Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv2
CVE-2016-3116
CRLF injection vulnerability in Dropbear SSH prior to 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
7.2
CVSSv2
CVE-2007-5616
ssh-signer in SSH Tectia Client and Server 5.x prior to 5.2.4, and 5.3.x prior to 5.3.6, on Unix and Linux allows local users to gain privileges via unspecified vectors.
Ssh Tectia Client
Ssh Tectia Server
7.5
CVSSv2
CVE-2005-4310
SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.
Ssh Tectia Server 5.0.0 A
Ssh Tectia Server 5.0.0 T
Ssh Tectia Server 5.0.0 F
7.5
CVSSv2
CVE-2002-1646
SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote malicious users to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g. password) than configured for the server.
Ssh Secure Shell For Servers 3.1.1
Ssh Secure Shell For Servers 3.1
Ssh Secure Shell For Servers 3.0
Ssh Secure Shell For Servers 3.0.1
5
CVSSv2
CVE-2008-0132
Pragma FortressSSH 5.0 Build 4 Revision 293 and previous versions handles long input to sshd.exe by creating an error-message window and waiting for the administrator to click in this window before terminating the sshd.exe process, which allows remote malicious users to cause a d...
Pragmasys Fortress Ssh 5.0
Pragmasys Fortress Ssh
1 EDB exploit
6.8
CVSSv2
CVE-2021-45099
The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) prior to 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-i...
Ssh & Web Terminal Project Ssh & Web Terminal
3.7
CVSSv2
CVE-2003-1120
Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled, allows local users to obtain the server's private key.
Ssh Tectia Server 4.0.4
Ssh Tectia Server 4.0.3
5
CVSSv2
CVE-2003-1119
SSH Secure Shell prior to 3.2.9 allows remote malicious users to cause a denial of service via malformed BER/DER packets.
Ssh Secure Shell 3.1
Ssh Secure Shell 3.2
5
CVSSv2
CVE-1999-1085
SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote malicious users to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and comput...
Ssh Secure Shell 1.2.25
Ssh Secure Shell 1.2.23
4.7
CVSSv2
CVE-2017-9079
Dropbear prior to 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »