高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/FeatherStark/CVE-2023-51385 | POC詳細 |
| 2 | None | https://github.com/watarium/poc-cve-2023-51385 | POC詳細 |
| 3 | This is a test | https://github.com/Tachanka-zz/CVE-2023-51385_test | POC詳細 |
| 4 | OpenSSH ProxyCommand RCE | https://github.com/Le1a/CVE-2023-51385 | POC詳細 |
| 5 | 一个验证对CVE-2023-51385 | https://github.com/zls1793/CVE-2023-51385_test | POC詳細 |
| 6 | CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc | https://github.com/WLaoDuo/CVE-2023-51385_poc-test | POC詳細 |
| 7 | None | https://github.com/zhulin2/testCVE-2023-51385 | POC詳細 |
| 8 | CVE-2023-51385_test-star-main | https://github.com/siyi-star/CVE-2023-51385_test-star-main | POC詳細 |
| 9 | CVE-2023-51385测试POC | https://github.com/N0rther/CVE-2023-51385_TT | POC詳細 |
| 10 | 一个验证对CVE-2023-51385 | https://github.com/power1314520/CVE-2023-51385_test | POC詳細 |
| 11 | CVE-2023-51385 PoC Exploit | https://github.com/WOOOOONG/CVE-2023-51385 | POC詳細 |
| 12 | None | https://github.com/uccu99/CVE-2023-51385 | POC詳細 |
| 13 | None | https://github.com/julienbrs/exploit-CVE-2023-51385 | POC詳細 |
| 14 | None | https://github.com/julienbrs/malicious-exploit-CVE-2023-51385 | POC詳細 |
| 15 | None | https://github.com/Sonicrrrr/CVE-2023-51385 | POC詳細 |
| 16 | CVE-2023-51385 | https://github.com/farliy-hacker/CVE-2023-51385 | POC詳細 |
| 17 | CVE-2023-51385-save | https://github.com/farliy-hacker/CVE-2023-51385-save | POC詳細 |
| 18 | CVE-2023-51385 的exp | https://github.com/2048JiaLi/CVE-2023-51385 | POC詳細 |
| 19 | Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385) | https://github.com/vin01/poc-proxycommand-vulnerable | POC詳細 |
| 20 | 一个验证对CVE-2023-51385 | https://github.com/LtmThink/CVE-2023-51385_test | POC詳細 |
| 21 | CVE-2023-51385 | https://github.com/thinkliving2020/CVE-2023-51385- | POC詳細 |
| 22 | This is a test | https://github.com/GoodPeople-ZhangSan/CVE-2023-51385_test | POC詳細 |
| 23 | None | https://github.com/c0deur/CVE-2023-51385 | POC詳細 |
| 24 | None | https://github.com/endasugrue/CVE-2023-51385_poc | POC詳細 |
| 25 | None | https://github.com/MiningBot-eth/CVE-2023-51385-exploit | POC詳細 |
| 26 | None | https://github.com/Featherw1t/CVE-2023-51385_test | POC詳細 |
| 27 | None | https://github.com/GroundCTL2MajorTom/CVE-2023-51385POC | POC詳細 |
| 28 | None | https://github.com/GroundCTL2MajorTom/CVE-2023-51385P-POC | POC詳細 |
| 29 | This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version | https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC | POC詳細 |
| 30 | None | https://github.com/runooovb/CVE-2023-51385test | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2023-3430 | 7.5 HIGH | Openimageio: heap-buffer-overflow in file src/gif.imageio/gifinput.cpp |
| CVE-2023-48795 | OpenSSH 安全漏洞 | |
| CVE-2023-50979 | Crypto++ 安全漏洞 | |
| CVE-2023-50980 | Crypto++ 安全漏洞 | |
| CVE-2023-50981 | Crypto++ 安全漏洞 | |
| CVE-2023-51384 | OpenSSH 安全漏洞 |
まだコメントはありません