Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh2 3.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1645
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote malicious users to execute arbitrary code via a long URL.
Ssh Ssh2 3.2
Ssh Ssh2 3.1
Ssh Ssh2 3.1.3
Ssh Ssh2 3.1.4
Ssh Ssh2 3.1.1
Ssh Ssh2 3.1.2
7.2
CVSSv2
CVE-2002-1644
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 up to and including 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows malicious users to gain certain privileges.
Ssh Ssh2 2.4
Ssh Ssh2 2.5
Ssh Ssh2 3.1.4
Ssh Ssh2 3.2
Ssh Ssh2 3.0
Ssh Ssh2 3.0.1
Ssh Ssh2 3.2.1
Ssh Ssh2 2.2
Ssh Ssh2 2.3
Ssh Ssh2 3.1.2
Ssh Ssh2 3.1.3
Ssh Ssh2 2.0.13
Ssh Ssh2 2.1
Ssh Ssh2 3.1
Ssh Ssh2 3.1.1
6.5
CVSSv2
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.0
Debian Debian Linux 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started