{"uuid": "4367a276-0dd6-483c-b587-b564ea7a4be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2959", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}