Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/FeatherStark/CVE-2023-51385 | POC Details |
| 2 | None | https://github.com/watarium/poc-cve-2023-51385 | POC Details |
| 3 | This is a test | https://github.com/Tachanka-zz/CVE-2023-51385_test | POC Details |
| 4 | OpenSSH ProxyCommand RCE | https://github.com/Le1a/CVE-2023-51385 | POC Details |
| 5 | 一个验证对CVE-2023-51385 | https://github.com/zls1793/CVE-2023-51385_test | POC Details |
| 6 | CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc | https://github.com/WLaoDuo/CVE-2023-51385_poc-test | POC Details |
| 7 | None | https://github.com/zhulin2/testCVE-2023-51385 | POC Details |
| 8 | CVE-2023-51385_test-star-main | https://github.com/siyi-star/CVE-2023-51385_test-star-main | POC Details |
| 9 | CVE-2023-51385测试POC | https://github.com/N0rther/CVE-2023-51385_TT | POC Details |
| 10 | 一个验证对CVE-2023-51385 | https://github.com/power1314520/CVE-2023-51385_test | POC Details |
| 11 | CVE-2023-51385 PoC Exploit | https://github.com/WOOOOONG/CVE-2023-51385 | POC Details |
| 12 | None | https://github.com/uccu99/CVE-2023-51385 | POC Details |
| 13 | None | https://github.com/julienbrs/exploit-CVE-2023-51385 | POC Details |
| 14 | None | https://github.com/julienbrs/malicious-exploit-CVE-2023-51385 | POC Details |
| 15 | None | https://github.com/Sonicrrrr/CVE-2023-51385 | POC Details |
| 16 | CVE-2023-51385 | https://github.com/farliy-hacker/CVE-2023-51385 | POC Details |
| 17 | CVE-2023-51385-save | https://github.com/farliy-hacker/CVE-2023-51385-save | POC Details |
| 18 | CVE-2023-51385 的exp | https://github.com/2048JiaLi/CVE-2023-51385 | POC Details |
| 19 | Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385) | https://github.com/vin01/poc-proxycommand-vulnerable | POC Details |
| 20 | 一个验证对CVE-2023-51385 | https://github.com/LtmThink/CVE-2023-51385_test | POC Details |
| 21 | CVE-2023-51385 | https://github.com/thinkliving2020/CVE-2023-51385- | POC Details |
| 22 | This is a test | https://github.com/GoodPeople-ZhangSan/CVE-2023-51385_test | POC Details |
| 23 | None | https://github.com/c0deur/CVE-2023-51385 | POC Details |
| 24 | None | https://github.com/endasugrue/CVE-2023-51385_poc | POC Details |
| 25 | None | https://github.com/MiningBot-eth/CVE-2023-51385-exploit | POC Details |
| 26 | None | https://github.com/Featherw1t/CVE-2023-51385_test | POC Details |
| 27 | None | https://github.com/GroundCTL2MajorTom/CVE-2023-51385POC | POC Details |
| 28 | None | https://github.com/GroundCTL2MajorTom/CVE-2023-51385P-POC | POC Details |
| 29 | This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version | https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC | POC Details |
| 30 | None | https://github.com/runooovb/CVE-2023-51385test | POC Details |
No public POC found.
Login to generate AI POCNo comments yet