"7.5","id":"F0979183-AE88-53B4-86CF-3AF0523F3807","type":"githubexploit","is_exploit":"true"},{"cvss":"7.5","id":"1337DAY-ID-26576","type":"zdt","is_exploit":"true"},{"cvss":"7.0","id":"CVE-2021-41617","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"EDB-ID:46516","type":"exploitdb","is_exploit":"true"},{"cvss":"6.8","id":"EDB-ID:46193","type":"exploitdb","is_exploit":"true"},{"cvss":"6.8","id":"CVE-2019-6110","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"CVE-2019-6109","type":"cve","is_exploit":"false"},{"cvss":"6.8","id":"C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3","type":"githubexploit","is_exploit":"true"},{"cvss":"6.8","id":"10213DBE-F683-58BB-B6D3-353173626207","type":"githubexploit","is_exploit":"true"},{"cvss":"6.5","id":"CVE-2023-51385","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2023-48795","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2020-14145","type":"cve","is_exploit":"false"},{"cvss":"5.9","id":"CVE-2019-6111","type":"cve","is_exploit":"false"},{"cvss":"5.8","id":"EXPLOITPACK:98FE96309F9524B8C84C508837551A19","type":"exploitpack","is_exploit":"true"},{"cvss":"5.8","id":"EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97","type":"exploitpack","is_exploit":"true"},{"cvss":"5.8","id":"1337DAY-ID-32328","type":"zdt","is_exploit":"true"},{"cvss":"5.8","id":"1337DAY-ID-32009","type":"zdt","is_exploit":"true"},{"cvss":"5.3","id":"CVE-2018-20685","type":"cve","is_exploit":"false"},{"cvss":"5.3","id":"CVE-2016-20012","type":"cve","is_exploit":"false"},{"cvss":"0.0","id":"PACKETSTORM:151227","type":"packetstorm","is_exploit":"true"},{"cvss":"0.0","id":"PACKETSTORM:140261","type":"packetstorm","is_exploit":"true"}]}},{"service":{"name":"http","product":"nginx","id":"443","vulnerabilities":[]}},{"service":{"name":"https-alt","id":"8443","vulnerabilities":[]}}],"grade":"F"}
{"host":"chatbot.fabnum.fr","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"7.9p1 Debian 10+deb10u4","vulnerabilities":[{"is_exploit":"false","type":"cve","cvss":"9.8","id":"CVE-2023-38408"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"B8190CDB-3EB9-5631-9828-8064A1575B23"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"8AD01159-548E-546E-AA87-2DE89F3927EC"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A"},{"is_exploit":"true","type":"githubexploit","cvss":"9.8","id":"0221525F-07F5-5790-912D-F4B9E2D1B587"},{"is_exploit":"false","type":"cve","cvss":"7.8","id":"CVE-2020-15778"},{"is_exploit":"false","type":"cve","cvss":"7.8","id":"CVE-2019-16905"},{"is_exploit":"true","type":"seebug","cvss":"7.5","id":"SSV:92579"},{"is_exploit":"true","type":"packetstorm","cvss":"7.5","id":"PACKETSTORM:173661"},{"is_exploit":"true","type":"githubexploit","cvss":"7.5","id":"F0979183-AE88-53B4-86CF-3AF0523F3807"},{"is_exploit":"true","type":"zdt","cvss":"7.5","id":"1337DAY-ID-26576"},{"is_exploit":"false","type":"cve","cvss":"7.0","id":"CVE-2021-41617"},{"is_exploit":"true","type":"exploitdb","cvss":"6.8","id":"EDB-ID:46516"},{"is_exploit":"true","type":"exploitdb","cvss":"6.8","id":"EDB-ID:46193"},{"is_exploit":"false","type":"cve","cvss":"6.8","id":"CVE-2019-6110"},{"is_exploit":"false","type":"cve","cvss":"6.8","id":"CVE-2019-6109"},{"is_exploit":"true","type":"githubexploit","cvss":"6.8","id":"C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3"},{"is_exploit":"true","type":"githubexploit","cvss":"6.8","id":"10213DBE-F683-58BB-B6D3-353173626207"},{"is_exploit":"false","type":"cve","cvss":"6.5","id":"CVE-2023-51385"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2023-48795"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2020-14145"},{"is_exploit":"false","type":"cve","cvss":"5.9","id":"CVE-2019-6111"},{"is_exploit":"true","type":"exploitpack","cvss":"5.8","id":"EXPLOITPACK:98FE96309F9524B8C84C508837551A19"},{"is_exploit":"true","type":"exploitpack","cvss":"5.8","id":"EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97"},{"is_exploit":"true","type":"zdt","cvss":"5.8","id":"1337DAY-ID-32328"},{"is_exploit":"true","type":"zdt","cvss":"5.8","id":"1337DAY-ID-32009"},{"is_exploit":"false","type":"cve","cvss":"5.3","id":"CVE-2018-20685"},{"is_exploit":"false","type":"cve","cvss":"5.3","id":"CVE-2016-20012"},{"is_exploit":"true","type":"packetstorm","cvss":"0.0","id":"PACKETSTORM:151227"},{"is_exploit":"true","type":"packetstorm","cvss":"0.0","id":"PACKETSTORM:140261"}]}},{"service":{"name":"http","product":"nginx","id":"443","vulnerabilities":[]}},{"service":{"name":"https-alt","id":"8443","vulnerabilities":[]}}],"grade":"F"}
6 changes: 3 additions & 3 deletions results/aHR0cHM6Ly9jaGF0Ym90LmZhYm51bS5mci8=/nmapvuln.nmap
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Nmap 7.92 scan initiated Sun Nov 24 11:47:08 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr
# Nmap 7.92 scan initiated Sun Dec 1 11:53:33 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln chatbot.fabnum.fr
Nmap scan report for chatbot.fabnum.fr (51.38.43.26)
Host is up (0.086s latency).
Host is up (0.10s latency).
rDNS record for 51.38.43.26: ns3120856.ip-51-38-43.eu
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
Expand Down Expand Up @@ -43,4 +43,4 @@ PORT STATE SERVICE VERSION
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Nov 24 11:47:30 2024 -- 1 IP address (1 host up) scanned in 21.92 seconds
# Nmap done at Sun Dec 1 11:53:57 2024 -- 1 IP address (1 host up) scanned in 23.21 seconds
Loading

0 comments on commit 602b67e

Please sign in to comment.