{ "banner": { "comments": null, "protocol": [ 1, 99 ], "raw": "SSH-1.99-OpenSSH_4.0", "software": "OpenSSH_4.0" }, "compression": [ "none", "zlib" ], "cves": [ { "cvssv2": 7.8, "description": "command injection via anomalous argument transfers", "name": "CVE-2020-15778" }, { "cvssv2": 5.3, "description": "enumerate usernames due to timing discrepancies", "name": "CVE-2018-15473" }, { "cvssv2": 5.3, "description": "readonly bypass via sftp", "name": "CVE-2017-15906" }, { "cvssv2": 5.3, "description": "enumerate usernames via challenge response", "name": "CVE-2016-20012" }, { "cvssv2": 5.5, "description": "bypass command restrictions via crafted X11 forwarding data", "name": "CVE-2016-3115" }, { "cvssv2": 7.5, "description": "cause DoS via triggering error condition (memory corruption)", "name": "CVE-2014-1692" }, { "cvssv2": 3.5, "description": "leak data via debug messages", "name": "CVE-2012-0814" }, { "cvssv2": 3.5, "description": "cause DoS via large value in certain length field (memory consumption)", "name": "CVE-2011-5000" }, { "cvssv2": 5.0, "description": "cause DoS via large number of connections (slot exhaustion)", "name": "CVE-2010-5107" }, { "cvssv2": 4.0, "description": "cause DoS via crafted glob expression (CPU and memory consumption)", "name": "CVE-2010-4755" }, { "cvssv2": 7.5, "description": "bypass authentication check via crafted values", "name": "CVE-2010-4478" }, { "cvssv2": 2.6, "description": "recover plaintext data from ciphertext", "name": "CVE-2008-5161" }, { "cvssv2": 5.0, "description": "cause DoS via multiple login attempts (slot exhaustion)", "name": "CVE-2008-4109" }, { "cvssv2": 6.5, "description": "bypass command restrictions via modifying session file", "name": "CVE-2008-1657" }, { "cvssv2": 6.9, "description": "hijack forwarded X11 connections", "name": "CVE-2008-1483" }, { "cvssv2": 7.5, "description": "privilege escalation via causing an X client to be trusted", "name": "CVE-2007-4752" }, { "cvssv2": 5.0, "description": "discover valid usernames through different responses", "name": "CVE-2007-2243" }, { "cvssv2": 5.0, "description": "discover valid usernames through different responses", "name": "CVE-2006-5052" }, { "cvssv2": 9.3, "description": "cause DoS or execute arbitrary code (double free)", "name": "CVE-2006-5051" }, { "cvssv2": 7.8, "description": "cause DoS via crafted packet (CPU consumption)", "name": "CVE-2006-4924" }, { "cvssv2": 4.6, "description": "execute arbitrary code", "name": "CVE-2006-0225" }, { "cvssv2": 5.0, "description": "leak data about authentication credentials", "name": "CVE-2005-2798" } ], "enc": [ "aes128-cbc", "3des-cbc", "blowfish-cbc", "cast128-cbc", "arcfour", "aes192-cbc", "aes256-cbc", "rijndael-cbc@lysator.liu.se", "aes128-ctr", "aes192-ctr", "aes256-ctr" ], "fingerprints": [ { "hash": "YZ457EBcJTSxRKI3yXRgtAj3PBf5B9/F36b1SVooml4", "hash_alg": "SHA256", "hostkey": "ssh-rsa" }, { "hash": "3c:c3:38:f8:55:39:c0:4a:5a:17:89:60:2c:a1:fc:6a", "hash_alg": "MD5", "hostkey": "ssh-rsa" } ], "kex": [ { "algorithm": "diffie-hellman-group-exchange-sha1", "keysize": 1024 }, { "algorithm": "diffie-hellman-group14-sha1" }, { "algorithm": "diffie-hellman-group1-sha1" } ], "key": [ { "algorithm": "ssh-rsa", "keysize": 1024 }, { "algorithm": "ssh-dss" } ], "mac": [ "hmac-md5", "hmac-sha1", "hmac-ripemd160", "hmac-ripemd160@openssh.com", "hmac-sha1-96", "hmac-md5-96" ], "recommendations": { "critical": { "del": { "enc": [ { "name": "3des-cbc", "notes": "" }, { "name": "blowfish-cbc", "notes": "" }, { "name": "cast128-cbc", "notes": "" }, { "name": "arcfour", "notes": "" }, { "name": "rijndael-cbc@lysator.liu.se", "notes": "" } ], "kex": [ { "name": "diffie-hellman-group1-sha1", "notes": "" }, { "name": "diffie-hellman-group14-sha1", "notes": "" }, { "name": "diffie-hellman-group-exchange-sha1", "notes": "" } ], "key": [ { "name": "ssh-rsa", "notes": "" }, { "name": "ssh-dss", "notes": "" } ], "mac": [ { "name": "hmac-sha1", "notes": "" }, { "name": "hmac-sha1-96", "notes": "" }, { "name": "hmac-md5", "notes": "" }, { "name": "hmac-md5-96", "notes": "" }, { "name": "hmac-ripemd160", "notes": "" }, { "name": "hmac-ripemd160@openssh.com", "notes": "" } ] } }, "warning": { "del": { "enc": [ { "name": "aes128-cbc", "notes": "" }, { "name": "aes192-cbc", "notes": "" }, { "name": "aes256-cbc", "notes": "" } ] } } }, "target": "localhost:2222" }