185.244.193.186

Regular View Raw Data Timeline
Last Seen: 2025-03-28

GeneralInformation

Hostnames git.boone-schulz.de
Domains boone-schulz.de 
Country Germany
City Nürnberg
Organization netcup GmbH
ISP netcup GmbH
ASN AS197540

WebTechnologies

Development
JavaScript libraries
Miscellaneous
Programming languages

SecurityContact

Policy https://codeberg.org/forgejo/governance/src/commit/5c07b3801537212ed6be1edfec298d7b004ce92d/SECURITY-POLICY.md
Contact security@forgejo.org
Encryption https://keys.openpgp.org/vks/v1/by-fingerprint/1B638BDF10969D627926B8D9F585D0F99E1FB56F
Preferred-Languages en
Expires 2026-07-16T23:59:59.000Z

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

OpenPorts

443 / tcp
-1724149099 | 2025-03-16T20:09:36.137752
2222 / tcp
-1678864248 | 2025-03-28T00:53:05.570377



Contact Us

Shodan ® - All rights reserved