Last Seen: 2025-04-26
Tags:
database

WebTechnologies

Cookie compliance
JavaScript frameworks
JavaScript libraries
Programming languages
Tag managers

OpenPorts

21 / tcp
99202695 | 2025-04-22T11:25:04.842553
22 / tcp
1502643250 | 2025-04-03T19:39:48.991211
80 / tcp
444176100 | 2025-04-24T00:29:39.133318
443 / tcp
-1892944273 | 2025-04-26T05:26:04.745037
3306 / tcp
168569112 | 2025-04-25T02:52:06.040773

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.



Contact Us

Shodan ® - All rights reserved