The server at 92.118.1499.230 may be vulnerable to the following security issues:
CVE-2023-51767: Row hammer attacks on OpenSSH through 9.6, which could allow authentication bypass if the attacker has user privileges and is co-located with the victim.
CVE-2023-51385: OS command injection in OpenSSH before 9.6, which could occur if a user name or host name has shell metacharacters and is referenced by an expansion token.
CVE-2023-51384: Incomplete application of destination constraints in ssh-agent in OpenSSH before 9.6, which could allow certain private keys to be added to the agent without proper constraints.
CVE-2023-48795: Terrapin attack in SSH transport protocol, which allows remote attackers to bypass integrity checks and downgrade or disable security features.
CVE-2023-38408: Remote code execution in ssh-agent in OpenSSH before 9.3p2 due to an insufficiently trustworthy search path.
CVE-2021-41617: Privilege escalation in OpenSSH 6.2 through 8.x due to insufficient initialization of supplemental groups.
CVE-2021-36368: Potential authentication bypass in OpenSSH before 8.9 due to lack of logging and verification of FIDO authentication.
CVE-2016-20012: User enumeration in OpenSSH through 8.7, which allows remote attackers to test whether a certain combination of username and public key is known to an SSH server.
CVE-2008-3844: Trojan horse modification in certain Red Hat Enterprise Linux packages for OpenSSH, which could have an unknown impact.
CVE-2007-2768: User account enumeration in OpenSSH when using OPIE for PAM, which allows remote attackers to determine the existence of certain user accounts.
It is important to note that not all of these vulnerabilities may be applicable to your specific server configuration, and that some may have been addressed in newer versions of OpenSSH. It is recommended to update your OpenSSH version to the latest available and to apply any necessary patches or workarounds to mitigate these vulnerabilities.
info source deepai: from shodan.io data provided to it,
polonus