Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libssh libssh 0.6.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0017
The RAND_bytes function in libssh prior to 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information...
Libssh Libssh 0.6.1
Libssh Libssh 0.5.5
Libssh Libssh 0.5.3
Libssh Libssh 0.5.4
Libssh Libssh 0.6.0
Libssh Libssh
Libssh Libssh 0.5.1
Libssh Libssh 0.5.2
Libssh Libssh 0.4.7
Libssh Libssh 0.4.8
Libssh Libssh 0.5.0
NA
CVE-2014-8132
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x prior to 0.6.4 allows remote malicious users to cause a denial of service via a crafted kexinit packet.
Libssh Libssh 0.6.0
Libssh Libssh 0.6.1
Libssh Libssh 0.5.4
Libssh Libssh 0.5.5
Libssh Libssh 0.5.0
Libssh Libssh 0.6.2
Libssh Libssh 0.6.3
Libssh Libssh 0.5.2
Libssh Libssh 0.5.3
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 12.3
Opensuse Opensuse 13.2
Fedoraproject Fedora 19
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started