Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-1999-0248
A race condition in the authentication agent mechanism of sshd 1.2.17 allows an malicious user to steal another user's credentials.
Ssh Ssh 1.2.27
641
VMScore
CVE-2000-0575
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote malicious users to sniff the ticket cache if the home directory is installed on NFS.
Ssh Ssh 1.2.27
668
VMScore
CVE-1999-0310
SSH 1.2.25 on HP-UX allows access to new user accounts.
Ssh Ssh 1.2.25
641
VMScore
CVE-2007-5616
ssh-signer in SSH Tectia Client and Server 5.x prior to 5.2.4, and 5.3.x prior to 5.3.6, on Unix and Linux allows local users to gain privileges via unspecified vectors.
Ssh Tectia Client
Ssh Tectia Server
828
VMScore
CVE-2007-1654
Buffer overflow in the Ne7sshSftp::addOpenHandle function in ne7ssh_sftp.cpp in NetSieben SSH Library (ne7ssh) prior to 1.2.1 allows user-assisted remote SFTP servers to cause a denial of service (crash) or possibly execute arbitrary code via multiple file transfers, related to m...
Netsieben Netsieben Ssh Library 1.1
Netsieben Netsieben Ssh Library 1.2.0
Netsieben Netsieben Ssh Library 1.03
Netsieben Netsieben Ssh Library 1.1.6
Netsieben Netsieben Ssh Library 1.1.5
668
VMScore
CVE-2005-4310
SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.
Ssh Tectia Server 5.0.0 A
Ssh Tectia Server 5.0.0 F
Ssh Tectia Server 5.0.0 T
890
VMScore
CVE-2016-7406
Format string vulnerability in Dropbear SSH prior to 2016.74 allows remote malicious users to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
Dropbear Ssh Project Dropbear Ssh
505
VMScore
CVE-2006-1206
Matt Johnston Dropbear SSH server 0.47 and previous versions, as used in embedded Linux devices and on general-purpose operating systems, allows remote malicious users to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds...
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
668
VMScore
CVE-2007-1099
dbclient in Dropbear SSH client prior to 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote malicious users to conduct man-in-the-middle attacks.
Dropbear Ssh Project Dropbear Ssh
578
VMScore
CVE-2016-7408
The dbclient in Dropbear SSH prior to 2016.74 allows remote malicious users to execute arbitrary code via a crafted (1) -m or (2) -c argument.
Dropbear Ssh Project Dropbear Ssh
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »