{"vulnerability": "CVE-2025-26465", "sightings": [{"uuid": "fe458ddc-bf7b-4268-85e4-0b027577245a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/almalinux.org/post/3lk6twnmyv62o", "content": "", "creation_timestamp": "2025-03-12T15:01:05.716658Z"}, {"uuid": "197d08e2-b6af-4a31-a77c-f2f4fe49c88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lji3tgcfjk2o", "content": "", "creation_timestamp": "2025-03-03T13:51:12.225796Z"}, {"uuid": "f9451409-168b-4449-ab51-2d7f5aa1ed5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ljatzix7na2s", "content": "", "creation_timestamp": "2025-02-28T16:42:45.298512Z"}, {"uuid": "7b1b64df-24f5-416e-b0c5-263e81e4da04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lih5tgnx5k2k", "content": "", "creation_timestamp": "2025-02-18T11:29:07.852826Z"}, {"uuid": "dba2598e-61f9-4232-8603-f3e28d8230fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lihi2ul3z22d", "content": "", "creation_timestamp": "2025-02-18T14:32:14.264844Z"}, {"uuid": "4687f7a2-c07d-476a-9076-4c56b1ad5318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lihi5y2sw22i", "content": "", "creation_timestamp": "2025-02-18T14:34:00.445904Z"}, {"uuid": "919fcc47-d7cd-4f82-bce5-dfa12056f240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/jschauma.mstdn.social.ap.brid.gy/post/3lihinrsskxo2", "content": "", "creation_timestamp": "2025-02-18T14:43:22.794643Z"}, {"uuid": "1bcff596-630f-47d3-a170-550f0c1c0aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lihngclace62", "content": "", "creation_timestamp": "2025-02-18T16:08:56.362135Z"}, {"uuid": "d220e7de-5931-4d0d-b52d-e12625d6bba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lihnne4xqs2v", "content": "", "creation_timestamp": "2025-02-18T16:12:06.233870Z"}, {"uuid": "0b7c9c49-7ac4-4f6d-952f-52b4f6e3b568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lihnomvhvc2v", "content": "", "creation_timestamp": "2025-02-18T16:12:44.819715Z"}, {"uuid": "777d6029-2082-4d4d-8454-bd67133cc4e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/qualysofficial.bsky.social/post/3lihpass6ek2h", "content": "", "creation_timestamp": "2025-02-18T16:40:51.359327Z"}, {"uuid": "a59d8ef6-353e-4df6-a79c-4d0190fbed03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/rxerium.com/post/3lihs3zmscc2c", "content": "", "creation_timestamp": "2025-02-18T17:31:49.366558Z"}, {"uuid": "80c54687-2ee3-4c28-ad0d-ee9b009fb14a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lihsj6dlze2h", "content": "", "creation_timestamp": "2025-02-18T17:39:10.737266Z"}, {"uuid": "72a273f4-4743-448b-8a70-e2acd795de76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lihtzxhy342u", "content": "", "creation_timestamp": "2025-02-18T18:06:27.132260Z"}, {"uuid": "bad703da-105f-4852-bf46-9d40fc438f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3lihu5oltpk2s", "content": "", "creation_timestamp": "2025-02-18T18:08:34.158860Z"}, {"uuid": "341b1604-d218-4bab-8d8a-980296e5ef5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihxx4s7sh2p", "content": "", "creation_timestamp": "2025-02-18T19:16:26.928700Z"}, {"uuid": "aabb7557-88de-499f-a547-4c63bfb49216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lihyo7c65c2a", "content": "", "creation_timestamp": "2025-02-18T19:29:21.966191Z"}, {"uuid": "7b2011af-4af0-4660-9f7e-6080c7666cc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/ehcgroup.bsky.social/post/3lii53mtu5s2k", "content": "", "creation_timestamp": "2025-02-18T20:48:28.748291Z"}, {"uuid": "25944157-6dfb-46d6-b287-8072d31b8061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html", "content": "", "creation_timestamp": "2025-02-18T14:34:00.000000Z"}, {"uuid": "49ac82c2-5b00-4a37-b060-561445d7840b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/harmonic-osc.bsky.social/post/3liinbylum22t", "content": "", "creation_timestamp": "2025-02-19T01:38:21.122246Z"}, {"uuid": "099f0dec-41b4-4314-96b2-834c6aff979c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/jfreeg.bsky.social/post/3liiylja7fq2o", "content": "", "creation_timestamp": "2025-02-19T05:00:31.777050Z"}, {"uuid": "8345aa13-34a3-421e-97de-f6f6927993ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3liiyukm2ms25", "content": "", "creation_timestamp": "2025-02-19T05:05:35.179700Z"}, {"uuid": "f8ae265b-5f2e-43ee-bb5f-0825c5c99364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lij2agwy5s26", "content": "", "creation_timestamp": "2025-02-19T05:30:07.394015Z"}, {"uuid": "86178929-80cd-42e7-81c1-02856693dc6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lij3bybwp226", "content": "", "creation_timestamp": "2025-02-19T05:48:52.950687Z"}, {"uuid": "b8b8e162-1daa-41e8-a1bb-01db0a753fc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lijgeinp6rl2", "content": "", "creation_timestamp": "2025-02-19T09:07:41.330494Z"}, {"uuid": "6a4fd262-3a17-463a-9a4f-c00f8e7ba3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lin3k6wgl22x", "content": "", "creation_timestamp": "2025-02-20T20:04:09.058897Z"}, {"uuid": "174eaf3a-1189-45a6-9f93-c3ebb63f053b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lin3ssh7c22x", "content": "", "creation_timestamp": "2025-02-20T20:08:58.219226Z"}, {"uuid": "375261f7-db40-4b5b-9a16-9f449cfcd8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3linphk6jjl2j", "content": "", "creation_timestamp": "2025-02-21T02:00:33.642868Z"}, {"uuid": "e13d1364-aca6-4d75-af28-17c7d551dd82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/almalinux.bsky.social/post/3ljjhle4rar2j", "content": "", "creation_timestamp": "2025-03-04T02:54:06.032152Z"}, {"uuid": "6780aa8e-a1a5-4dcd-9d5b-16bc7ccb051c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/fernand0.bsky.social/post/3lkgfkjjeoa2j", "content": "", "creation_timestamp": "2025-03-15T15:05:00.257898Z"}, {"uuid": "981e985c-e7ae-4239-900a-b5f38de9c60f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "d0c5b632-cc8a-42e4-a4d8-bee2f3be3013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/qualysofficial.bsky.social/post/3lvywrhkvtc2v", "content": "", "creation_timestamp": "2025-08-09T23:38:10.794023Z"}, {"uuid": "725d5da6-c428-42da-b595-5b09ddff4402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://censys.com/blog/under-ctrl-dissecting-a-previously-undocumented-russian-net-access-framework/", "content": "", "creation_timestamp": "2026-03-31T02:00:10.000000Z"}, {"uuid": "934427b0-fdb8-4c6a-9487-851fbd4ca92f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/habr_com_news/34495", "content": "\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u043e \u0418\u0411 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Qualys \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0434\u0432\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (MITM\u2011\u0430\u0442\u0430\u043a\u0430 CVE-2025-26465 \u0438 DoS\u2011\u0430\u0442\u0430\u043a\u0430 CVE-2025-26466) \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430\u043c SSH 2.0 \u0438 SFTP \u2014 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 OpenSSH. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0435\u043a\u0442\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a OpenSSH 9.9p2, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n#\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430", "creation_timestamp": "2025-02-20T09:44:48.000000Z"}, {"uuid": "f2467f42-7ccf-4ee0-a4b7-152f7ee66fe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/cvedetector/18338", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26465 - OpenSSH DNS Host Key Verification Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-26465 \nPublished : Feb. 18, 2025, 7:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:33.000000Z"}, {"uuid": "e3c156fd-20ed-4117-8cb0-b0890ff519c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "Telegram/546xkk5iZq9lS6Wn6UxQt26rJ7MPTDiZo21bD3wNWxt5jPgY", "content": "", "creation_timestamp": "2025-02-19T15:39:50.000000Z"}, {"uuid": "4df07f02-2433-4262-943c-2ec1e13ea525", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10572", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "350bb615-4cba-4e8c-93fe-3939a3e65b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10581", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "767b2b55-d4fc-4edd-bc4f-6506b10a6d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/10580", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "375195a3-ee7c-4fcf-8f7e-e839c5a43a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2977", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "cddd9d63-33d5-4ff2-83e3-fde6bc386451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2972", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "73197241-2788-445c-a565-095527beb0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2973", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "48136e38-008c-40f9-ba68-d42bca546c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/nemeZ1da_ru/5598", "content": "\u0412 OpenSSH \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb (MitM) \u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (DoS). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u043c \u043f\u043e\u0434\u0440\u0430\u0437\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Qualys.