OpenSSH 4.3


Nmap enumerated the version information of the SSH server on the target port 80

┌──(kali㉿kali)-[~/archive/htb/labs/beep]
└─$ searchsploit OpenSSH 4.3
-------------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                            |  Path
-------------------------------------------------------------------------- ---------------------------------
OpenSSH 2.3 < 7.7 - Username Enumeration                                  | linux/remote/45233.py
OpenSSH 2.3 < 7.7 - Username Enumeration (PoC)                            | linux/remote/45210.py
OpenSSH 4.3 p1 - Duplicated Block Remote Denial of Service                | multiple/dos/2444.sh
OpenSSH < 6.6 SFTP (x64) - Command Execution                              | linux_x86-64/remote/45000.c
OpenSSH < 6.6 SFTP - Command Execution                                    | linux/remote/45001.py
OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain S | linux/local/40962.txt
OpenSSH < 7.4 - agent Protocol Arbitrary Library Loading                  | linux/remote/40963.txt
OpenSSH < 7.7 - User Enumeration (2)                                      | linux/remote/45939.py
-------------------------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results

While OpenSSH 4.3 appears to have multiple vulnerabilities, those scripts from the searchsploit search result untested to be reliable

cvedetails also listed the vulnerabilities that OpenSSH 4.3 suffer