PT-2025-31958 · Undefined · Undefined

Published

2025-08-05

·

Updated

2025-08-05

·

CVE-2024-433947

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.

Hi, I run a following script for a vulnerability test for my home network;

nmap 192.168.1.1/24 -n -sP |rg -o "192.*"  > scan.txt

nmap -sV --script vulners --script-args mincvss=7.0 -iL scan.txt

Then I get this Vulner output in port 80;

Nmap scan report for 192.168.1.5

Host is up (0.00021s latency).

Not shown: 995 filtered tcp ports (no-response)

PORT      STATE SERVICE VERSION

22/tcp    open  ssh     OpenSSH 9.9 (protocol 2.0)

80/tcp    open  http    Apache httpd 2.4.62 ((Unix))

| vulners: 

|   cpe:/a:apache:http server:2.4.62: 

|     95499236-C9FE-56A6-9D7D-E943A24B633A10.0https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A*EXPLOIT*

|     2C119FFA-ECE0-5E14-A4A4-354A2C38071A10.0https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A*EXPLOIT*

|     A5425A79-9D81-513A-9CC5-549D6321897C9.8https://vulners.com/githubexploit/A5425A79-9D81-513A-9CC5-549D6321897C*EXPLOIT*

|     CVE-2025-230489.1https://vulners.com/cve/CVE-2025-23048

|     CVE-2025-530207.5https://vulners.com/cve/CVE-2025-53020

|     CVE-2025-496307.5https://vulners.com/cve/CVE-2025-49630

|     CVE-2024-472527.5https://vulners.com/cve/CVE-2024-47252

|     CVE-2024-433947.5https://vulners.com/cve/CVE-2024-43394

|     CVE-2024-432047.5https://vulners.com/cve/CVE-2024-43204

|     CVE-2024-425167.5https://vulners.com/cve/CVE-2024-42516

|     CVE-2025-498127.4https://vulners.com/cve/CVE-2025-49812

There are three `httpd` running;

(base) MacStudio :: ~ ‹main› » ps caux |rg httpd 

www             16455   0.0  0.0 411020464   3152   ??  S     9:22AM   0:00.00 httpd

www             16454   0.0  0.0 411027632   3232   ??  S     9:22AM   0:00.01 httpd

root               137   0.0  0.0 410737920   6528   ??  Ss    9:05AM   0:00.90 httpd

I think two top ones are run by Apache and `tcpdump` on port 80 does not yield any traffic at all.

If I kill https, it seem to lose iCloud access. Since the scores are seriously high, should I be concerned about these exploit warnings ?

My system;

(base) MacStudio :: ~ ‹main› » neofetch 

                    'c.          MacStudio.local 

                 ,xNMM.          ----------------------------- 

               .OMMMMo           OS: macOS 15.6 24G84 arm64 

               OMMM0,            Host: Mac13,2 

     .;loddo:' loolloddol;.      Kernel: 24.6.0 

   cKMMMMMMMMMMNWMMMMMMMMMM0:    Uptime: 2 hours, 54 mins 

 .KMMMMMMMMMMMMMMMMMMMMMMMWd.    Packages: 293 (brew) 

 XMMMMMMMMMMMMMMMMMMMMMMMX.      Shell: zsh 5.9 

;MMMMMMMMMMMMMMMMMMMMMMMM:       Resolution: 3440x1440 

:MMMMMMMMMMMMMMMMMMMMMMMM:       DE: Aqua 

.MMMMMMMMMMMMMMMMMMMMMMMMX.      WM: Quartz Compositor 

 kMMMMMMMMMMMMMMMMMMMMMMMMWd.    WM Theme: Blue (Light) 

 .XMMMMMMMMMMMMMMMMMMMMMMMMMMk   Terminal: Apple Terminal 

  .XMMMMMMMMMMMMMMMMMMMMMMMMK.   Terminal Font: Monaco 

    kMMMMMMMMMMMMMMMMMMMMMMd     CPU: Apple M1 Ultra 

     ;KMMMMMMMWXXWMMMMMMMk.      GPU: Apple M1 Ultra 

       .cooc,.    .,coo:.        Memory: 3225MiB / 131072MiB

Related Identifiers

CVE-2024-433947

Affected Products

Undefined