mirror of
https://github.com/0xMarcio/cve.git
synced 2026-03-27 17:30:27 +01:00
1.9 KiB
1.9 KiB
CVE-2016-20012
Description
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
POC
Reference
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
- https://rushter.com/blog/public-ssh-keys/
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Maribel0370/Nebula-io
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Totes5706/TotesHTB
- https://github.com/accalina/crowflag
- https://github.com/alvarigno/ChocolateFire-DockerLab
- https://github.com/alvarigno22/ChocolateFire-DockerLab
- https://github.com/aztec-eagle/cve-2016-20012
- https://github.com/chav00ooo/CYB333-Final-VulnerabilityScanner
- https://github.com/firatesatoglu/iot-searchengine
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/krlabs/openssh-vulnerabilities
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/omerfsen/terraform-almalinux-libvirt
- https://github.com/omerfsen/terraform-rockylinux-libvirt
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/phx/cvescan
- https://github.com/vhgalvez/terraform-rockylinux-libvirt-kvm
- https://github.com/wooflock/nmap-airgapped-vulnscan