Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openssh 2.9.9 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-0639
Integer overflow in sshd in OpenSSH 2.9.9 up to and including 3.3 allows remote malicious users to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
Openbsd Openssh
10
CVSSv2
CVE-2002-0640
Buffer overflow in sshd in OpenSSH 2.3.1 up to and including 3.3 may allow remote malicious users to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuth...
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 1.2.2
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.3
Openbsd Openssh 3.3p1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
2 EDB exploits
7.8
CVSSv2
CVE-2006-4924
sshd in OpenSSH prior to 4.4, when using the version 1 SSH protocol, allows remote malicious users to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
Openbsd Openssh 1.2.1
Openbsd Openssh 1.2.2
Openbsd Openssh 1.2.27
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.6
Openbsd Openssh 3.6.1
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1
Openbsd Openssh 4.2
Openbsd Openssh 4.2p1
Openbsd Openssh 1.2
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
1 EDB exploit
7.6
CVSSv2
CVE-2003-1562
sshd in OpenSSH 3.6.1p2 and previous versions, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote malicious users to use timing differen...
Openbsd Openssh 2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 3.0.2p1
Openbsd Openssh 1.5.8
Openbsd Openssh 2.1.1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.0
Openbsd Openssh 1.2.1
Openbsd Openssh 2.2
Openbsd Openssh 3.2
Openbsd Openssh 3.6
Openbsd Openssh 1.5.7
Openbsd Openssh 1.2.3
Openbsd Openssh 3.5p1
Openbsd Openssh 2.3.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 2.1
7.5
CVSSv2
CVE-2010-4478
OpenSSH 5.6 and previous versions, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote malicious users to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values ...
Openbsd Openssh 5.4
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 4.3p2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 5.5
Openbsd Openssh 3.0.2p1
Openbsd Openssh 1.5.8
Openbsd Openssh 5.3
Openbsd Openssh 4.1
Openbsd Openssh 3.8.1
Openbsd Openssh 2.1.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 4.8
Openbsd Openssh 4.9
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9
8 Github repositories
7.5
CVSSv2
CVE-2002-0575
Buffer overflow in OpenSSH prior to 2.9.9, and 3.x prior to 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.9p1
Openbsd Openssh 2.9p2
Openbsd Openssh 2.2
Openbsd Openssh 2.3
Openbsd Openssh 3.0
Openbsd Openssh 3.0.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 2.9.9
Openbsd Openssh 3.2
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-0816
OpenSSH prior to 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
Openbsd Openssh
7.5
CVSSv2
CVE-2001-1380
OpenSSH prior to 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote malicious users to login from unauthorized IP addresses.
Openbsd Openssh
5
CVSSv2
CVE-2010-5107
The default configuration of OpenSSH up to and including 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote malicious users to cause a denial of service (connection-slot exhaustion) by periodically making...
Openbsd Openssh
Openbsd Openssh 5.7
Openbsd Openssh 5.1
Openbsd Openssh 4.2p1
Openbsd Openssh 4.1p1
Openbsd Openssh 4.3
Openbsd Openssh 4.4
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.9
Openbsd Openssh 3.0p1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.5p1
Openbsd Openssh 3.6
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 2.1
Openbsd Openssh 2.9.9
Openbsd Openssh 1.5.7
Openbsd Openssh 1.5.8
Openbsd Openssh 1.2
Openbsd Openssh 5.2
Openbsd Openssh 5.3
2 Github repositories
5
CVSSv2
CVE-2008-4109
A certain Debian patch for OpenSSH prior to 4.3p2-9etch3 on etch; prior to 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote malicious users to cause a deni...
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.9
Openbsd Openssh 3.0.2p1
Openbsd Openssh 2.5
Openbsd Openssh 1.3
Openbsd Openssh 1.5
Openbsd Openssh 3.1p1
Openbsd Openssh 3.0.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 2.5.2
Openbsd Openssh 3.7.1p1
Openbsd Openssh 3.5p1
Openbsd Openssh 3.6
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh
Openbsd Openssh 3.9.1
Openbsd Openssh 3.9.1p1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 1.2.27
Openbsd Openssh 1.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »