CVE-2024-6837 RegreSSHion
by itspizzatime - Friday July 12, 2024 at 03:51 AM
#31
I've tested this POC : https://github.com/d0rb/CVE-2024-6387 with OpenSSH9.5 on Debian 32 bits, but never win :/
Your is the same ?
Reply
#32
Nice info. Thanks
Reply
#33
thank you for sharing the poc
Reply
#34
thanks for sharing sir
Reply
#35
(Jul 12, 2024, 03:51 AM)itspizzatime Wrote: -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hello, BreachForum Users!

I'm Sure you all might have heard of a recent vulnerbaility by the name of RegreSSHion. RegreSSHion, CVE-2024-6387, is an unauthenticated remote code execution in OpenSSH’s server (sshd) that grants full root access. It affects the default configuration and does not require user interaction. This exploit is also on the CISA known vulns list.

Today I'm posting a POC, I'm not the originial creator ; source : xonoxitron



*disclaimer:I'm not the original source. merely sharing this with you all.


-----BEGIN PGP SIGNATURE-----
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=V3Is
-----END PGP SIGNATURE-----

Thank you very much for this.
Reply
#36
lets see what’s hiding there ?
Reply
#37
wooooooooow! thank you.!
Reply
#38
thanks for sharing, bro
Reply
#39
Thank you, this will help me better understand what happened here.
Reply
#40
(Jul 15, 2024, 12:48 AM)Dolphinledauphin Wrote:
(Jul 12, 2024, 03:51 AM)itspizzatime Wrote: -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hello, BreachForum Users!

I'm Sure you all might have heard of a recent vulnerbaility by the name of RegreSSHion. RegreSSHion, CVE-2024-6387, is an unauthenticated remote code execution in OpenSSH’s server (sshd) that grants full root access. It affects the default configuration and does not require user interaction. This exploit is also on the CISA known vulns list.

Today I'm posting a POC, I'm not the originial creator ; source : xonoxitron



*disclaimer:I'm not the original source. merely sharing this with you all.


-----BEGIN PGP SIGNATURE-----
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=V3Is
-----END PGP SIGNATURE-----

1555555555555555555555
Very good number brother thanx

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New Zer0 Day Wordpress A3g00n 82 3,620 48 minutes ago
Last Post: wker
  {SECRET} DATABASE OF EXPLOITS lulagain 440 27,694 May 07, 2026, 09:44 PM
Last Post: caribou
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 44 4,051 May 07, 2026, 04:45 PM
Last Post: Insulina
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 14,112 May 06, 2026, 05:42 PM
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 543 May 06, 2026, 10:16 AM
Last Post: sniperx86

Forum Jump:


 Users browsing this forum: 1 Guest(s)