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c , \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-26465 , \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043a\u043e\u0434\u0435 OpenSSH-\u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0441 6.8p1 \u043f\u043e 9.9p1. \u041e\u0448\u0438\u0431\u043a\u0430 \u0434\u0435\u043b\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0435 MitM-\u0430\u0442\u0430\u043a\u0438, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS. \u0412 \u0442\u0430\u043a\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0439 \u043a\u043b\u044e\u0447 \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435, \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u044b\u0434\u0430\u0432\u0430\u044f \u0441\u0435\u0431\u044f \u0437\u0430 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440. \u0414\u0430\u043d\u043d\u044b\u0439 \u0431\u0430\u0433 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 OpenSSH \u0441 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2014 \u0433\u043e\u0434\u0430.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2025-26466 , \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u0430\u043a \u043a\u043b\u0438\u0435\u043d\u0442, \u0442\u0430\u043a \u0438 \u0441\u0435\u0440\u0432\u0435\u0440 OpenSSH, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 9.5p1. \u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u044d\u0442\u0430\u043f\u0435 \u043f\u0440\u0435\u0434\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u0447\u0440\u0435\u0437\u043c\u0435\u0440\u043d\u043e\u0435 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 \u043a\u043e\u0434\u0435 OpenSSH \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2023 \u0433\u043e\u0434\u0430.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2025-26465 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c SSH-\u0441\u0435\u0441\u0441\u0438\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c. \u041e\u0434\u043d\u0430\u043a\u043e \u0435\u0441\u0442\u044c \u0432\u0430\u0436\u043d\u044b\u0439 \u043d\u044e\u0430\u043d\u0441: \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u0430\u044f \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438, \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430.\n\n\u041e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0432 OpenSSH 9.9p2, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0439 18 \u0444\u0435\u0432\u0440\u0430\u043b\u044f. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0440\u0438\u0441\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-02-25T13:07:22.000000Z"}, {"uuid": "36b7e4f8-490d-423a-8955-e259d0200bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/ctinow/231009", "content": "Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 &amp; CVE-2025-26466\nhttps://ift.tt/p4inuOV", "creation_timestamp": "2025-02-18T10:09:11.000000Z"}, {"uuid": "f6a910b5-6c01-4ce4-8238-2f9ad6f29b15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljstyl55lo2h", "content": "", "creation_timestamp": "2025-03-07T20:30:09.642588Z"}, {"uuid": "c4ee1294-f609-42c9-8ddf-f0f2b9ae23a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3litiuhjcfs2y", "content": "", "creation_timestamp": "2025-02-23T09:18:28.320903Z"}, {"uuid": "43da642d-439d-4d41-9715-ce0ea3d0161d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljiqup5nb22o", "content": "", "creation_timestamp": "2025-03-03T20:07:44.397099Z"}, {"uuid": "109b6135-da98-46bf-b3c3-9a97bfacfca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/xc0py.bsky.social/post/3lijqisz23c2z", "content": "", "creation_timestamp": "2025-02-19T12:08:33.877344Z"}, {"uuid": "86c634aa-44e9-4cf2-a535-6a01768973a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3lijsen7ues2x", "content": "", "creation_timestamp": "2025-02-19T12:42:00.093679Z"}, {"uuid": "26ed9bd5-d18a-431e-a638-799e635ad0fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/insightsintothings.bsky.social/post/3lijtlcsaqk2e", "content": "", "creation_timestamp": "2025-02-19T13:02:32.172585Z"}, {"uuid": "9dfd8f15-4a5f-482e-8e14-137412e89927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://threatintel.cc/2025/02/19/new-openssh-flaws-enable-maninthemiddle.html", "content": "", "creation_timestamp": "2025-02-19T11:40:45.000000Z"}, {"uuid": "a58b1273-222b-4b35-aa52-41c596f25c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lik2mgyzzk2u", "content": "", "creation_timestamp": "2025-02-19T15:09:32.853432Z"}, {"uuid": "74b72fb2-9eaf-4d5b-b00c-625bde3329b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/cmcannady.bsky.social/post/3lik4v74pbs2t", "content": "", "creation_timestamp": "2025-02-19T15:50:12.794348Z"}, {"uuid": "cc7694f7-8d73-4c4f-b5d3-24fe4910a963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3likks3pwmf32", "content": "", "creation_timestamp": "2025-02-19T20:02:56.564132Z"}, {"uuid": "cbdfa050-fb4c-45c4-b759-b792a17dd6b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3likq6whn3s2n", "content": "", "creation_timestamp": "2025-02-19T21:35:38.311261Z"}, {"uuid": "16574e17-3ff8-40a4-a8a1-796e1db801de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3limpdqc7jmg2", "content": "", "creation_timestamp": "2025-02-20T16:28:28.760732Z"}, {"uuid": "34e29e6c-cb8b-4e59-adf6-718ef93ff847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/maik.io/post/3limtytek3g2i", "content": "", "creation_timestamp": "2025-02-20T17:49:07.969481Z"}, {"uuid": "55cf9764-4dec-4bc7-942a-544e78a3198a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/almalinux.bsky.social/post/3limyffyzh32n", "content": "", "creation_timestamp": "2025-02-20T19:07:46.117192Z"}, {"uuid": "f9e17072-a46a-4912-becb-75f629470dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lpk4su2wr42b", "content": "", "creation_timestamp": "2025-05-19T17:45:13.317999Z"}, {"uuid": "089206a9-359f-4f8b-b05e-f1eb146420b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3mao2zsfgdk2s", "content": "", "creation_timestamp": "2025-12-23T15:32:15.759335Z"}, {"uuid": "dde52390-4c8d-4003-9a3d-869f0d3a4bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/14623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPatch Manual para a corre\u00e7\u00e3o das  CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH\nURL\uff1ahttps://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-21T09:21:01.000000Z"}, {"uuid": "488305e9-98db-4ee3-8a76-5e4c4e7e0050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "Telegram/lSatndSHKvXeOOkCe4BtgugIcZcDihrdZBJA4iXwuYPkAsH3oA", "content": "", "creation_timestamp": "2025-08-17T02:42:32.000000Z"}, {"uuid": "5a6082e9-20c2-4cc4-80bc-49e3d05874fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/ton618cyber/2504", "content": "New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks \n\nTwo OpenSSH vulnerabilities (CVE-2025-26465, CVE-2025-26466) allow MitM and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:29.000000Z"}, {"uuid": "036608a0-e3d7-47df-ba38-f8b4a75c6284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/CyberBulletin/2352", "content": "\u26a1Two new vulnerabilities found in OpenSSH \u2013 one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS). CVE-2025-26465 and CVE-2025-26466.\n\n#CyberBulletin", "creation_timestamp": "2025-02-19T03:20:53.000000Z"}, {"uuid": "fcf249c9-ca7b-4119-95dc-d772e663e7bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10579", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "9572d3c9-b192-48d1-9395-8fa253e8d9b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10585", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "fd893b39-1653-47eb-9c3c-ff408e53965b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10573", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "6960e4ca-aaac-463d-9947-d862dc11de31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "Telegram/cv1VwkIJH6B_Dy78dxdvTQp11eCDMAD66GHzAMmBZqGr3Q", "content": "", "creation_timestamp": "2025-02-18T18:45:48.000000Z"}, {"uuid": "f101621b-8ddc-4825-a6ce-0c9a68074bd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "Telegram/DjajqwOKtfZ_M5ClV_Ht6Zj14zVZ5RqpF76L3bZ8ar0sOu4", "content": "", "creation_timestamp": "2025-02-18T22:00:05.000000Z"}, {"uuid": "5619208d-9af3-4f65-ae4f-59b9a95d4a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "Telegram/MbkdnuvOB6Pmekc91bdzxPoXF3vYf0VbKxOEHDGavdYmQu8", "content": "", "creation_timestamp": "2025-02-21T20:00:08.000000Z"}, {"uuid": "e0fe9b12-f338-466e-bae7-392e3f2da0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "Telegram/vNGsacDSDvIFtCtznOSx-qUc8WPX1QiLXsWL2bcf-ZfGL-I", "content": "", "creation_timestamp": "2025-02-21T16:00:09.000000Z"}, {"uuid": "1e9349cb-4568-4459-8d0e-27d878285889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6755", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 OpenSSH \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 MitM \u0438 DoS, \u043f\u0440\u0438\u0447\u0435\u043c \u043e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0441\u044f\u0442\u0438 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434.\n\nMiTM-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-26465 \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2014 \u0433\u043e\u0434\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c OpenSSH 6.8p1, \u043e\u0441\u0442\u0430\u0432\u0430\u044f\u0441\u044c \u043d\u0435\u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u043e\u0439 \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0441\u044f\u0442\u0438\u043b\u0435\u0442\u0438\u044f.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u044b OpenSSH, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043e\u043f\u0446\u0438\u044f VerifyHostKeyDNS. \n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e \u043e\u0442 \u0442\u043e\u0433\u043e, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0430 \u043b\u0438 \u043e\u043f\u0446\u0438\u044f \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u00ab\u0434\u0430\u00bb \u0438\u043b\u0438 \u00ab\u0441\u043f\u0440\u043e\u0441\u0438\u0442\u044c\u00bb (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u2014 \u00ab\u043d\u0435\u0442\u00bb), \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438 \u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u0442 \u043e\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 SSHFP \u0432 DNS.\n\n\u041f\u0440\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u044d\u0442\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043e\u0448\u0438\u0431\u043e\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043c\u0430\u043d\u0443\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0432 \u0435\u0433\u043e \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043a\u043b\u044e\u0447 \u043f\u043e\u0434\u0441\u0442\u0430\u0432\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u044b\u0437\u0432\u0430\u0432 \u043e\u0448\u0438\u0431\u043a\u0443 \u043d\u0435\u0445\u0432\u0430\u0442\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438.\n\n\u041f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0432 SSH-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0432 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 SSH-\u043a\u043b\u044e\u0447 \u0441 \u0438\u0437\u0431\u044b\u0442\u043e\u0447\u043d\u044b\u043c\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f\u043c\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0432, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0445\u043e\u0441\u0442\u0430 \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0441\u0435\u0430\u043d\u0441, \u0447\u0442\u043e\u0431\u044b \u0443\u043a\u0440\u0430\u0441\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0438\u0437\u0432\u043b\u0435\u0447\u044c \u0434\u0430\u043d\u043d\u044b\u0435.\u00a0\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e VerifyHostKeyDNS \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0432 OpenSSH, \u0432 FreeBSD \u0441 2013 \u043f\u043e 2023 \u0433\u043e\u0434 \u043e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430, \u0447\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u043b\u043e \u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f \u0442\u0430\u043a\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\u0412\u0442\u043e\u0440\u0430\u044f CVE-2025-26466 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 OpenSSH 9.5p1, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0439 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2023 \u0433\u043e\u0434\u0430.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u043c\u0443 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0435 16-\u0431\u0430\u0439\u0442\u043e\u0432\u044b\u0435 ping-\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f, \u0447\u0442\u043e \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 OpenSSH \u0431\u0443\u0444\u0435\u0440\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c 256-\u0431\u0430\u0439\u0442\u043e\u0432\u044b\u0435 \u043e\u0442\u0432\u0435\u0442\u044b \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439.\n\n\u0412\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438 \u044d\u0442\u0438 \u043e\u0442\u0432\u0435\u0442\u044b \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0432\u0440\u0435\u043c\u044f, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0447\u0440\u0435\u0437\u043c\u0435\u0440\u043d\u043e\u043c\u0443 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0435\u0440\u0435\u0433\u0440\u0443\u0437\u043a\u0435 \u0426\u041f, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0431\u043e\u044f\u043c \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-26466 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043d\u0435 \u0442\u0430\u043a\u0438\u043c\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c\u0438, \u043a\u0430\u043a \u0443 \u043f\u0435\u0440\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u043e \u0442\u043e\u0442 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043d\u0435\u0441\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0440\u0438\u0441\u043a \u0441\u0431\u043e\u044f.\n\n\u041a\u043e\u043c\u0430\u043d\u0434\u0430 OpenSSH \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 9.9p2, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044f \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u043d\u0435\u0435 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c VerifyHostKeyDNS, \u0435\u0441\u043b\u0438 \u0432 \u044d\u0442\u043e\u043c \u043d\u0435\u0442 \u043a\u0440\u0430\u0439\u043d\u0435\u0439 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0427\u0442\u043e \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b DoS, \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0432\u0432\u0435\u0441\u0442\u0438 \u0441\u0442\u0440\u043e\u0433\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u043d\u0430 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a SSH \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0430\u043d\u043e\u043c\u0430\u043b\u0438\u0439.\n\n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u0434\u0432\u0443\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c \u043e\u0442 Qualys - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2025-02-19T11:51:50.000000Z"}, {"uuid": "ce4ce0a3-b488-407e-b8d3-d7b637a26273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/thehackernews/6363", "content": "\ud83d\udd34 Two new vulnerabilities found in OpenSSH \u2013 one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS).\n\nGet the details on CVE-2025-26465 and CVE-2025-26466: https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html", "creation_timestamp": "2025-02-18T16:36:44.000000Z"}, {"uuid": "85208401-cc09-44a1-ae78-c08dbc11dfed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/cybersonar.bsky.social/post/3ljaajbopz72d", "content": "", "creation_timestamp": "2025-02-28T10:53:40.041458Z"}, {"uuid": "f55ca2ef-2d33-4f51-a463-95c01eef3ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3ljfcdrp56z2l", "content": "", "creation_timestamp": "2025-03-02T11:09:41.432195Z"}, {"uuid": "019af24f-0427-4d4c-a18c-05b90f288ff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26465", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3litcqhz2gty2", "content": "", "creation_timestamp": "2025-02-23T07:29:15.141781Z"}, {"uuid": "7c5b7ab6-c871-4833-a632-0335e5963bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ligwqw2rjw26", "content": "", "creation_timestamp": "2025-02-18T09:22:25.385428Z"}, {"uuid": "514e43d5-8852-4d07-95f4-f8da634a03a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lir6u5gnpq2x", "content": "", "creation_timestamp": "2025-02-22T11:14:00.868087Z"}, {"uuid": "1a65978d-14e1-4374-8ee4-e09ac5a3943e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:40.506918Z"}, {"uuid": "218ee768-4e72-4e26-85ff-b88383479889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "03e39bd7-ae43-4de6-b0ce-e545a9765598", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://gist.github.com/tigo11/07a88fdce8ca49654662cf66df08150a", "content": "", "creation_timestamp": "2026-01-14T15:50:53.000000Z"}, {"uuid": "cffd653d-d104-482b-bbc9-0431c3c9481d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5887", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26465\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.\n\ud83d\udccf Published: 2025-02-18T18:27:16.843Z\n\ud83d\udccf Modified: 2025-02-28T13:07:34.661Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-26465\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344780", "creation_timestamp": "2025-02-28T13:26:53.000000Z"}, {"uuid": "1317339a-387b-4f28-b0a7-e684cb9b2fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11591", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26465\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.\n\ud83d\udccf Published: 2025-02-18T18:27:16.843Z\n\ud83d\udccf Modified: 2025-04-14T07:56:38.602Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-26465\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344780", "creation_timestamp": "2025-04-14T08:55:54.000000Z"}, {"uuid": "8920b173-879f-4b43-8693-5eb0dff5b9c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "Telegram/3ptSeK_oDDrI5HgVEY-L5Y3rPYWI3rHXwopVSnScr2Yo-hQ", "content": "", "creation_timestamp": "2025-02-20T06:19:07.000000Z"}, {"uuid": "8740b5a6-2f87-4e20-86a6-4afafc1c5012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10586", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "dafc021b-a3da-44fe-a559-86bd2be45a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10590", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "ca742ed4-da24-41db-ad84-7fb5b218ca3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "https://t.me/ton618cyber/6750", "content": "New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks \n\nTwo OpenSSH vulnerabilities (CVE-2025-26465, CVE-2025-26466) allow MitM and DoS attacks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:28.000000Z"}, {"uuid": "a543b544-1897-4d21-83f0-c3b4ebf2cc32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2968", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "bd425a07-41a8-4103-aff6-5688b160618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2967", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "1e407c3c-0ccd-49ab-8e47-610020039d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2966", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "bcbb432f-09e4-4609-b86d-74c8f0afd7d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2960", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "4367a276-0dd6-483c-b587-b564ea7a4be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2959", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "1a8ca1f2-5c70-42f4-b784-18a27bafeafc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26465", "type": "seen", "source": "Telegram/pb2Him2j_AV4KCNxLmHfrIHKq_YLmrJgpekN2w7MhTtFgtQ", "content": "", "creation_timestamp": "2025-02-19T01:24:45.000000Z"}]}