Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Description
User enumeration for CVE-2018-15473
Readme
# Userenum CVE-2018-15473
User enumeration for CVE-2018-15473

This script is a method to use a user dictionary with the CVE-2018-15473 SSH User Enumeration by Leap Security (@LeapSecurity) https://leapsecurity.io.
Script developed to solve Valentine HTB machine.

## How to use it
**1st. Download the main script with**
*searchsploit -x linux/remote/45939.py*
  
**2nd. Change the parameters in the userenum.py script**

**3rd. Run the script with**
*python3 userenum.py*
File Snapshot

[4.0K] /data/pocs/0d39227f281d4b0729c106ba00cb85dd04e35568 ├── [ 473] README.md └── [ 704] userenum.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →