Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Readme
# ssh_enum_users_CVE-2018-15473

Script que se aprovecha de la vulnerabilidad CVE-2018-15473 para enumerar usuarios.

![1](https://user-images.githubusercontent.com/67207446/233645844-f09d2989-aa67-4dbc-8572-68948f0b0a9c.png)

# Checker para CVE-2018-15473

Script para ver si el objetivo es vulnerable o no a CVE-2018-15473.

![1](https://user-images.githubusercontent.com/67207446/233646533-ab175e26-a996-4bbf-a218-6557bba02798.png)

File Snapshot

[4.0K] /data/pocs/782390dabaf36ab7875fc72b626cec1e05c172cc ├── [1.1K] checker_CVE-2018-15473.py ├── [ 436] README.md └── [1.4K] ssh_enum_users2.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →