Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openssh vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0695
Multiple "buffer management errors" in OpenSSH prior to 3.7.1 may allow malicious users to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerabi...
Openbsd Openssh
7.5
CVSSv2
CVE-2003-0682
"Memory bugs" in OpenSSH 3.7.1 and previous versions, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
Openbsd Openssh
7.5
CVSSv2
CVE-2003-0386
OpenSSH 3.6.1 and previous versions, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote malicious users to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose r...
Openbsd Openssh 3.6.1
7.5
CVSSv2
CVE-2002-0765
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
Openbsd Openssh 3.2.2
Openbsd Openbsd 3.1
7.5
CVSSv2
CVE-2002-0575
Buffer overflow in OpenSSH prior to 2.9.9, and 3.x prior to 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.9p1
Openbsd Openssh 2.9p2
Openbsd Openssh 2.2
Openbsd Openssh 2.3
Openbsd Openssh 3.0
Openbsd Openssh 3.0.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 2.9.9
Openbsd Openssh 3.2
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-1507
OpenSSH prior to 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote malicious users to login unchallenged.
Openbsd Openssh 3.0
Openbsd Openssh 3.0p1
7.5
CVSSv2
CVE-2001-0816
OpenSSH prior to 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
Openbsd Openssh
7.5
CVSSv2
CVE-2001-1380
OpenSSH prior to 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote malicious users to login from unauthorized IP addresses.
Openbsd Openssh
7.5
CVSSv2
CVE-2001-0572
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote malicious user to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password gu...
Openbsd Openssh 4.5
Ssh Ssh 1.2.30
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.24
Ssh Ssh 1.2.31
7.5
CVSSv2
CVE-2001-1459
OpenSSH 2.9 and previous versions does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.1
Openbsd Openssh 2.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »