{"uuid": "45d791ec-d301-4d45-aa64-b72b72a2cf77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45781", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability \u2014 CVE-2025-51385 \u2014 affecting OpenSSH servers &lt;9.6 Version\nURL\uff1ahttps://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-29T08:08:41.000000Z"}