Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473). | https://github.com/trimstray/massh-enum | POC Details |
| 2 | CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug | https://github.com/gbonacini/opensshenum | POC Details |
| 3 | Exploit written in Python for CVE-2018-15473 with threading and export formats | https://github.com/Rhynorater/CVE-2018-15473-Exploit | POC Details |
| 4 | Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473 | https://github.com/epi052/cve-2018-15473 | POC Details |
| 5 | OpenSSH < 7.7 User Enumeration CVE-2018-15473 Exploit | https://github.com/pyperanger/CVE-2018-15473_exploit | POC Details |
| 6 | OpenSSH 7.7 - Username Enumeration | https://github.com/r3dxpl0it/CVE-2018-15473 | POC Details |
| 7 | Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473 | https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB | POC Details |
| 8 | cve-2018-15473 | https://github.com/cved-sources/cve-2018-15473 | POC Details |
| 9 | This is a exp of CVE-2018-15473 | https://github.com/LINYIKAI/CVE-2018-15473-exp | POC Details |
| 10 | OpenSSH 用户名枚举漏洞(CVE-2018-15473) | https://github.com/trickster1103/- | POC Details |
| 11 | SSH account enumeration verification script(CVE-2018-15473) | https://github.com/NHPT/SSH-account-enumeration-verification-script | POC Details |
| 12 | CVE-2018-15473-Exploit | https://github.com/CaioCGH/EP4-redes | POC Details |
| 13 | Project with sublist3r, massan, CVE-2018-15473, ssh bruteforce, ftp bruteforce and nikto. | https://github.com/Moon1705/easy_security | POC Details |
| 14 | Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified. | https://github.com/An0nYm0u5101/enumpossible | POC Details |
| 15 | None | https://github.com/Wh1t3Fox/cve-2018-15473 | POC Details |
| 16 | None | https://github.com/1stPeak/CVE-2018-15473 | POC Details |
| 17 | openssh<7.7 用户名枚举 | https://github.com/coollce/CVE-2018-15473_burte | POC Details |
| 18 | None | https://github.com/Dirty-Racoon/CVE-2018-15473-py3 | POC Details |
| 19 | OpenSSH 2.3 < 7.7 - Username Enumeration | https://github.com/Sait-Nuri/CVE-2018-15473 | POC Details |
| 20 | None | https://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7 | POC Details |
| 21 | CVE-2018-15473 Exploit | https://github.com/MrDottt/CVE-2018-15473 | POC Details |
| 22 | Test CVE-2018-15473 exploit on Shodan IP | https://github.com/66quentin/shodan-CVE-2018-15473 | POC Details |
| 23 | None | https://github.com/0xrobiul/CVE-2018-15473 | POC Details |
| 24 | None | https://github.com/philippedixon/CVE-2018-15473 | POC Details |
| 25 | SSH User Enumerator in Python3, CVE-2018-15473, I updated the code of this exploit (https://www.exploit-db.com/exploits/45939) to work with python3 instead of python2. | https://github.com/sergiovks/SSH-User-Enum-Python3-CVE-2018-15473 | POC Details |
| 26 | None | https://github.com/Anonimo501/ssh_enum_users_CVE-2018-15473 | POC Details |
| 27 | None | https://github.com/mclbn/docker-cve-2018-15473 | POC Details |
| 28 | User enumeration for CVE-2018-15473 | https://github.com/GaboLC98/userenum-CVE-2018-15473 | POC Details |
| 29 | SSH Username Enumeration | https://github.com/mrblue12-byte/CVE-2018-15473 | POC Details |
| 30 | None | https://github.com/4xolotl/CVE-2018-15473 | POC Details |
| 31 | None | https://github.com/NestyF/SSH_Enum_CVE-2018-15473 | POC Details |
| 32 | Fix for CVE-2018-15473 | https://github.com/yZ1337/CVE-2018-15473 | POC Details |
| 33 | None | https://github.com/MahdiOsman/CVE-2018-15473-SNMPv1-2-Community-String-Vulnerability-Testing | POC Details |
| 34 | FAFAF | https://github.com/SUDORM0X/PoC-CVE-2018-15473 | POC Details |
| 35 | SSHEnum es una herramienta de enumeración de usuarios SSH basada en CVE-2018-15473. Permite detectar usuarios válidos aprovechando respuestas diferenciadas del servidor. Es rápida, compatible con Python 3.12 y soporta wordlists. Uso exclusivo para auditoría y pruebas de seguridad autorizadas. | https://github.com/OmarV4066/SSHEnumKL | POC Details |
| 36 | A Bash script to enumerate valid SSH usernames using the CVE-2018-15473 vulnerability. It checks for valid usernames on an OpenSSH OpenSSH 7.2p2 server by analyzing authentication responses. | https://github.com/0xNehru/ssh_Enum_vaild | POC Details |
| 37 | Check if a username is valid on the SSH server by attempting an authentication. The server response will indicate whether the username exists. | https://github.com/moften/cve-2018-15473-poc | POC Details |
| 38 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/OpenSSH%20%E7%94%A8%E6%88%B7%E5%90%8D%E6%9E%9A%E4%B8%BE%E6%BC%8F%E6%B4%9E%20CVE-2018-15473.md | POC Details |
| 39 | https://github.com/vulhub/vulhub/blob/master/openssh/CVE-2018-15473/README.md | POC Details | |
| 40 | Fix for CVE-2018-15473 | https://github.com/yZeetje/CVE-2018-15473 | POC Details |
| 41 | This script checks for the OpenSSH 7.7 (and prior) username enumeration vulnerability (CVE-2018-15473). It sends a malformed authentication packet and interprets the SSH server’s response to identify valid usernames. | https://github.com/makmour/open-ssh-user-enumeration | POC Details |
| 42 | Fix for CVE-2018-15473 | https://github.com/yZee00/CVE-2018-15473 | POC Details |
| 43 | script de enumeración de usuarios SSH basado en diferencias de timing y respuestas de autenticación. Explota el mismo vector que CVE-2018-15473 en versiones vulnerables de OpenSSH (≤ 7.7), aunque también puede revelar patrones en configuraciones modernas. | https://github.com/Alph4Sec/ssh_enum_py | POC Details |
| 44 | Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 exploitation, stealth brute force capabilities, and fail2ban evasion techniques. Professional-grade security testing framework for authorized penetration testing engagements. | https://github.com/anonymous121029034720384234234/py-network-scanner | POC Details |
| 45 | Exploit Code for CVE-2018-15473 | https://github.com/jubeenshah/CVE-2018-15473-Exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-15468 | Xen 安全漏洞 | |
| CVE-2018-15469 | Xen 安全漏洞 | |
| CVE-2018-15470 | Xen 安全漏洞 | |
| CVE-2018-15471 | Linux kernel 缓冲区错误漏洞 | |
| CVE-2018-14057 | Pimcore 跨站请求伪造漏洞 | |
| CVE-2018-14058 | Pimcore SQL注入漏洞 | |
| CVE-2018-6622 | Trusted Platform Module 安全漏洞 | |
| CVE-2018-14981 | Android 访问控制错误漏洞 | |
| CVE-2018-14982 | Android GNSS application 访问控制错误漏洞 | |
| CVE-2018-15482 | Android 访问控制错误漏洞 |
No comments yet