Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1645
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote malicious users to execute arbitrary code via a long URL.
Ssh Ssh2 3.2
Ssh Ssh2 3.1
Ssh Ssh2 3.1.3
Ssh Ssh2 3.1.4
Ssh Ssh2 3.1.1
Ssh Ssh2 3.1.2
6.5
CVSSv2
CVE-2021-27891
SSH Tectia Client and Server prior to 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
Ssh Tectia Client
Ssh Tectia Connectsecure -
Ssh Tectia Server
4.6
CVSSv2
CVE-2021-27892
SSH Tectia Client and Server prior to 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
Ssh Tectia Server
Ssh Tectia Client
Ssh Tectia Connectsecure -
4.6
CVSSv2
CVE-1999-0398
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Ssh Ssh2 2.0.11
Ssh Ssh 1.2.27
4.4
CVSSv2
CVE-2021-27893
SSH Tectia Client and Server prior to 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
Ssh Tectia Server
Ssh Tectia Client
Ssh Tectia Connectsecure -
5
CVSSv2
CVE-2006-5484
SSH Tectia Client/Server/Connector 5.1.0 and previous versions, Manager 2.2.0 and previous versions, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote malicious users to forge a PKCS #1 v1.5 signature t...
Ssh Tectia Server
Ssh Tectia Connector
Ssh Tectia Manager
Ssh Tectia Client
7.5
CVSSv2
CVE-2001-0471
SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and previous versions does not log repeated login attempts, which could allow remote malicious users to compromise accounts without detection via a brute force attack.
Ssh Ssh
1 EDB exploit
7.2
CVSSv2
CVE-2006-4316
SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of...
Ssh Tectia Manager 2.0
Ssh Tectia Manager 2.1.2
Ssh Tectia Manager 1.2
Ssh Tectia Manager 1.3
Ssh Tectia Manager 1.4
4.4
CVSSv2
CVE-2007-2063
SSH Tectia Server for IBM z/OS prior to 5.4.0 uses insecure world-writable permissions for (1) the server pid file, which allows local users to cause arbitrary processes to be stopped, or (2) when _BPX_BATCH_UMASK is missing from the environment, creates HFS files with insecure p...
Ssh Tectia Server 5.2.0
Ssh Tectia Server 5.1.0
Ssh Tectia Server
Ssh Tectia Server 5.0
7.2
CVSSv2
CVE-2000-0575
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote malicious users to sniff the ticket cache if the home directory is installed on NFS.
Ssh Ssh 1.2.27
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28254
CVE-2024-32515
CVE-2024-21338
validation
CVE-2024-32522
dos
CVE-2024-2101
CVE-2024-21107
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »