Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
DashlordBetaGouvBot committed Jan 5, 2025
1 parent b379fb9 commit a6979c0
Show file tree
Hide file tree
Showing 13 changed files with 3,970 additions and 4,030 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@
"width": 1920,
"height": 1080,
"url": "https://world.openfoodfacts.org/",
"size": 3828.955,
"size": 3837.749,
"nodes": 1576,
"requests": 133,
"requests": 134,
"grade": "F",
"score": 18.0,
"ges": 2.64,
"water": 3.96,
"score": 17.0,
"ges": 2.66,
"water": 3.99,
"ecoindex_version": "5.4.2",
"date": "2024-12-29 17:31:23.178828",
"date": "2025-01-05 12:45:12.716158",
"page_type": "food"
}
]

Large diffs are not rendered by default.

7,890 changes: 3,915 additions & 3,975 deletions results/aHR0cHM6Ly93b3JsZC5vcGVuZm9vZGZhY3RzLm9yZy8=/lhr.json

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Nmap 7.92 scan initiated Sun Dec 29 17:37:32 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln world.openfoodfacts.org
# Nmap 7.92 scan initiated Sun Jan 5 12:50:14 2025 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln world.openfoodfacts.org
Host: 213.36.253.214 (off2-2.free.org) Status: Up
Host: 213.36.253.214 (off2-2.free.org) Ports: 22/open/tcp//ssh//OpenSSH 8.4p1 Debian 5+deb11u2 (protocol 2.0)/, 80/open/tcp//http//nginx 1.18.0/, 443/open/tcp//ssl|http//nginx 1.18.0/ Ignored State: closed (997)
# Nmap done at Sun Dec 29 17:37:51 2024 -- 1 IP address (1 host up) scanned in 19.47 seconds
# Nmap done at Sun Jan 5 12:50:33 2025 -- 1 IP address (1 host up) scanned in 18.90 seconds
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
<h1>Scan Report<br><small>Nmap 7.92</small>
</h1>
<pre style="white-space:pre-wrap; word-wrap:break-word;">nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln world.openfoodfacts.org</pre>
<p class="lead">Sun Dec 29 17:37:32 2024 – Sun Dec 29 17:37:51 2024<br>1 hosts scanned.
<p class="lead">Sun Jan 5 12:50:14 2025 – Sun Jan 5 12:50:33 2025<br>1 hosts scanned.
1 hosts up.
0 hosts down.
</p>
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"host":"world.openfoodfacts.org","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"8.4p1 Debian 5+deb11u2","vulnerabilities":[{"type":"cve","cvss":"9.8","is_exploit":"false","id":"CVE-2023-38408"},{"type":"githubexploit","cvss":"9.8","is_exploit":"true","id":"B8190CDB-3EB9-5631-9828-8064A1575B23"},{"type":"githubexploit","cvss":"9.8","is_exploit":"true","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623"},{"type":"githubexploit","cvss":"9.8","is_exploit":"true","id":"8AD01159-548E-546E-AA87-2DE89F3927EC"},{"type":"githubexploit","cvss":"9.8","is_exploit":"true","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A"},{"type":"githubexploit","cvss":"9.8","is_exploit":"true","id":"0221525F-07F5-5790-912D-F4B9E2D1B587"},{"type":"seebug","cvss":"7.5","is_exploit":"true","id":"SSV:92579"},{"type":"packetstorm","cvss":"7.5","is_exploit":"true","id":"PACKETSTORM:173661"},{"type":"githubexploit","cvss":"7.5","is_exploit":"true","id":"F0979183-AE88-53B4-86CF-3AF0523F3807"},{"type":"zdt","cvss":"7.5","is_exploit":"true","id":"1337DAY-ID-26576"},{"type":"cve","cvss":"7.1","is_exploit":"false","id":"CVE-2021-28041"},{"type":"cve","cvss":"7.0","is_exploit":"false","id":"CVE-2021-41617"},{"type":"cve","cvss":"6.5","is_exploit":"false","id":"CVE-2023-51385"},{"type":"cve","cvss":"5.9","is_exploit":"false","id":"CVE-2023-48795"},{"type":"cve","cvss":"5.9","is_exploit":"false","id":"CVE-2020-14145"},{"type":"cve","cvss":"5.3","is_exploit":"false","id":"CVE-2016-20012"},{"type":"packetstorm","cvss":"0.0","is_exploit":"true","id":"PACKETSTORM:140261"}]}},{"service":{"name":"http","product":"nginx","id":"80","version":"1.18.0","vulnerabilities":[]}},{"service":{"name":"http","product":"nginx","id":"443","version":"1.18.0","vulnerabilities":[]}}],"grade":"E"}
{"host":"world.openfoodfacts.org","protocol":"tcp","closed_ports":"997","open_ports":[{"service":{"name":"ssh","product":"OpenSSH","id":"22","version":"8.4p1 Debian 5+deb11u2","vulnerabilities":[{"cvss":"9.8","type":"cve","is_exploit":"false","id":"CVE-2023-38408"},{"cvss":"9.8","type":"githubexploit","is_exploit":"true","id":"B8190CDB-3EB9-5631-9828-8064A1575B23"},{"cvss":"9.8","type":"githubexploit","is_exploit":"true","id":"8FC9C5AB-3968-5F3C-825E-E8DB5379A623"},{"cvss":"9.8","type":"githubexploit","is_exploit":"true","id":"8AD01159-548E-546E-AA87-2DE89F3927EC"},{"cvss":"9.8","type":"githubexploit","is_exploit":"true","id":"5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A"},{"cvss":"9.8","type":"githubexploit","is_exploit":"true","id":"0221525F-07F5-5790-912D-F4B9E2D1B587"},{"cvss":"7.5","type":"seebug","is_exploit":"true","id":"SSV:92579"},{"cvss":"7.5","type":"packetstorm","is_exploit":"true","id":"PACKETSTORM:173661"},{"cvss":"7.5","type":"githubexploit","is_exploit":"true","id":"F0979183-AE88-53B4-86CF-3AF0523F3807"},{"cvss":"7.5","type":"zdt","is_exploit":"true","id":"1337DAY-ID-26576"},{"cvss":"7.1","type":"cve","is_exploit":"false","id":"CVE-2021-28041"},{"cvss":"7.0","type":"cve","is_exploit":"false","id":"CVE-2021-41617"},{"cvss":"6.5","type":"cve","is_exploit":"false","id":"CVE-2023-51385"},{"cvss":"5.9","type":"cve","is_exploit":"false","id":"CVE-2023-48795"},{"cvss":"5.9","type":"cve","is_exploit":"false","id":"CVE-2020-14145"},{"cvss":"5.3","type":"cve","is_exploit":"false","id":"CVE-2016-20012"},{"cvss":"0.0","type":"packetstorm","is_exploit":"true","id":"PACKETSTORM:140261"}]}},{"service":{"name":"http","product":"nginx","id":"80","version":"1.18.0","vulnerabilities":[]}},{"service":{"name":"http","product":"nginx","id":"443","version":"1.18.0","vulnerabilities":[]}}],"grade":"E"}
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Nmap 7.92 scan initiated Sun Dec 29 17:37:32 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln world.openfoodfacts.org
# Nmap 7.92 scan initiated Sun Jan 5 12:50:14 2025 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln world.openfoodfacts.org
Nmap scan report for world.openfoodfacts.org (213.36.253.214)
Host is up (0.15s latency).
Host is up (0.083s latency).
rDNS record for 213.36.253.214: off2-2.free.org
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE VERSION
Expand Down Expand Up @@ -31,4 +31,4 @@ PORT STATE SERVICE VERSION
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Dec 29 17:37:51 2024 -- 1 IP address (1 host up) scanned in 19.47 seconds
# Nmap done at Sun Jan 5 12:50:33 2025 -- 1 IP address (1 host up) scanned in 18.90 seconds
Loading

0 comments on commit a6979c0

Please sign in to comment.