194.25.157.68

Regular View Raw Data Timeline
Last Seen: 2025-04-04
Tags:
eol-product

GeneralInformation

Hostnames start.dachstiftung-diakonie.de
start.ddedv.de
diacampus.de
dkh.diacampus.de
dkhi.diacampus.de
dkwf.diacampus.de
dkwob.diacampus.de
www.diacampus.de
zeb.diacampus.de
www.zeb.diacampus.de
diacampus.online
dkh.diacampus.online
dkhi.diacampus.online
dkwf.diacampus.online
dkwob.diacampus.online
www.diacampus.online
zeb.diacampus.online
www.zeb.diacampus.online
haiiloproxy.diaserv-braunschweig.de
start.diaserv-braunschweig.de
xn--grnes-viertel-stephansstift-j3c.de
www.xn--grnes-viertel-stephansstift-j3c.de
xn--grnesviertelstephansstift-gwc.de
www.xn--grnesviertelstephansstift-gwc.de
zeb-diacampus.de
www.zeb-diacampus.de
Domains dachstiftung-diakonie.de ddedv.de diacampus.de diacampus.online diaserv-braunschweig.de xn--grnes-viertel-stephansstift-j3c.de xn--grnesviertelstephansstift-gwc.de zeb-diacampus.de 
Country Germany
City Roding
Organization Dachstiftung Diakonie Zentrale RZ Gifhorn
ISP Deutsche Telekom AG
ASN AS3320

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

OpenPorts

80 / tcp
2130940350 | 2025-04-04T00:09:56.594465
443 / tcp
1563265241 | 2025-04-03T20:53:36.877999



Contact Us

Shodan ® - All rights reserved