{"vulnerability": "CVE-2023-51385", "sightings": [{"uuid": "7fc2e623-d0a6-4291-afd2-35c4657f0919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "MISP/a3137763-d956-4b13-80ba-941ec3cbec6b", "content": "", "creation_timestamp": "2024-02-22T15:07:32.000000Z"}, {"uuid": "079c871e-076b-4899-976b-782677288189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "e3d735a6-3f6f-472b-8a60-fd6ed5d4cbf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "b7acf1dd-4ebf-4912-b3f6-38366db721f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/16", "content": "", "creation_timestamp": "2025-10-07T13:49:40.000000Z"}, {"uuid": "64839b8d-9ffd-4ae3-a26b-adef692557ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1754", "content": "", "creation_timestamp": "2026-02-09T04:00:00.000000Z"}, {"uuid": "437836aa-67e5-4ccb-8158-c8f2c9ceed16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6357", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-51385 PoC Exploit \nURL\uff1ahttps://github.com/WOOOOONG/CVE-2023-51385\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2024-01-02T02:16:20.000000Z"}, {"uuid": "45d791ec-d301-4d45-aa64-b72b72a2cf77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45781", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability \u2014 CVE-2025-51385 \u2014 affecting OpenSSH servers &lt;9.6 Version\nURL\uff1ahttps://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-29T08:08:41.000000Z"}, {"uuid": "7f75bb19-1027-4726-840f-54739fd26932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6325", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-51385\u6d4b\u8bd5POC\nURL\uff1ahttps://github.com/N0rther/CVE-2023-51385_TT\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-29T02:33:04.000000Z"}, {"uuid": "30ff7956-56ee-465a-9234-edc5acd69e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6322", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-51385_test-star-main\nURL\uff1ahttps://github.com/siyi-star/CVE-2023-51385_test-star-main\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-28T17:18:48.000000Z"}, {"uuid": "9ee79de3-6dfc-4bb9-b79c-51edb8701169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6289", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aOpenSSH ProxyCommand RCE\nURL\uff1ahttps://github.com/Le1a/CVE-2023-51385\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-25T10:14:14.000000Z"}, {"uuid": "25974cbc-91e6-41c3-8460-68475a87148b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6301", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-51385\nURL\uff1ahttps://github.com/WLaoDuo/CVE-2023-51385_poc-test\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-26T09:04:21.000000Z"}, {"uuid": "e9b2e622-63db-4deb-87e9-928f2eb5cd0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6295", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1a\u4e00\u4e2a\u9a8c\u8bc1\u5bf9CVE-2023-51385\nURL\uff1ahttps://github.com/zls1793/CVE-2023-51385_test\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-25T13:15:36.000000Z"}, {"uuid": "295baaea-4d27-405b-91f3-128eeb6a6bcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6337", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1a\u4e00\u4e2a\u9a8c\u8bc1\u5bf9CVE-2023-51385\nURL\uff1ahttps://github.com/power1314520/CVE-2023-51385_test\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-30T01:13:29.000000Z"}, {"uuid": "658ec732-2e74-4d6b-a5ba-b998dec38f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/lSatndSHKvXeOOkCe4BtgugIcZcDihrdZBJA4iXwuYPkAsH3oA", "content": "", "creation_timestamp": "2025-08-17T02:42:32.000000Z"}, {"uuid": "2b18d67b-9511-4bac-ba29-0db2a256466a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/poxek/3528", "content": "SSH ProxyCommand == RCE\nCVE-2023-51385\n#RCE\n\nSSH\u2019s ProxyCommand is a feature quite widely used to proxy ssh connections by allowing to specify custom commands to be used to connect to the server. Arguments to this directive may contain tokens like %h, %u which refer to hostname and username respectively.\n\nWhen coming from untrusted sources, a hostname can be malicious and look something like malicious-command (backticks would allow a command to be executed in shell)\n\nMalicious config:\nHost *.example.com\n  ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p\n\nLatest PoC:\nurl = ssh://'`open -aCalculator`'foo.example.com/bar\n\nExploit: https://github.com/vin01/poc-proxycommand-vulnerable-v2\n\nFor Remediation you need update to:\nOpenSSH 9.6p1\nlibssh 0.10.6 and 0.9.8\n\n\ud83c\udf1a @poxek", "creation_timestamp": "2023-12-24T09:02:08.000000Z"}, {"uuid": "fd3d1248-17e7-4025-b094-4ac31ed26e96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10579", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "6bdf16e0-ab49-479a-8c0b-70ddced448ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10590", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "b8f77f13-4992-48ad-90f3-ec194ce6d036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "Telegram/n1xxTDW4DKAqfoFBBrei6KNyXkL9LVReMZ-BWNrHaTz0OZY", "content": "", "creation_timestamp": "2025-07-22T15:00:06.000000Z"}, {"uuid": "e46f4a63-ed4f-4d28-84ca-9d166b8be6f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10585", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "b76e49e5-d8c6-4c65-9240-6312e3b8386a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/10580", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "1cb36af5-feb0-4b4a-9786-d6c72d19a1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10574", "content": "https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       EDB-ID:40858    6.4     https://vulners.com/exploitdb/EDB-ID:40858   *EXPLOIT*                               |       EDB-ID:40119    6.4     https://vulners.com/exploitdb/EDB-ID:40119   *EXPLOIT*                               |       EDB-ID:39569    6.4     https://vulners.com/exploitdb/EDB-ID:39569   *EXPLOIT*                               |       CVE-2016-3115   6.4     https://vulners.com/cve/CVE-2016-3115         |       PACKETSTORM:181223      5.9   https://vulners.com/packetstorm/PACKETSTORM:181223      *EXPLOIT*              |       MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       5.9     https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       *EXPLOIT*      |       EDB-ID:40136    5.9     https://vulners.com/exploitdb/EDB-ID:40136   *EXPLOIT*                               |       EDB-ID:40113    5.9     https://vulners.com/exploitdb/EDB-ID:40113   *EXPLOIT*                               |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       CVE-2019-6111   5.9     https://vulners.com/cve/CVE-2019-6111         |       CVE-2016-6210   5.9     https://vulners.com/cve/CVE-2016-6210         |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       EXPLOITPACK:98FE96309F9524B8C84C508837551A19   5.8     https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19  *EXPLOIT*      |       EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   5.8     https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97  *EXPLOIT*      |       1337DAY-ID-32328        5.8   https://vulners.com/zdt/1337DAY-ID-32328*EXPLOIT*                              |       1337DAY-ID-32009        5.8   https://vulners.com/zdt/1337DAY-ID-32009*EXPLOIT*                              |       SSV:91041       5.5     https://vulners.com/seebug/SSV:91041   *EXPLOIT*                                     |       PACKETSTORM:140019      5.5   https://vulners.com/packetstorm/PACKETSTORM:140019      *EXPLOIT*              |       PACKETSTORM:136251      5.5   https://vulners.com/packetstorm/PACKETSTORM:136251      *EXPLOIT*              |       PACKETSTORM:136234      5.5   https://vulners.com/packetstorm/PACKETSTORM:136234      *EXPLOIT*              |       EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   5.5     https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F  *EXPLOIT*      |       EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   5.5     https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138  *EXPLOIT*      |       EXPLOITPACK:1902C998CBF9154396911926B4C3B330   5.5     https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330  *EXPLOIT*      |       CVE-2016-10011  5.5     https://vulners.com/cve/CVE-2016-10011        |       1337DAY-ID-25388        5.5   https://vulners.com/zdt/1337DAY-ID-25388*EXPLOIT*                              |       EDB-ID:45939    5.3     https://vulners.com/exploitdb/EDB-ID:45939   *EXPLOIT*                               |       EDB-ID:45233    5.3     https://vulners.com/exploitdb/EDB-ID:45233   *EXPLOIT*                               |       CVE-2018-20685  5.3     https://vulners.com/cve/CVE-2018-20685        |       CVE-2018-15919  5.3     https://vulners.com/cve/CVE-2018-15919        |       CVE-2018-15473  5.3     https://vulners.com/cve/CVE-2018-15473        |       CVE-2017-15906  5.3     https://vulners.com/cve/CVE-2017-15906        |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "21fbcba1-72f5-486a-8ac4-5cc37a4c3188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10572", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "d1bc5d48-75a2-49fe-a9a6-ac3b804cb29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10586", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "0d8c65a3-cc0c-49da-b595-8902844cc48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2961", "content": "https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       EDB-ID:40858    6.4     https://vulners.com/exploitdb/EDB-ID:40858   *EXPLOIT*                               |       EDB-ID:40119    6.4     https://vulners.com/exploitdb/EDB-ID:40119   *EXPLOIT*                               |       EDB-ID:39569    6.4     https://vulners.com/exploitdb/EDB-ID:39569   *EXPLOIT*                               |       CVE-2016-3115   6.4     https://vulners.com/cve/CVE-2016-3115         |       PACKETSTORM:181223      5.9   https://vulners.com/packetstorm/PACKETSTORM:181223      *EXPLOIT*              |       MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       5.9     https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       *EXPLOIT*      |       EDB-ID:40136    5.9     https://vulners.com/exploitdb/EDB-ID:40136   *EXPLOIT*                               |       EDB-ID:40113    5.9     https://vulners.com/exploitdb/EDB-ID:40113   *EXPLOIT*                               |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       CVE-2019-6111   5.9     https://vulners.com/cve/CVE-2019-6111         |       CVE-2016-6210   5.9     https://vulners.com/cve/CVE-2016-6210         |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       EXPLOITPACK:98FE96309F9524B8C84C508837551A19   5.8     https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19  *EXPLOIT*      |       EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   5.8     https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97  *EXPLOIT*      |       1337DAY-ID-32328        5.8   https://vulners.com/zdt/1337DAY-ID-32328*EXPLOIT*                              |       1337DAY-ID-32009        5.8   https://vulners.com/zdt/1337DAY-ID-32009*EXPLOIT*                              |       SSV:91041       5.5     https://vulners.com/seebug/SSV:91041   *EXPLOIT*                                     |       PACKETSTORM:140019      5.5   https://vulners.com/packetstorm/PACKETSTORM:140019      *EXPLOIT*              |       PACKETSTORM:136251      5.5   https://vulners.com/packetstorm/PACKETSTORM:136251      *EXPLOIT*              |       PACKETSTORM:136234      5.5   https://vulners.com/packetstorm/PACKETSTORM:136234      *EXPLOIT*              |       EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   5.5     https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F  *EXPLOIT*      |       EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   5.5     https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138  *EXPLOIT*      |       EXPLOITPACK:1902C998CBF9154396911926B4C3B330   5.5     https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330  *EXPLOIT*      |       CVE-2016-10011  5.5     https://vulners.com/cve/CVE-2016-10011        |       1337DAY-ID-25388        5.5   https://vulners.com/zdt/1337DAY-ID-25388*EXPLOIT*                              |       EDB-ID:45939    5.3     https://vulners.com/exploitdb/EDB-ID:45939   *EXPLOIT*                               |       EDB-ID:45233    5.3     https://vulners.com/exploitdb/EDB-ID:45233   *EXPLOIT*                               |       CVE-2018-20685  5.3     https://vulners.com/cve/CVE-2018-20685        |       CVE-2018-15919  5.3     https://vulners.com/cve/CVE-2018-15919        |       CVE-2018-15473  5.3     https://vulners.com/cve/CVE-2018-15473        |       CVE-2017-15906  5.3     https://vulners.com/cve/CVE-2017-15906        |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "502ba5fa-e348-429d-96e7-ae5f445ca0e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/g4YVNsl8VVhm8hCc75QWhNv5PFRAQjIgSB1n0jxM2tiTPh-tRQ", "content": "", "creation_timestamp": "2025-02-01T09:42:01.000000Z"}, {"uuid": "5aee51d5-94f0-4e67-957a-095adace8fa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2977", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "0a1d48a8-0e7a-4992-8e39-e520fcdd7d49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2972", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "80086f65-a6c3-4fb8-ab53-554b5f3f2300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2973", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "361692ef-246f-492d-b761-001ffe10274c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2968", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "25d6d696-c8f0-4c45-ba2f-528953e5162e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2967", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "308e03b3-17fb-47eb-8cbc-3cc68e448c3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2959", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "1c9deda2-4d72-49ac-9717-655ced36e7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/4508", "content": "https://redhat-satellite.si.uvsq.fr/users/login\n\nhttps://193.51.33.54/users/login\n\nCVE-2008-3844, CVE-2020-14145, CVE-2023-48795, CVE-2007-2768, CVE-2021-36368, CVE-2021-41617, CVE-2019-16905, CVE-2023-51385, CVE-2016-20012, CVE-2023-51767, CVE-2020-15778, CVE-2023-38408", "creation_timestamp": "2024-08-25T08:59:44.000000Z"}, {"uuid": "9d7803c0-d6ea-46fb-b989-50ff7c9b65fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/u5l-ZaeBoa4rQ-jCnAd-RyTkmBiEwVQkA95tqksDWv2Ihl4", "content": "", "creation_timestamp": "2024-08-26T12:45:39.000000Z"}, {"uuid": "f3c217f5-520f-4a52-9707-658facd11804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/f3s9IVswyS_q5vIubAePhSZoLQBpGshzQO-XvuudvdMllw", "content": "", "creation_timestamp": "2024-01-19T05:31:38.000000Z"}, {"uuid": "3daee0a3-413d-4992-a3d3-431f8854fa35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/w0w9iKcyXi70OnNrtP96yLy6sw-7f3qLcDmBnN0l3DtxqHg", "content": "", "creation_timestamp": "2024-07-01T14:33:02.000000Z"}, {"uuid": "9114b252-0ca1-4c89-b5d9-9fc639aadd4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/xGsLy8z3fANiCroIRCfALnNfiha1hqkEaeyvq7MCrScixms", "content": "", "creation_timestamp": "2024-07-01T14:34:42.000000Z"}, {"uuid": "94c10106-99d0-4525-8c8f-5b2d68a53f6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/ctinow/162808", "content": "https://ift.tt/8xFZuQL\nCVE-2023-51385", "creation_timestamp": "2024-01-04T07:51:53.000000Z"}, {"uuid": "b5c88d39-69af-4b60-a6ac-c34240f1df6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/ctinow/167193", "content": "https://ift.tt/Oxy36Zu\nCVE-2023-51385 | OpenSSH up to 9.5 Name os command injection", "creation_timestamp": "2024-01-12T11:06:24.000000Z"}, {"uuid": "e284d371-e1de-4c8f-9a63-3e8e4eafc2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/ctinow/159549", "content": "https://ift.tt/W5BOoEq\nCVE-2023-51385 Exploit", "creation_timestamp": "2023-12-27T09:16:37.000000Z"}, {"uuid": "522ad8c5-c2ff-4833-89c0-cc1376da3de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "https://t.me/ctinow/159717", "content": "https://ift.tt/iMvkoya\nOpenSSH Command Injection Vulnerability (CVE-2023-51385) Alert", "creation_timestamp": "2023-12-27T18:11:28.000000Z"}, {"uuid": "2c4ee877-b2d7-45b5-99a7-8615af6883a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "seen", "source": "Telegram/2G0LL9YDDO0dQKSo5p4zQWAL-pbipATIxiBPSKqKsYKP6RG0", "content": "", "creation_timestamp": "2024-07-01T14:30:24.000000Z"}, {"uuid": "f53b8107-a451-4167-b8a0-c59905636560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1753", "content": "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce\nProxyCommand==\u4ee3\u7801\u6267\u884c(CVE-2023-51385)\n#\u5206\u6790", "creation_timestamp": "2023-12-24T04:48:30.000000Z"}, {"uuid": "00e7aa64-95a5-4f68-921b-8f88e37a9102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5811", "content": "CVE-2023-51385 - OpenSSH OS command injection vulnerability\n\nLink\n\n#CVE \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-12-24T14:28:24.000000Z"}, {"uuid": "89863dc5-9a93-4f4c-9920-4fb148416c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9649", "content": "#exploit\n1. CVE-2023-51385:\nSSH ProxyCommand == unexpected code execution\nhttps://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html\n\n2. CVE-2023-49298:\nOpenZFS security bypass\nhttps://github.com/openzfs/zfs/pull/15571", "creation_timestamp": "2024-12-24T01:14:04.000000Z"}, {"uuid": "6020967f-547a-420a-afbf-dd6f18336c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51385", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2338", "content": "#exploit\n1. CVE-2023-51385:\nSSH ProxyCommand == unexpected code execution\nhttps://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html\n2. CVE-2023-49298:\nOpenZFS security bypass\nhttps://github.com/openzfs/zfs/pull/15571", "creation_timestamp": "2024-08-16T08:57:37.000000Z"}]}