Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh client vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-10009
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH prior to 7.4 allows remote malicious users to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
Openbsd Openssh
1 EDB exploit
2 Github repositories
7.5
CVSSv2
CVE-2012-4562
Multiple integer overflows in libssh prior to 0.5.3 allow remote malicious users to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified ...
Libssh Libssh 0.5.1
Libssh Libssh 0.5.0
Libssh Libssh
Libssh Libssh 0.4.8
Libssh Libssh 0.4.7
7.5
CVSSv2
CVE-2012-6063
Double free vulnerability in the sftp_mkdir function in sftp.c in libssh prior to 0.5.3 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vector than CVE-2012-4559.
Libssh Libssh 0.5.0
Libssh Libssh 0.4.8
Libssh Libssh 0.5.1
Libssh Libssh
Libssh Libssh 0.4.7
7.5
CVSSv2
CVE-2007-4752
ssh in OpenSSH prior to 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows malicious users to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Openbsd Openssh 4.3p2
Openbsd Openssh 4.3p1
Openbsd Openssh 4.0
Openbsd Openssh 4.3
Openbsd Openssh 4.2p1
Openbsd Openssh 4.4p1
Openbsd Openssh 4.4
Openbsd Openssh 4.1
Openbsd Openssh 4.0p1
Openbsd Openssh
Openbsd Openssh 4.5
Openbsd Openssh 4.2
Openbsd Openssh 4.1p1
7.5
CVSSv2
CVE-2007-1099
dbclient in Dropbear SSH client prior to 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote malicious users to conduct man-in-the-middle attacks.
Dropbear Ssh Project Dropbear Ssh
7.5
CVSSv2
CVE-2006-2407
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote malicious users to execute arbitrary code via a long key exchange algorithm string.
Freesshd Freesshd 1.0.9
Weonlydo Wodsshserver 1.2.7
Weonlydo Wodsshserver 1.3.3 Demo
Freeftpd Freeftpd 1.0.10
3 EDB exploits
7.5
CVSSv2
CVE-2003-0386
OpenSSH 3.6.1 and previous versions, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote malicious users to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose r...
Openbsd Openssh 3.6.1
7.5
CVSSv2
CVE-2003-0258
Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 3.5.x up to and including 4.0.REL, when enabling IPSec over TCP for a port on the concentrator, allow remote malicious users to reach the private network without authentication.
Cisco Vpn 3015 Concentrator
Cisco Vpn 3030 Concentator
Cisco Vpn 3000 Concentrator Series Software 3.5.4
Cisco Vpn 3000 Concentrator Series Software 3.5.5
Cisco Vpn 3000 Concentrator Series Software 3.6
Cisco Vpn 3000 Concentrator Series Software 3.6.7.a
Cisco Vpn 3000 Concentrator Series Software 3.6.7.b
Cisco Vpn 3000 Concentrator Series Software 3.5\\(rel\\)
Cisco Vpn 3000 Concentrator Series Software 3.5.1
Cisco Vpn 3000 Concentrator Series Software 4.0
Cisco Vpn 3000 Concentrator Series Software 3.6.3
Cisco Vpn 3005 Concentrator Software 4.0.1
Cisco Vpn 3060 Concentrator
Cisco Vpn 3080 Concentrator
Cisco Vpn 3000 Concentrator Series Software 3.6.1
Cisco Vpn 3000 Concentrator Series Software 3.6.7d
Cisco Vpn 3000 Concentrator Series Software 3.6.7.c
Cisco Vpn 3000 Concentrator Series Software 3.6.7.d
Cisco Vpn 3000 Concentrator Series Software 3.5.2
Cisco Vpn 3000 Concentrator Series Software 3.5.3
Cisco Vpn 3000 Concentrator Series Software 3.6.5
Cisco Vpn 3000 Concentrator Series Software 3.6.7
7.5
CVSSv2
CVE-2002-1059
Buffer overflow in Van Dyke SecureCRT SSH client prior to 3.4.6, and 4.x prior to 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
Van Dyke Technologies Securecrt 2.4
Van Dyke Technologies Securecrt 3.3
Van Dyke Technologies Securecrt 3.3.1
Van Dyke Technologies Securecrt 3.4.5
Van Dyke Technologies Securecrt 4.0 Beta 1
Van Dyke Technologies Securecrt 3.1.1
Van Dyke Technologies Securecrt 3.1.2
Van Dyke Technologies Securecrt 3.4
Van Dyke Technologies Securecrt 3.4.1
Van Dyke Technologies Securecrt 3.2
Van Dyke Technologies Securecrt 3.2.1
Van Dyke Technologies Securecrt 3.4.2
Van Dyke Technologies Securecrt 3.4.3
Van Dyke Technologies Securecrt 3.4.4
Van Dyke Technologies Securecrt 3.0
Van Dyke Technologies Securecrt 3.1
Van Dyke Technologies Securecrt 3.3.2
Van Dyke Technologies Securecrt 3.3.3
Van Dyke Technologies Securecrt 4.0 Beta 2
3 EDB exploits
7.5
CVSSv2
CVE-2002-0655
OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow malicious users to cause a denial of service and possibly execute arbitrary code.
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.5a
Openssl Openssl 0.9.6a
Oracle Application Server 1.0.2
Openssl Openssl 0.9.6c
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.7
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.3
Openssl Openssl 0.9.4
Openssl Openssl 0.9.5
Oracle Corporate Time Outlook Connector 3.1.1
Oracle Corporate Time Outlook Connector 3.1.2
Oracle Corporate Time Outlook Connector 3.3
Oracle Http Server 9.0.1
Oracle Application Server 1.0.2.2
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6b
Oracle Application Server
Oracle Application Server 1.0.2.1s
Oracle Corporate Time Outlook Connector 3.1
Oracle Http Server 9.2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »