Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 9 | 0:8.7p1-38.el9_4.1 ~ * | cpe:/a:redhat:enterprise_linux:9::appstream | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:8.7p1-38.el9_4.1 ~ * | cpe:/a:redhat:enterprise_linux:9::appstream | |
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | 0:8.7p1-12.el9_0.1 ~ * | cpe:/a:redhat:rhel_e4s:9.0::appstream | |
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 0:8.7p1-30.el9_2.4 ~ * | cpe:/o:redhat:rhel_eus:9.2::baseos | |
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 413.92.202407091321-0 ~ * | cpe:/a:redhat:openshift:4.13::el9 | |
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 414.92.202407091253-0 ~ * | cpe:/a:redhat:openshift:4.14::el8 | |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | 415.92.202407091355-0 ~ * | cpe:/a:redhat:openshift:4.15::el8 | |
| Red Hat | Red Hat OpenShift Container Platform 4.16 | 416.94.202407081958-0 ~ * | cpe:/a:redhat:openshift:4.16::el9 | |
| Red Hat | Red Hat Ceph Storage 5 | - | cpe:/a:redhat:ceph_storage:5 | |
| Red Hat | Red Hat Ceph Storage 6 | - | cpe:/a:redhat:ceph_storage:6 | |
| Red Hat | Red Hat Ceph Storage 7 | - | cpe:/a:redhat:ceph_storage:7 | |
| Red Hat | Red Hat Enterprise Linux 10 | - | cpe:/o:redhat:enterprise_linux:10 | |
| Red Hat | Red Hat Enterprise Linux 6 | - | cpe:/o:redhat:enterprise_linux:6 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 8 | - | cpe:/o:redhat:enterprise_linux:8 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | a signal handler race condition in OpenSSH's server (sshd) | https://github.com/zgzhang/cve-2024-6387-poc | POC Details |
| 2 | None | https://github.com/acrono/cve-2024-6387-poc | POC Details |
| 3 | None | https://github.com/lflare/cve-2024-6387-poc | POC Details |
| 4 | Spirit - Network Pentest Tools CVE-2024-6387 | https://github.com/theaog/spirit | POC Details |
| 5 | None | https://github.com/shyrwall/cve-2024-6387-poc | POC Details |
| 6 | None | https://github.com/getdrive/CVE-2024-6387-PoC | POC Details |
| 7 | SSHd cve-2024-6387-poc | https://github.com/FerasAlrimali/CVE-2024-6387-POC | POC Details |
| 8 | None | https://github.com/passwa11/cve-2024-6387-poc | POC Details |
| 9 | None | https://github.com/jack0we/CVE-2024-6387 | POC Details |
| 10 | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH | https://github.com/xaitax/CVE-2024-6387_Check | POC Details |
| 11 | Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others. | https://github.com/bigb0x/CVE-2024-6387 | POC Details |
| 12 | CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387 | https://github.com/wiggels/regresshion-check | POC Details |
| 13 | SSH RCE PoC CVE-2024-6387 | https://github.com/3yujw7njai/CVE-2024-6387 | POC Details |
| 14 | OpenSSH CVE-2024-6387 Vulnerability Checker | https://github.com/betancour/OpenSSH-Vulnerability-test | POC Details |
| 15 | None | https://github.com/zgimszhd61/cve-2024-6387-poc | POC Details |
| 16 | None | https://github.com/yya1233/CVE-2024-6387-Updated-SSH-RCE | POC Details |
| 17 | None | https://github.com/muyuanlove/CVE-2024-6387fixshell | POC Details |
| 18 | Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications. | https://github.com/TAM-K592/CVE-2024-6387 | POC Details |
| 19 | This is a POC I wrote for CVE-2024-6387 | https://github.com/teamos-hub/regreSSHion | POC Details |
| 20 | None | https://github.com/Maikefee/CVE-2024-6387_Check.py | POC Details |
| 21 | None | https://github.com/ahlfors/CVE-2024-6387 | POC Details |
| 22 | None | https://github.com/Mufti22/CVE-2024-6387-checkher | POC Details |
| 23 | CVE-2024-6387 exploit | https://github.com/thegenetic/CVE-2024-6387-exploit | POC Details |
| 24 | RCE OpenSSH CVE-2024-6387 Check | https://github.com/HadesNull123/CVE-2024-6387_Check | POC Details |
| 25 | This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently. | https://github.com/R4Tw1z/CVE-2024-6387 | POC Details |
| 26 | This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH. | https://github.com/d0rb/CVE-2024-6387 | POC Details |
| 27 | None | https://github.com/oliferFord/CVE-2024-6387-SSH-RCE | POC Details |
| 28 | Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https://github.com/bigb0x/CVE-2024-6387 using ChatGPT to translate the code to PHP. | https://github.com/CiderAndWhisky/regression-scanner | POC Details |
| 29 | Script for checking CVE-2024-6387 (regreSSHion) | https://github.com/shamo0/CVE-2024-6387_PoC | POC Details |
| 30 | CVE-2024-6387-nmap | https://github.com/paradessia/CVE-2024-6387-nmap | POC Details |
| 31 | This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability. | https://github.com/SecWithMoh/CVE-2024-6387 | POC Details |
| 32 | Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in | https://github.com/PrincipalAnthony/CVE-2024-6387-Updated-x64bit | POC Details |
| 33 | None | https://github.com/k4t3pr0/CVE-2024-6387-POC | POC Details |
| 34 | An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version. | https://github.com/DanWiseProgramming/CVE-2024-6387-Mitigation-Ansible-Playbook | POC Details |
| 35 | openssh-cve-2024-6387.sh | https://github.com/rumochnaya/openssh-cve-2024-6387.sh | POC Details |
| 36 | Mitigation Guide for CVE-2024-6387 in OpenSSH | https://github.com/zenzue/CVE-2024-6387-Mitigation | POC Details |
| 37 | None | https://github.com/devarshishimpi/CVE-2024-6387-Check | POC Details |
| 38 | cve-2024-6387_AImade | https://github.com/hssmo/cve-2024-6387_AImade | POC Details |
| 39 | None | https://github.com/ACHUX21/checker-CVE-2024-6387 | POC Details |
| 40 | CVE-2024-6387 with auto ip scanner and auto expliot | https://github.com/AiGptCode/ssh_exploiter_CVE-2024-6387 | POC Details |
| 41 | A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387 | https://github.com/xristos8574/regreSSHion-nmap-scanner | POC Details |
| 42 | CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems. | https://github.com/xonoxitron/regreSSHion | POC Details |
| 43 | 开箱即用的AK47 | https://github.com/no-one-sec/CVE-2024-6387 | POC Details |
| 44 | None | https://github.com/dawnl3ss/CVE-2024-6387 | POC Details |
| 45 | None | https://github.com/MrR0b0t19/CVE-2024-6387-Exploit-POC | POC Details |
| 46 | CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server | https://github.com/th3gokul/CVE-2024-6387 | POC Details |
| 47 | Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH | https://github.com/n1cks0n/Test_CVE-2024-6387 | POC Details |
| 48 | PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | https://github.com/l0n3m4n/CVE-2024-6387 | POC Details |
| 49 | CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH. | https://github.com/RickGeex/CVE-2024-6387-Checker | POC Details |
| 50 | Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387). | https://github.com/xonoxitron/regreSSHion-checker | POC Details |
| 51 | None | https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template | POC Details |
| 52 | None | https://github.com/edsonjt81/CVE-2024-6387_Check | POC Details |
| 53 | None | https://github.com/EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker | POC Details |
| 54 | regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script | https://github.com/grupooruss/CVE-2024-6387-Tester | POC Details |
| 55 | None | https://github.com/CognisysGroup/CVE-2024-6387-Checker | POC Details |
| 56 | Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. | https://github.com/sxlmnwb/CVE-2024-6387 | POC Details |
| 57 | SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems | https://github.com/Symbolexe/CVE-2024-6387 | POC Details |
| 58 | SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments. | https://github.com/harshinsecurity/sentinelssh | POC Details |
| 59 | None | https://github.com/t3rry327/cve-2024-6387-poc | POC Details |
| 60 | None | https://github.com/jocker2410/CVE-2024-6387_poc | POC Details |
| 61 | CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。 | https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc | POC Details |
| 62 | Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows. | https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker | POC Details |
| 63 | None | https://github.com/sms2056/CVE-2024-6387 | POC Details |
| 64 | Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387 | https://github.com/invaderslabs/regreSSHion-CVE-2024-6387- | POC Details |
| 65 | None | https://github.com/lala-amber/CVE-2024-6387 | POC Details |
| 66 | rewrited SSH Exploit for CVE-2024-6387 (regreSSHion) | https://github.com/4lxprime/regreSSHive | POC Details |
| 67 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | https://github.com/sardine-web/CVE-2024-6387_Check | POC Details |
| 68 | HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion). | https://github.com/0x4D31/cve-2024-6387_hassh | POC Details |
| 69 | CVE-2024-6387-Check es una herramienta ligera y eficiente diseñada para identificar servidores que ejecutan versiones vulnerables de OpenSSH, específicamente el fallo de seguridad conocido como regreSSHion (CVE-2024-6387). Este script facilita el análisis rápido de múltiples direcciones IP, nombres de dominio y rangos de red CIDR. | https://github.com/Segurmatica/CVE-2024-6387-CHECK | POC Details |
| 70 | Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387 | https://github.com/sardine-web/CVE-2024-6387-template | POC Details |
| 71 | None | https://github.com/imv7/CVE-2024-6387 | POC Details |
| 72 | CVE-2024-6387 SSH finder | https://github.com/SiberianHacker/CVE-2024-6387-Finder | POC Details |
| 73 | Correção e Atualização do OpenSSH para CVE-2024-6387 | https://github.com/dgicloud/patch_regreSSHion | POC Details |
| 74 | Vulnerability remediation and mitigationCVE-2024-6387 | https://github.com/azurejoga/CVE-2024-6387-how-to-fix | POC Details |
| 75 | regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script | https://github.com/grupooruss/CVE-2024-6387 | POC Details |
| 76 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | https://github.com/asterictnl-lvdw/CVE-2024-6387 | POC Details |
| 77 | Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387 | https://github.com/vkaushik-chef/regreSSHion | POC Details |
| 78 | None | https://github.com/dgourillon/mitigate-CVE-2024-6387 | POC Details |
| 79 | None | https://github.com/mrmtwoj/CVE-2024-6387 | POC Details |
| 80 | This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file. | https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker | POC Details |
| 81 | This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability | https://github.com/kubota/CVE-2024-6387-Vulnerability-Checker | POC Details |
| 82 | None | https://github.com/DimaMend/cve-2024-6387-poc | POC Details |
| 83 | Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2024-6409, CVE-2006-5051, CVE-2008-4109, and 16 other CVEs. | https://github.com/bigb0x/SSH-Scanner | POC Details |
| 84 | CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH. | https://github.com/ThemeHackers/CVE-2024-6387 | POC Details |
| 85 | OpenSSH vulnerability CVE-2024-6387 | https://github.com/Sibijo/mitigate_ssh | POC Details |
| 86 | Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian | https://github.com/Passyed/regreSSHion-Fix | POC Details |
| 87 | Lỗ hổng thực thi mã không được xác thực từ xa trong máy chủ OpenSSH | https://github.com/k4t3pr0/CVE-2024-6387-Check | POC Details |
| 88 | Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd. | https://github.com/liqhtnd/sshd-logingracetime0 | POC Details |
| 89 | OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire | https://github.com/Jhonsonwannaa/CVE-2024-6387 | POC Details |
| 90 | OpenSSH RCE Massive Vulnerable Scanner | https://github.com/ThatNotEasy/CVE-2024-6387 | POC Details |
| 91 | None | https://github.com/W1hithat/CVE-2024-6387 | POC Details |
| 92 | None | https://github.com/prelearn-code/CVE-2024-6387 | POC Details |
