nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln disinfo.quaidorsay.fr
Sun Mar 30 11:03:10 2025 – Sun Mar 30 11:03:26 2025
1 hosts scanned.
1 hosts up.
0 hosts down.
State | Address | Hostname | TCP (open) | UDP (open) |
---|---|---|---|---|
up | 198.244.157.26 | disinfo.quaidorsay.fr | 4 | 0 |
Port | Protocol | State Reason |
Service | Product | Version | Extra Info |
---|---|---|---|---|---|---|
22 | tcp | open syn-ack |
ssh | OpenSSH | 8.4p1 Debian 5+deb11u4 | protocol 2.0 |
cpe:/a:openbsd:openssh:8.4p1vulnerscpe:/a:openbsd:openssh:8.4p1: CVE-2023-38408 9.8 https://vulners.com/cve/CVE-2023-38408 B8190CDB-3EB9-5631-9828-8064A1575B23 9.8 https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23 *EXPLOIT* 8FC9C5AB-3968-5F3C-825E-E8DB5379A623 9.8 https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623 *EXPLOIT* 8AD01159-548E-546E-AA87-2DE89F3927EC 9.8 https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC *EXPLOIT* 5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A 9.8 https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A *EXPLOIT* 0221525F-07F5-5790-912D-F4B9E2D1B587 9.8 https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587 *EXPLOIT* SSV:92579 7.5 https://vulners.com/seebug/SSV:92579 *EXPLOIT* PACKETSTORM:173661 7.5 https://vulners.com/packetstorm/PACKETSTORM:173661 *EXPLOIT* F0979183-AE88-53B4-86CF-3AF0523F3807 7.5 https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807 *EXPLOIT* 1337DAY-ID-26576 7.5 https://vulners.com/zdt/1337DAY-ID-26576 *EXPLOIT* CVE-2021-28041 7.1 https://vulners.com/cve/CVE-2021-28041 CVE-2021-41617 7.0 https://vulners.com/cve/CVE-2021-41617 PACKETSTORM:189283 6.8 https://vulners.com/packetstorm/PACKETSTORM:189283 *EXPLOIT* F79E574D-30C8-5C52-A801-66FFA0610BAA 6.8 https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA *EXPLOIT* CVE-2025-26465 6.8 https://vulners.com/cve/CVE-2025-26465 1337DAY-ID-39918 6.8 https://vulners.com/zdt/1337DAY-ID-39918 *EXPLOIT* CVE-2023-51385 6.5 https://vulners.com/cve/CVE-2023-51385 CVE-2023-48795 5.9 https://vulners.com/cve/CVE-2023-48795 CVE-2020-14145 5.9 https://vulners.com/cve/CVE-2020-14145 54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C 5.9 https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C *EXPLOIT* CVE-2016-20012 5.3 https://vulners.com/cve/CVE-2016-20012 PACKETSTORM:140261 0.0 https://vulners.com/packetstorm/PACKETSTORM:140261 *EXPLOIT* | ||||||
80 | tcp | open syn-ack |
http | nginx | 1.18.0 | |
cpe:/a:igor_sysoev:nginx:1.18.0http-server-headernginx/1.18.0 vulnersnginx 1.18.0: 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0 https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT* 95499236-C9FE-56A6-9D7D-E943A24B633A 8.9 https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A *EXPLOIT* 3F71F065-66D4-541F-A813-9F1A2F2B1D91 8.8 https://vulners.com/githubexploit/3F71F065-66D4-541F-A813-9F1A2F2B1D91 *EXPLOIT* NGINX:CVE-2022-41741 7.8 https://vulners.com/nginx/NGINX:CVE-2022-41741 DF1BBDC4-B715-5ABE-985E-91DD3BB87773 7.8 https://vulners.com/githubexploit/DF1BBDC4-B715-5ABE-985E-91DD3BB87773 *EXPLOIT* CVE-2022-41741 7.8 https://vulners.com/cve/CVE-2022-41741 NGINX:CVE-2021-23017 7.7 https://vulners.com/nginx/NGINX:CVE-2021-23017 EDB-ID:50973 7.7 https://vulners.com/exploitdb/EDB-ID:50973 *EXPLOIT* CVE-2021-23017 7.7 https://vulners.com/cve/CVE-2021-23017 B175E582-6BBF-5D54-AF15-ED3715F757E3 7.7 https://vulners.com/githubexploit/B175E582-6BBF-5D54-AF15-ED3715F757E3 *EXPLOIT* 9A14990B-D52A-56B6-966C-6F35C8B8EB9D 7.7 https://vulners.com/githubexploit/9A14990B-D52A-56B6-966C-6F35C8B8EB9D *EXPLOIT* 25F34A51-EB79-5BBC-8262-6F1876067F04 7.7 https://vulners.com/githubexploit/25F34A51-EB79-5BBC-8262-6F1876067F04 *EXPLOIT* 245ACDDD-B1E2-5344-B37D-5B9A0B0A1F0D 7.7 https://vulners.com/githubexploit/245ACDDD-B1E2-5344-B37D-5B9A0B0A1F0D *EXPLOIT* 1337DAY-ID-37837 7.7 https://vulners.com/zdt/1337DAY-ID-37837 *EXPLOIT* 1337DAY-ID-36300 7.7 https://vulners.com/zdt/1337DAY-ID-36300 *EXPLOIT* 00455CDF-B814-5424-952E-9088FBB2D42D 7.7 https://vulners.com/githubexploit/00455CDF-B814-5424-952E-9088FBB2D42D *EXPLOIT* F7F6E599-CEF4-5E03-8E10-FE18C4101E38 7.5 https://vulners.com/githubexploit/F7F6E599-CEF4-5E03-8E10-FE18C4101E38 *EXPLOIT* E73E445F-0A0D-5966-8A21-C74FE9C0D2BC 7.5 https://vulners.com/githubexploit/E73E445F-0A0D-5966-8A21-C74FE9C0D2BC *EXPLOIT* E5C174E5-D6E8-56E0-8403-D287DE52EB3F 7.5 https://vulners.com/githubexploit/E5C174E5-D6E8-56E0-8403-D287DE52EB3F *EXPLOIT* DB6E1BBD-08B1-574D-A351-7D6BB9898A4A 7.5 https://vulners.com/githubexploit/DB6E1BBD-08B1-574D-A351-7D6BB9898A4A *EXPLOIT* CVE-2023-44487 7.5 https://vulners.com/cve/CVE-2023-44487 C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B 7.5 https://vulners.com/githubexploit/C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B *EXPLOIT* BD3652A9-D066-57BA-9943-4E34970463B9 7.5 https://vulners.com/githubexploit/BD3652A9-D066-57BA-9943-4E34970463B9 *EXPLOIT* B0208442-6E17-5772-B12D-B5BE30FA5540 7.5 https://vulners.com/githubexploit/B0208442-6E17-5772-B12D-B5BE30FA5540 *EXPLOIT* A820A056-9F91-5059-B0BC-8D92C7A31A52 7.5 https://vulners.com/githubexploit/A820A056-9F91-5059-B0BC-8D92C7A31A52 *EXPLOIT* A66531EB-3C47-5C56-B8A6-E04B54E9D656 7.5 https://vulners.com/githubexploit/A66531EB-3C47-5C56-B8A6-E04B54E9D656 *EXPLOIT* 9814661A-35A4-5DB7-BB25-A1040F365C81 7.5 https://vulners.com/githubexploit/9814661A-35A4-5DB7-BB25-A1040F365C81 *EXPLOIT* 788E0E7C-6F5C-5DAD-9E3A-EE6D8A685F7D 7.5 https://vulners.com/githubexploit/788E0E7C-6F5C-5DAD-9E3A-EE6D8A685F7D *EXPLOIT* 5A864BCC-B490-5532-83AB-2E4109BB3C31 7.5 https://vulners.com/githubexploit/5A864BCC-B490-5532-83AB-2E4109BB3C31 *EXPLOIT* 1F6E0709-DA03-564E-925F-3177657C053E 7.5 https://vulners.com/githubexploit/1F6E0709-DA03-564E-925F-3177657C053E *EXPLOIT* 17C6AD2A-8469-56C8-BBBE-1764D0DF1680 7.5 https://vulners.com/githubexploit/17C6AD2A-8469-56C8-BBBE-1764D0DF1680 *EXPLOIT* CVE-2021-3618 7.4 https://vulners.com/cve/CVE-2021-3618 NGINX:CVE-2022-41742 7.1 https://vulners.com/nginx/NGINX:CVE-2022-41742 CVE-2022-41742 7.1 https://vulners.com/cve/CVE-2022-41742 PACKETSTORM:167720 6.8 https://vulners.com/packetstorm/PACKETSTORM:167720 *EXPLOIT* NGINX:CVE-2024-7347 5.7 https://vulners.com/nginx/NGINX:CVE-2024-7347 NGINX:CVE-2025-23419 5.3 https://vulners.com/nginx/NGINX:CVE-2025-23419 F5:K10438187 5.3 https://vulners.com/f5/F5:K10438187 PACKETSTORM:162830 0.0 https://vulners.com/packetstorm/PACKETSTORM:162830 *EXPLOIT* | ||||||
443 | tcp | open syn-ack |
http | nginx | 1.18.0 | |
cpe:/a:igor_sysoev:nginx:1.18.0http-server-headernginx/1.18.0 vulnersnginx 1.18.0: 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0 https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT* 95499236-C9FE-56A6-9D7D-E943A24B633A 8.9 https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A *EXPLOIT* 3F71F065-66D4-541F-A813-9F1A2F2B1D91 8.8 https://vulners.com/githubexploit/3F71F065-66D4-541F-A813-9F1A2F2B1D91 *EXPLOIT* NGINX:CVE-2022-41741 7.8 https://vulners.com/nginx/NGINX:CVE-2022-41741 DF1BBDC4-B715-5ABE-985E-91DD3BB87773 7.8 https://vulners.com/githubexploit/DF1BBDC4-B715-5ABE-985E-91DD3BB87773 *EXPLOIT* CVE-2022-41741 7.8 https://vulners.com/cve/CVE-2022-41741 NGINX:CVE-2021-23017 7.7 https://vulners.com/nginx/NGINX:CVE-2021-23017 EDB-ID:50973 7.7 https://vulners.com/exploitdb/EDB-ID:50973 *EXPLOIT* CVE-2021-23017 7.7 https://vulners.com/cve/CVE-2021-23017 B175E582-6BBF-5D54-AF15-ED3715F757E3 7.7 https://vulners.com/githubexploit/B175E582-6BBF-5D54-AF15-ED3715F757E3 *EXPLOIT* 9A14990B-D52A-56B6-966C-6F35C8B8EB9D 7.7 https://vulners.com/githubexploit/9A14990B-D52A-56B6-966C-6F35C8B8EB9D *EXPLOIT* 25F34A51-EB79-5BBC-8262-6F1876067F04 7.7 https://vulners.com/githubexploit/25F34A51-EB79-5BBC-8262-6F1876067F04 *EXPLOIT* 245ACDDD-B1E2-5344-B37D-5B9A0B0A1F0D 7.7 https://vulners.com/githubexploit/245ACDDD-B1E2-5344-B37D-5B9A0B0A1F0D *EXPLOIT* 1337DAY-ID-37837 7.7 https://vulners.com/zdt/1337DAY-ID-37837 *EXPLOIT* 1337DAY-ID-36300 7.7 https://vulners.com/zdt/1337DAY-ID-36300 *EXPLOIT* 00455CDF-B814-5424-952E-9088FBB2D42D 7.7 https://vulners.com/githubexploit/00455CDF-B814-5424-952E-9088FBB2D42D *EXPLOIT* F7F6E599-CEF4-5E03-8E10-FE18C4101E38 7.5 https://vulners.com/githubexploit/F7F6E599-CEF4-5E03-8E10-FE18C4101E38 *EXPLOIT* E73E445F-0A0D-5966-8A21-C74FE9C0D2BC 7.5 https://vulners.com/githubexploit/E73E445F-0A0D-5966-8A21-C74FE9C0D2BC *EXPLOIT* E5C174E5-D6E8-56E0-8403-D287DE52EB3F 7.5 https://vulners.com/githubexploit/E5C174E5-D6E8-56E0-8403-D287DE52EB3F *EXPLOIT* DB6E1BBD-08B1-574D-A351-7D6BB9898A4A 7.5 https://vulners.com/githubexploit/DB6E1BBD-08B1-574D-A351-7D6BB9898A4A *EXPLOIT* CVE-2023-44487 7.5 https://vulners.com/cve/CVE-2023-44487 C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B 7.5 https://vulners.com/githubexploit/C9A1C0C1-B6E3-5955-A4F1-DEA0E505B14B *EXPLOIT* BD3652A9-D066-57BA-9943-4E34970463B9 7.5 https://vulners.com/githubexploit/BD3652A9-D066-57BA-9943-4E34970463B9 *EXPLOIT* B0208442-6E17-5772-B12D-B5BE30FA5540 7.5 https://vulners.com/githubexploit/B0208442-6E17-5772-B12D-B5BE30FA5540 *EXPLOIT* A820A056-9F91-5059-B0BC-8D92C7A31A52 7.5 https://vulners.com/githubexploit/A820A056-9F91-5059-B0BC-8D92C7A31A52 *EXPLOIT* A66531EB-3C47-5C56-B8A6-E04B54E9D656 7.5 https://vulners.com/githubexploit/A66531EB-3C47-5C56-B8A6-E04B54E9D656 *EXPLOIT* 9814661A-35A4-5DB7-BB25-A1040F365C81 7.5 https://vulners.com/githubexploit/9814661A-35A4-5DB7-BB25-A1040F365C81 *EXPLOIT* 788E0E7C-6F5C-5DAD-9E3A-EE6D8A685F7D 7.5 https://vulners.com/githubexploit/788E0E7C-6F5C-5DAD-9E3A-EE6D8A685F7D *EXPLOIT* 5A864BCC-B490-5532-83AB-2E4109BB3C31 7.5 https://vulners.com/githubexploit/5A864BCC-B490-5532-83AB-2E4109BB3C31 *EXPLOIT* 1F6E0709-DA03-564E-925F-3177657C053E 7.5 https://vulners.com/githubexploit/1F6E0709-DA03-564E-925F-3177657C053E *EXPLOIT* 17C6AD2A-8469-56C8-BBBE-1764D0DF1680 7.5 https://vulners.com/githubexploit/17C6AD2A-8469-56C8-BBBE-1764D0DF1680 *EXPLOIT* CVE-2021-3618 7.4 https://vulners.com/cve/CVE-2021-3618 NGINX:CVE-2022-41742 7.1 https://vulners.com/nginx/NGINX:CVE-2022-41742 CVE-2022-41742 7.1 https://vulners.com/cve/CVE-2022-41742 PACKETSTORM:167720 6.8 https://vulners.com/packetstorm/PACKETSTORM:167720 *EXPLOIT* NGINX:CVE-2024-7347 5.7 https://vulners.com/nginx/NGINX:CVE-2024-7347 NGINX:CVE-2025-23419 5.3 https://vulners.com/nginx/NGINX:CVE-2025-23419 F5:K10438187 5.3 https://vulners.com/f5/F5:K10438187 PACKETSTORM:162830 0.0 https://vulners.com/packetstorm/PACKETSTORM:162830 *EXPLOIT* | ||||||
3030 | tcp | open syn-ack |
http | Node.js Express framework | ||
cpe:/a:nodejs:node.js |
Address | Port | Protocol | Service | Product | Version | CPE | Extra info |
---|---|---|---|---|---|---|---|
198.244.157.26 - disinfo.quaidorsay.fr | 22 | tcp | ssh | OpenSSH | 8.4p1 Debian 5+deb11u4 | cpe:/a:openbsd:openssh:8.4p1 | protocol 2.0 |
198.244.157.26 - disinfo.quaidorsay.fr | 80 | tcp | http | nginx | 1.18.0 | cpe:/a:igor_sysoev:nginx:1.18.0 | |
198.244.157.26 - disinfo.quaidorsay.fr | 443 | tcp | http | nginx | 1.18.0 | cpe:/a:igor_sysoev:nginx:1.18.0 | |
198.244.157.26 - disinfo.quaidorsay.fr | 3030 | tcp | http | Node.js Express framework | cpe:/a:nodejs:node.js |