nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln ada.beta.gouv.fr
Sun Aug 24 13:52:29 2025 – Sun Aug 24 13:52:53 2025
1 hosts scanned.
1 hosts up.
0 hosts down.
State | Address | Hostname | TCP (open) | UDP (open) |
---|---|---|---|---|
up | 51.38.223.168 | ada.beta.gouv.fr | 7 | 0 |
Port | Protocol | State Reason |
Service | Product | Version | Extra Info |
---|---|---|---|---|---|---|
21 | tcp | open syn-ack |
ftp | vsftpd | 3.0.3 | |
cpe:/a:vsftpd:vsftpd:3.0.3vulnersvsftpd 3.0.3: CVE-2021-30047 7.5 https://vulners.com/cve/CVE-2021-30047 CVE-2021-3618 7.4 https://vulners.com/cve/CVE-2021-3618 | ||||||
22 | tcp | open syn-ack |
ssh | OpenSSH | 9.2p1 Debian 2+deb12u3 | protocol 2.0 |
cpe:/a:openbsd:openssh:9.2p1vulnerscpe:/a:openbsd:openssh:9.2p1: PACKETSTORM:179290 10.0 https://vulners.com/packetstorm/PACKETSTORM:179290 *EXPLOIT* FF02A46B-33EF-5995-B22B-451D42342473 10.0 https://vulners.com/githubexploit/FF02A46B-33EF-5995-B22B-451D42342473 *EXPLOIT* 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0 https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A *EXPLOIT* 5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A 10.0 https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A *EXPLOIT* 56F97BB2-3DF6-5588-82AF-1D7B77F9AD45 10.0 https://vulners.com/githubexploit/56F97BB2-3DF6-5588-82AF-1D7B77F9AD45 *EXPLOIT* 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0 https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT* PACKETSTORM:173661 9.8 https://vulners.com/packetstorm/PACKETSTORM:173661 *EXPLOIT* F0979183-AE88-53B4-86CF-3AF0523F3807 9.8 https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807 *EXPLOIT* D8974199-6B08-5895-9610-919F71468F23 9.8 https://vulners.com/githubexploit/D8974199-6B08-5895-9610-919F71468F23 *EXPLOIT* CVE-2023-38408 9.8 https://vulners.com/cve/CVE-2023-38408 CVE-2023-28531 9.8 https://vulners.com/cve/CVE-2023-28531 B8190CDB-3EB9-5631-9828-8064A1575B23 9.8 https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23 *EXPLOIT* 8FC9C5AB-3968-5F3C-825E-E8DB5379A623 9.8 https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623 *EXPLOIT* 8AD01159-548E-546E-AA87-2DE89F3927EC 9.8 https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC *EXPLOIT* 33D623F7-98E0-5F75-80FA-81AA666D1340 9.8 https://vulners.com/githubexploit/33D623F7-98E0-5F75-80FA-81AA666D1340 *EXPLOIT* 300BA7A0-656D-5F24-B7BB-79D03F2DFA40 9.8 https://vulners.com/githubexploit/300BA7A0-656D-5F24-B7BB-79D03F2DFA40 *EXPLOIT* 2227729D-6700-5C8F-8930-1EEAFD4B9FF0 9.8 https://vulners.com/githubexploit/2227729D-6700-5C8F-8930-1EEAFD4B9FF0 *EXPLOIT* 0221525F-07F5-5790-912D-F4B9E2D1B587 9.8 https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587 *EXPLOIT* F8981437-1287-5B69-93F1-657DFB1DCE59 9.3 https://vulners.com/githubexploit/F8981437-1287-5B69-93F1-657DFB1DCE59 *EXPLOIT* E543E274-C20A-582A-8F8E-F8E3F381C345 9.3 https://vulners.com/githubexploit/E543E274-C20A-582A-8F8E-F8E3F381C345 *EXPLOIT* CB2926E1-2355-5C82-A42A-D4F72F114F9B 9.3 https://vulners.com/githubexploit/CB2926E1-2355-5C82-A42A-D4F72F114F9B *EXPLOIT* B68BF1DF-3BF0-504B-A459-B388E3935535 9.3 https://vulners.com/githubexploit/B68BF1DF-3BF0-504B-A459-B388E3935535 *EXPLOIT* 8DEE261C-33D4-5057-BA46-E4293B705BAE 9.3 https://vulners.com/githubexploit/8DEE261C-33D4-5057-BA46-E4293B705BAE *EXPLOIT* 6FD8F914-B663-533D-8866-23313FD37804 9.3 https://vulners.com/githubexploit/6FD8F914-B663-533D-8866-23313FD37804 *EXPLOIT* PACKETSTORM:190587 8.1 https://vulners.com/packetstorm/PACKETSTORM:190587 *EXPLOIT* FB2E9ED1-43D7-585C-A197-0D6628B20134 8.1 https://vulners.com/githubexploit/FB2E9ED1-43D7-585C-A197-0D6628B20134 *EXPLOIT* FA3992CE-9C4C-5350-8134-177126E0BD3F 8.1 https://vulners.com/githubexploit/FA3992CE-9C4C-5350-8134-177126E0BD3F *EXPLOIT* EFD615F0-8F17-5471-AA83-0F491FD497AF 8.1 https://vulners.com/githubexploit/EFD615F0-8F17-5471-AA83-0F491FD497AF *EXPLOIT* EC2F513A-33F5-5ED2-B639-E15D800D773B 8.1 https://vulners.com/githubexploit/EC2F513A-33F5-5ED2-B639-E15D800D773B *EXPLOIT* EC20B9C2-6857-5848-848A-A9F430D13EEB 8.1 https://vulners.com/githubexploit/EC20B9C2-6857-5848-848A-A9F430D13EEB *EXPLOIT* EB13CBD6-BC93-5F14-A210-AC0B5A1D8572 8.1 https://vulners.com/githubexploit/EB13CBD6-BC93-5F14-A210-AC0B5A1D8572 *EXPLOIT* E660E1AF-7A87-57E2-AEEF-CA14E1FEF7CD 8.1 https://vulners.com/githubexploit/E660E1AF-7A87-57E2-AEEF-CA14E1FEF7CD *EXPLOIT* E34FCCEC-226E-5A46-9B1C-BCD6EF7D3257 8.1 https://vulners.com/githubexploit/E34FCCEC-226E-5A46-9B1C-BCD6EF7D3257 *EXPLOIT* E24EEC0A-40F7-5BBC-9E4D-7B13522FF915 8.1 https://vulners.com/githubexploit/E24EEC0A-40F7-5BBC-9E4D-7B13522FF915 *EXPLOIT* DC1BB99A-8B57-5EE5-9AC4-3D9D59BFC346 8.1 https://vulners.com/githubexploit/DC1BB99A-8B57-5EE5-9AC4-3D9D59BFC346 *EXPLOIT* DA18D761-BB81-54B6-85CB-CFD73CE33621 8.1 https://vulners.com/githubexploit/DA18D761-BB81-54B6-85CB-CFD73CE33621 *EXPLOIT* D572250A-BE94-501D-90C4-14A6C9C0AC47 8.1 https://vulners.com/githubexploit/D572250A-BE94-501D-90C4-14A6C9C0AC47 *EXPLOIT* D1E049F1-393E-552D-80D1-675022B26911 8.1 https://vulners.com/githubexploit/D1E049F1-393E-552D-80D1-675022B26911 *EXPLOIT* CVE-2024-6387 8.1 https://vulners.com/cve/CVE-2024-6387 C6FB6D50-F71D-5870-B671-D6A09A95627F 8.1 https://vulners.com/githubexploit/C6FB6D50-F71D-5870-B671-D6A09A95627F *EXPLOIT* C623D558-C162-5D17-88A5-4799A2BEC001 8.1 https://vulners.com/githubexploit/C623D558-C162-5D17-88A5-4799A2BEC001 *EXPLOIT* C5B2D4A1-8C3B-5FF7-B620-EDE207B027A0 8.1 https://vulners.com/githubexploit/C5B2D4A1-8C3B-5FF7-B620-EDE207B027A0 *EXPLOIT* C185263E-3E67-5550-B9C0-AB9C15351960 8.1 https://vulners.com/githubexploit/C185263E-3E67-5550-B9C0-AB9C15351960 *EXPLOIT* BDA609DA-6936-50DC-A325-19FE2CC68562 8.1 https://vulners.com/githubexploit/BDA609DA-6936-50DC-A325-19FE2CC68562 *EXPLOIT* B1F444E0-F217-5FC0-B266-EBD48589940F 8.1 https://vulners.com/githubexploit/B1F444E0-F217-5FC0-B266-EBD48589940F *EXPLOIT* A801235B-9835-5BA8-B8FE-23B7FFCABD66 8.1 https://vulners.com/githubexploit/A801235B-9835-5BA8-B8FE-23B7FFCABD66 *EXPLOIT* 92254168-3B26-54C9-B9BE-B4B7563586B5 8.1 https://vulners.com/githubexploit/92254168-3B26-54C9-B9BE-B4B7563586B5 *EXPLOIT* 91752937-D1C1-5913-A96F-72F8B8AB4280 8.1 https://vulners.com/githubexploit/91752937-D1C1-5913-A96F-72F8B8AB4280 *EXPLOIT* 906CD901-3758-5F2C-8FA6-386BF9378AB3 8.1 https://vulners.com/githubexploit/906CD901-3758-5F2C-8FA6-386BF9378AB3 *EXPLOIT* 81F0C05A-8650-5DE8-97E9-0D89F1807E5D 8.1 https://vulners.com/githubexploit/81F0C05A-8650-5DE8-97E9-0D89F1807E5D *EXPLOIT* 7C7167AF-E780-5506-BEFA-02E5362E8E48 8.1 https://vulners.com/githubexploit/7C7167AF-E780-5506-BEFA-02E5362E8E48 *EXPLOIT* 7AA8980D-D89F-57EB-BFD1-18ED3AB1A7DD 8.1 https://vulners.com/githubexploit/7AA8980D-D89F-57EB-BFD1-18ED3AB1A7DD *EXPLOIT* 79FE1ED7-EB3D-5978-A12E-AAB1FFECCCAC 8.1 https://vulners.com/githubexploit/79FE1ED7-EB3D-5978-A12E-AAB1FFECCCAC *EXPLOIT* 795762E3-BAB4-54C6-B677-83B0ACC2B163 8.1 https://vulners.com/githubexploit/795762E3-BAB4-54C6-B677-83B0ACC2B163 *EXPLOIT* 77DAD6A9-8142-5591-8605-C5DADE4EE744 8.1 https://vulners.com/githubexploit/77DAD6A9-8142-5591-8605-C5DADE4EE744 *EXPLOIT* 774022BB-71DA-57C4-9B8F-E21D667DE4BC 8.1 https://vulners.com/githubexploit/774022BB-71DA-57C4-9B8F-E21D667DE4BC *EXPLOIT* 743E5025-3BB8-5EC4-AC44-2AA679730661 8.1 https://vulners.com/githubexploit/743E5025-3BB8-5EC4-AC44-2AA679730661 *EXPLOIT* 73A19EF9-346D-5B2B-9792-05D9FE3414E2 8.1 https://vulners.com/githubexploit/73A19EF9-346D-5B2B-9792-05D9FE3414E2 *EXPLOIT* 6E81EAE5-2156-5ACB-9046-D792C7FAF698 8.1 https://vulners.com/githubexploit/6E81EAE5-2156-5ACB-9046-D792C7FAF698 *EXPLOIT* 6B78D204-22B0-5D11-8A0C-6313958B473F 8.1 https://vulners.com/githubexploit/6B78D204-22B0-5D11-8A0C-6313958B473F *EXPLOIT* 65650BAD-813A-565D-953D-2E7932B26094 8.1 https://vulners.com/githubexploit/65650BAD-813A-565D-953D-2E7932B26094 *EXPLOIT* 649197A2-0224-5B5C-9C4E-B5791D42A9FB 8.1 https://vulners.com/githubexploit/649197A2-0224-5B5C-9C4E-B5791D42A9FB *EXPLOIT* 61DDEEE4-2146-5E84-9804-B780AA73E33C 8.1 https://vulners.com/githubexploit/61DDEEE4-2146-5E84-9804-B780AA73E33C *EXPLOIT* 608FA50C-AEA1-5A83-8297-A15FC7D32A7C 8.1 https://vulners.com/githubexploit/608FA50C-AEA1-5A83-8297-A15FC7D32A7C *EXPLOIT* 5D2CB1F8-DC04-5545-8BC7-29EE3DA8890E 8.1 https://vulners.com/githubexploit/5D2CB1F8-DC04-5545-8BC7-29EE3DA8890E *EXPLOIT* 5C81C5C1-22D4-55B3-B843-5A9A60AAB6FD 8.1 https://vulners.com/githubexploit/5C81C5C1-22D4-55B3-B843-5A9A60AAB6FD *EXPLOIT* 53BCD84F-BD22-5C9D-95B6-4B83627AB37F 8.1 https://vulners.com/githubexploit/53BCD84F-BD22-5C9D-95B6-4B83627AB37F *EXPLOIT* 4FB01B00-F993-5CAF-BD57-D7E290D10C1F 8.1 https://vulners.com/githubexploit/4FB01B00-F993-5CAF-BD57-D7E290D10C1F *EXPLOIT* 4748B283-C2F6-5924-8241-342F98EEC2EE 8.1 https://vulners.com/githubexploit/4748B283-C2F6-5924-8241-342F98EEC2EE *EXPLOIT* 452ADB71-199C-561E-B949-FCDE6288B925 8.1 https://vulners.com/githubexploit/452ADB71-199C-561E-B949-FCDE6288B925 *EXPLOIT* 331B2B7F-FB25-55DB-B7A4-602E42448DB7 8.1 https://vulners.com/githubexploit/331B2B7F-FB25-55DB-B7A4-602E42448DB7 *EXPLOIT* 31CC906F-9328-5944-B370-FBD98DF0DDD3 8.1 https://vulners.com/githubexploit/31CC906F-9328-5944-B370-FBD98DF0DDD3 *EXPLOIT* 312165E3-7FD9-5769-BDA3-4129BE9114D6 8.1 https://vulners.com/githubexploit/312165E3-7FD9-5769-BDA3-4129BE9114D6 *EXPLOIT* 1FFDA397-F480-5C74-90F3-060E1FE11B2E 8.1 https://vulners.com/githubexploit/1FFDA397-F480-5C74-90F3-060E1FE11B2E *EXPLOIT* 1F7A6000-9E6D-511C-B0F6-7CADB7200761 8.1 https://vulners.com/githubexploit/1F7A6000-9E6D-511C-B0F6-7CADB7200761 *EXPLOIT* 1CF00BB8-B891-5347-A2DC-2C6A6BFF7C99 8.1 https://vulners.com/githubexploit/1CF00BB8-B891-5347-A2DC-2C6A6BFF7C99 *EXPLOIT* 179F72B6-5619-52B5-A040-72F1ECE6CDD8 8.1 https://vulners.com/githubexploit/179F72B6-5619-52B5-A040-72F1ECE6CDD8 *EXPLOIT* 15C36683-070A-5CC1-B21F-5F0BF974D9D3 8.1 https://vulners.com/githubexploit/15C36683-070A-5CC1-B21F-5F0BF974D9D3 *EXPLOIT* 1337DAY-ID-39674 8.1 https://vulners.com/zdt/1337DAY-ID-39674 *EXPLOIT* 123C2683-74BE-5320-AA3A-C376C8E3A992 8.1 https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992 *EXPLOIT* 11F020AC-F907-5606-8805-0516E06160EE 8.1 https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE *EXPLOIT* 108E1D25-1F7E-534C-97CD-3F6045E32B98 8.1 https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98 *EXPLOIT* 0FC4BE81-312B-51F4-9D9B-66D8B5C093CD 8.1 https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD *EXPLOIT* 0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180 8.1 https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180 *EXPLOIT* 0B165049-2374-5E2A-A27C-008BEA3D13F7 8.1 https://vulners.com/githubexploit/0B165049-2374-5E2A-A27C-008BEA3D13F7 *EXPLOIT* 23CC97BE-7C95-513B-9E73-298C48D74432 7.8 https://vulners.com/githubexploit/23CC97BE-7C95-513B-9E73-298C48D74432 *EXPLOIT* SSV:92579 7.5 https://vulners.com/seebug/SSV:92579 *EXPLOIT* 1337DAY-ID-26576 7.5 https://vulners.com/zdt/1337DAY-ID-26576 *EXPLOIT* PACKETSTORM:189283 6.8 https://vulners.com/packetstorm/PACKETSTORM:189283 *EXPLOIT* CVE-2025-26465 6.8 https://vulners.com/cve/CVE-2025-26465 9D8432B9-49EC-5F45-BB96-329B1F2B2254 6.8 https://vulners.com/githubexploit/9D8432B9-49EC-5F45-BB96-329B1F2B2254 *EXPLOIT* 1337DAY-ID-39918 6.8 https://vulners.com/zdt/1337DAY-ID-39918 *EXPLOIT* CVE-2023-51385 6.5 https://vulners.com/cve/CVE-2023-51385 C07ADB46-24B8-57B7-B375-9C761F4750A2 6.5 https://vulners.com/githubexploit/C07ADB46-24B8-57B7-B375-9C761F4750A2 *EXPLOIT* 530326CF-6AB3-5643-AA16-73DC8CB44742 6.5 https://vulners.com/githubexploit/530326CF-6AB3-5643-AA16-73DC8CB44742 *EXPLOIT* E9EC0911-E2E1-52A7-B2F4-D0065C6A3057 5.9 https://vulners.com/githubexploit/E9EC0911-E2E1-52A7-B2F4-D0065C6A3057 *EXPLOIT* CVE-2023-48795 5.9 https://vulners.com/cve/CVE-2023-48795 CE606E2D-D0A5-5DE8-8A61-E7AB65789A99 5.9 https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99 *EXPLOIT* A9E6F50E-E7FC-51D0-9C93-A43461469FA2 5.9 https://vulners.com/githubexploit/A9E6F50E-E7FC-51D0-9C93-A43461469FA2 *EXPLOIT* A02ABE85-E4E3-5852-A59D-DF288CB8160A 5.9 https://vulners.com/githubexploit/A02ABE85-E4E3-5852-A59D-DF288CB8160A *EXPLOIT* FD18B68B-C0A6-562E-A8C8-781B225F15B0 5.5 https://vulners.com/githubexploit/FD18B68B-C0A6-562E-A8C8-781B225F15B0 *EXPLOIT* CVE-2023-51384 5.5 https://vulners.com/cve/CVE-2023-51384 27CD5F73-33CC-520E-8D5F-EC17128E5153 5.5 https://vulners.com/githubexploit/27CD5F73-33CC-520E-8D5F-EC17128E5153 *EXPLOIT* PACKETSTORM:140261 0.0 https://vulners.com/packetstorm/PACKETSTORM:140261 *EXPLOIT* 5C971D4B-2DD3-5894-9EC2-DAB952B4740D 0.0 https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D *EXPLOIT* 39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118 0.0 https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118 *EXPLOIT* | ||||||
80 | tcp | open syn-ack |
http | nginx | 1.22.1 | |
cpe:/a:igor_sysoev:nginx:1.22.1http-server-headernginx/1.22.1 vulnersnginx 1.22.1: FF02A46B-33EF-5995-B22B-451D42342473 10.0 https://vulners.com/githubexploit/FF02A46B-33EF-5995-B22B-451D42342473 *EXPLOIT* 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0 https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A *EXPLOIT* 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0 https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT* 3F71F065-66D4-541F-A813-9F1A2F2B1D91 8.8 https://vulners.com/githubexploit/3F71F065-66D4-541F-A813-9F1A2F2B1D91 *EXPLOIT* NGINX:CVE-2022-41741 7.8 https://vulners.com/nginx/NGINX:CVE-2022-41741 DF041B2B-2DA7-5262-AABE-9EBD2D535041 7.8 https://vulners.com/githubexploit/DF041B2B-2DA7-5262-AABE-9EBD2D535041 *EXPLOIT* F7F6E599-CEF4-5E03-8E10-FE18C4101E38 7.5 https://vulners.com/githubexploit/F7F6E599-CEF4-5E03-8E10-FE18C4101E38 *EXPLOIT* E73E445F-0A0D-5966-8A21-C74FE9C0D2BC 7.5 https://vulners.com/githubexploit/E73E445F-0A0D-5966-8A21-C74FE9C0D2BC *EXPLOIT* E5C174E5-D6E8-56E0-8403-D287DE52EB3F 7.5 https://vulners.com/githubexploit/E5C174E5-D6E8-56E0-8403-D287DE52EB3F *EXPLOIT* DB6E1BBD-08B1-574D-A351-7D6BB9898A4A 7.5 https://vulners.com/githubexploit/DB6E1BBD-08B1-574D-A351-7D6BB9898A4A *EXPLOIT* D228B59B-465A-509D-A681-012DB9348698 7.5 https://vulners.com/githubexploit/D228B59B-465A-509D-A681-012DB9348698 *EXPLOIT* CVE-2023-44487 7.5 https://vulners.com/cve/CVE-2023-44487 C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B 7.5 https://vulners.com/githubexploit/C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B *EXPLOIT* B0208442-6E17-5772-B12D-B5BE30FA5540 7.5 https://vulners.com/githubexploit/B0208442-6E17-5772-B12D-B5BE30FA5540 *EXPLOIT* A6687F08-B033-5AE7-84F5-DE799491DA2F 7.5 https://vulners.com/githubexploit/A6687F08-B033-5AE7-84F5-DE799491DA2F *EXPLOIT* A66531EB-3C47-5C56-B8A6-E04B54E9D656 7.5 https://vulners.com/githubexploit/A66531EB-3C47-5C56-B8A6-E04B54E9D656 *EXPLOIT* 9814661A-35A4-5DB7-BB25-A1040F365C81 7.5 https://vulners.com/githubexploit/9814661A-35A4-5DB7-BB25-A1040F365C81 *EXPLOIT* 40879618-C556-547C-8769-9E63E83D0B55 7.5 https://vulners.com/githubexploit/40879618-C556-547C-8769-9E63E83D0B55 *EXPLOIT* 2B5C72D6-EBB1-50D1-96F2-479D79DFAB94 7.5 https://vulners.com/githubexploit/2B5C72D6-EBB1-50D1-96F2-479D79DFAB94 *EXPLOIT* 1F6E0709-DA03-564E-925F-3177657C053E 7.5 https://vulners.com/githubexploit/1F6E0709-DA03-564E-925F-3177657C053E *EXPLOIT* 135C45BD-4652-5EEE-8890-2D3C62709016 7.5 https://vulners.com/githubexploit/135C45BD-4652-5EEE-8890-2D3C62709016 *EXPLOIT* NGINX:CVE-2022-41742 7.1 https://vulners.com/nginx/NGINX:CVE-2022-41742 NGINX:CVE-2025-53859 6.3 https://vulners.com/nginx/NGINX:CVE-2025-53859 NGINX:CVE-2024-7347 5.7 https://vulners.com/nginx/NGINX:CVE-2024-7347 NGINX:CVE-2025-23419 5.3 https://vulners.com/nginx/NGINX:CVE-2025-23419 | ||||||
443 | tcp | open syn-ack |
http | nginx | 1.22.1 | |
cpe:/a:igor_sysoev:nginx:1.22.1vulnersnginx 1.22.1: FF02A46B-33EF-5995-B22B-451D42342473 10.0 https://vulners.com/githubexploit/FF02A46B-33EF-5995-B22B-451D42342473 *EXPLOIT* 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0 https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A *EXPLOIT* 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0 https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT* 3F71F065-66D4-541F-A813-9F1A2F2B1D91 8.8 https://vulners.com/githubexploit/3F71F065-66D4-541F-A813-9F1A2F2B1D91 *EXPLOIT* NGINX:CVE-2022-41741 7.8 https://vulners.com/nginx/NGINX:CVE-2022-41741 DF041B2B-2DA7-5262-AABE-9EBD2D535041 7.8 https://vulners.com/githubexploit/DF041B2B-2DA7-5262-AABE-9EBD2D535041 *EXPLOIT* F7F6E599-CEF4-5E03-8E10-FE18C4101E38 7.5 https://vulners.com/githubexploit/F7F6E599-CEF4-5E03-8E10-FE18C4101E38 *EXPLOIT* E73E445F-0A0D-5966-8A21-C74FE9C0D2BC 7.5 https://vulners.com/githubexploit/E73E445F-0A0D-5966-8A21-C74FE9C0D2BC *EXPLOIT* E5C174E5-D6E8-56E0-8403-D287DE52EB3F 7.5 https://vulners.com/githubexploit/E5C174E5-D6E8-56E0-8403-D287DE52EB3F *EXPLOIT* DB6E1BBD-08B1-574D-A351-7D6BB9898A4A 7.5 https://vulners.com/githubexploit/DB6E1BBD-08B1-574D-A351-7D6BB9898A4A *EXPLOIT* D228B59B-465A-509D-A681-012DB9348698 7.5 https://vulners.com/githubexploit/D228B59B-465A-509D-A681-012DB9348698 *EXPLOIT* CVE-2023-44487 7.5 https://vulners.com/cve/CVE-2023-44487 C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B 7.5 https://vulners.com/githubexploit/C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B *EXPLOIT* B0208442-6E17-5772-B12D-B5BE30FA5540 7.5 https://vulners.com/githubexploit/B0208442-6E17-5772-B12D-B5BE30FA5540 *EXPLOIT* A6687F08-B033-5AE7-84F5-DE799491DA2F 7.5 https://vulners.com/githubexploit/A6687F08-B033-5AE7-84F5-DE799491DA2F *EXPLOIT* A66531EB-3C47-5C56-B8A6-E04B54E9D656 7.5 https://vulners.com/githubexploit/A66531EB-3C47-5C56-B8A6-E04B54E9D656 *EXPLOIT* 9814661A-35A4-5DB7-BB25-A1040F365C81 7.5 https://vulners.com/githubexploit/9814661A-35A4-5DB7-BB25-A1040F365C81 *EXPLOIT* 40879618-C556-547C-8769-9E63E83D0B55 7.5 https://vulners.com/githubexploit/40879618-C556-547C-8769-9E63E83D0B55 *EXPLOIT* 2B5C72D6-EBB1-50D1-96F2-479D79DFAB94 7.5 https://vulners.com/githubexploit/2B5C72D6-EBB1-50D1-96F2-479D79DFAB94 *EXPLOIT* 1F6E0709-DA03-564E-925F-3177657C053E 7.5 https://vulners.com/githubexploit/1F6E0709-DA03-564E-925F-3177657C053E *EXPLOIT* 135C45BD-4652-5EEE-8890-2D3C62709016 7.5 https://vulners.com/githubexploit/135C45BD-4652-5EEE-8890-2D3C62709016 *EXPLOIT* NGINX:CVE-2022-41742 7.1 https://vulners.com/nginx/NGINX:CVE-2022-41742 NGINX:CVE-2025-53859 6.3 https://vulners.com/nginx/NGINX:CVE-2025-53859 NGINX:CVE-2024-7347 5.7 https://vulners.com/nginx/NGINX:CVE-2024-7347 NGINX:CVE-2025-23419 5.3 https://vulners.com/nginx/NGINX:CVE-2025-23419 http-server-headernginx/1.22.1 | ||||||
5432 | tcp | open syn-ack |
postgresql | PostgreSQL DB | 9.6.0 or later | |
cpe:/a:postgresql:postgresqlfingerprint-stringsSMBProgNeg: SFATAL VFATAL C0A000 Munsupported frontend protocol 65363.19778: server supports 3.0 to 3.0 Fpostmaster.c L2198 RProcessStartupPacket | ||||||
8000 | tcp | open syn-ack |
http-alt | uvicorn | ||
fingerprint-stringsFourOhFourRequest: HTTP/1.1 405 Method Not Allowed date: Sun, 24 Aug 2025 13:52:45 GMT server: uvicorn allow: OPTIONS content-length: 31 content-type: application/json access-control-allow-origin: * access-control-allow-credentials: true access-control-allow-methods: * access-control-allow-headers: * {"detail":"Method Not Allowed"} GetRequest: HTTP/1.1 200 OK date: Sun, 24 Aug 2025 13:52:44 GMT server: uvicorn content-length: 39 content-type: application/json access-control-allow-origin: * access-control-allow-credentials: true access-control-allow-methods: * access-control-allow-headers: * {"message":"Welcome to Science Infuse"} HTTPOptions: HTTP/1.1 200 OK date: Sun, 24 Aug 2025 13:52:45 GMT server: uvicorn access-control-allow-origin: * access-control-allow-methods: * access-control-allow-headers: * content-length: 16 content-type: application/json access-control-allow-credentials: true {"message":"OK"} Socks4, Socks5: HTTP/1.1 400 Bad Request date: Sun, 24 Aug 2025 13:52:45 GMT server: uvicorn content-type: text/plain; charset=utf-8 content-length: 30 connection: close Invalid HTTP request received. X11Probe: HTTP/1.1 400 Bad Request date: Sun, 24 Aug 2025 13:52:44 GMT server: uvicorn content-type: text/plain; charset=utf-8 content-length: 30 connection: close Invalid HTTP request received. http-server-headeruvicorn | ||||||
8002 | tcp | open syn-ack |
teradataordbms | |||
fingerprint-stringsFourOhFourRequest: HTTP/1.1 404 Not Found Cache-Control: no-cache, no-store, max-age=0, must-revalidate Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Accept-Encoding X-Powered-By: Next.js Content-Type: text/html; charset=utf-8 Date: Sun, 24 Aug 2025 13:52:40 GMT Connection: close <!DOCTYPE html><html lang="fr" data-fr-scheme="light" data-fr-theme="light"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/51842a4e81768731.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/3093abb70396b176.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-4103db72e6cfa704.js"/><script src="/_next/static/chunks/fd9d1056-0042fe983b3d5500.js" async=""></script><script src="/_next/static/chunks/7023-8a61b3d56e7fa951.js" async=" GetRequest: HTTP/1.1 200 OK Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Accept-Encoding X-Powered-By: Next.js Cache-Control: private, no-cache, no-store, max-age=0, must-revalidate Content-Type: text/html; charset=utf-8 Date: Sun, 24 Aug 2025 13:52:40 GMT Connection: close <!DOCTYPE html><html lang="fr" data-fr-scheme="light" data-fr-theme="light"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/51842a4e81768731.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/3093abb70396b176.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/81677adad2a0172a.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-4103db72e6cfa704.js"/><script src="/_next/static/chunks/fd9d1056-0042fe983b3 | ||||||
8007 | tcp | filtered no-response |
ajp12 |
Address | Port | Protocol | Service | Product | Version | CPE | Extra info |
---|---|---|---|---|---|---|---|
51.38.223.168 - ada.beta.gouv.fr | 21 | tcp | ftp | vsftpd | 3.0.3 | cpe:/a:vsftpd:vsftpd:3.0.3 | |
51.38.223.168 - ada.beta.gouv.fr | 22 | tcp | ssh | OpenSSH | 9.2p1 Debian 2+deb12u3 | cpe:/a:openbsd:openssh:9.2p1 | protocol 2.0 |
51.38.223.168 - ada.beta.gouv.fr | 80 | tcp | http | nginx | 1.22.1 | cpe:/a:igor_sysoev:nginx:1.22.1 | |
51.38.223.168 - ada.beta.gouv.fr | 443 | tcp | http | nginx | 1.22.1 | cpe:/a:igor_sysoev:nginx:1.22.1 | |
51.38.223.168 - ada.beta.gouv.fr | 5432 | tcp | postgresql | PostgreSQL DB | 9.6.0 or later | cpe:/a:postgresql:postgresql | |
51.38.223.168 - ada.beta.gouv.fr | 8000 | tcp | http-alt | uvicorn | |||
51.38.223.168 - ada.beta.gouv.fr | 8002 | tcp | teradataordbms |