| 93 | proof of concept python script for regreSSHion exploit | https://github.com/l-urk/CVE-2024-6387 | POC Details |
| 94 | An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server | https://github.com/alex14324/ssh_poc2024 | POC Details |
| 95 | Proof of concept python script for regreSSHion exploit. Version 0.1.0. | https://github.com/l-urk/CVE-2024-6387-L | POC Details |
| 96 | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH. | https://github.com/niktoproject/CVE-202406387_Check.py | POC Details |
| 97 | None | https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH | POC Details |
| 98 | A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems against potential remote code execution risks associated with affected OpenSSH versions. | https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix | POC Details |
| 99 | This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file. | https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker | POC Details |
| 100 | In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems. | https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387 | POC Details |
| 101 | An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version. | https://github.com/daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook | POC Details |
| 102 | OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire | https://github.com/dream434/CVE-2024-6387 | POC Details |
| 103 | None | https://github.com/skysaints/CVE-2024-6387-POC | POC Details |
| 104 | None | https://github.com/skyalliance/CVE-2024-6387-POC | POC Details |
| 105 | None | https://github.com/YassDEV221608/CVE-2024-6387 | POC Details |
| 106 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | https://github.com/oxapavan/CVE-2024-6387 | POC Details |
| 107 | None | https://github.com/zql-gif/CVE-2024-6387 | POC Details |
| 108 | test code for cve-2024-6387 | https://github.com/awusan125/test_for6387 | POC Details |
| 109 | CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH. | https://github.com/anhvutuan/CVE-2024-6387-poc-1 | POC Details |
| 110 | None | https://github.com/YassDEV221608/CVE-2024-6387_PoC | POC Details |
| 111 | Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd. | https://github.com/liqhtnd/sshd-logingracetime | POC Details |
| 112 | This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the CVE through them. | https://github.com/AzrDll/CVE-2024-6387 | POC Details |
| 113 | None | https://github.com/SkyGodling/CVE-2024-6387-POC | POC Details |
| 114 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | https://github.com/Karmakstylez/CVE-2024-6387 | POC Details |
| 115 | SSH RCE PoC CVE-2024-6387 | https://github.com/AiK1d/CVE-2024-6387 | POC Details |
| 116 | OpenSSH vulnerability CVE-2024-6387 | https://github.com/redux-sibi-jose/mitigate_ssh | POC Details |
| 117 | Nuclei template to detect CVE-2024-6387. All latest patched versions are excluded. | https://github.com/xiw1ll/CVE-2024-6387_Checker | POC Details |
| 118 | CVE-2024-6387 | https://github.com/moften/regreSSHion-CVE-2024-6387 | POC Details |
| 119 | SSH RCE PoC CVE-2024-6387 | https://github.com/P4x1s/CVE-2024-6387 | POC Details |
| 120 | CVE-2024-6387 Exploit mit Reverse/Bind-Shell Support. | https://github.com/OhDamnn/Noregressh | POC Details |
| 121 | Relatório de Pentest Full-Scope (Black Box) focado em Red Team. Análise de segurança Web (SQL Injection, XSS), Wireless (WEP/WPA2), Evasão de Firewall (IP Fragmentation) e Exploração de RCE em OpenSSH (CVE-2024-6387). | https://github.com/arielrbrdev/redteamlab1 | POC Details |
| 122 | This is an altered PoC for d0rb/CVE-2024-6387. This takes glibc addresses and trys to exploit the CVE through them. | https://github.com/kinu404/CVE-2024-6387 | POC Details |
| 123 | None | https://github.com/Ngagne-Demba-Dia/CVE-2024-6387-corrigee | POC Details |
No public POC found.
Login to generate AI POCNo comments yet