Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh client vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2010-0568
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 prior to 7.0(8.10), 7.2 prior to 7.2(4.45), 8.0 prior to 8.0(5.7), 8.1 prior to 8.1(2.40), and 8.2 prior to 8.2(2.1); and Cisco PIX 500 Series Security Appliance; allows remote malicious users to b...
Cisco Asa 5500 8.2
Cisco Pix 500
Cisco Asa 5500 8.0
Cisco Asa 5500 8.1
Cisco Asa 5500 7.2
Cisco Asa 5500 7.1
7.1
CVSSv2
CVE-2006-3015
Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote malicious users to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.
Winscp Winscp 3.8.1
1 EDB exploit
6.9
CVSSv2
CVE-2008-1483
OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emac...
Openbsd Openssh 4.3p2
6.8
CVSSv2
CVE-2019-17361
In SaltStack Salt up to and including 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Saltstack Salt
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
6.8
CVSSv2
CVE-2019-3856
An integer overflow flaw, which could lead to an out of bounds write, exists in libssh2 prior to 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the serve...
Libssh2 Libssh2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Ontap Select Deploy Administration Utility -
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 28
Oracle Peoplesoft Enterprise Peopletools 8.56
Oracle Peoplesoft Enterprise Peopletools 8.57
6.8
CVSSv2
CVE-2019-3857
An integer overflow flaw which could lead to an out of bounds write exists in libssh2 prior to 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a u...
Libssh2 Libssh2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Ontap Select Deploy Administration Utility -
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 28
Oracle Peoplesoft Enterprise Peopletools 8.56
Oracle Peoplesoft Enterprise Peopletools 8.57
6.8
CVSSv2
CVE-2019-3863
A flaw was found in libssh2 prior to 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
Libssh2 Libssh2
Debian Debian Linux 8.0
Netapp Ontap Select Deploy Administration Utility -
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
6.8
CVSSv2
CVE-2017-12426
GitLab Community Edition (CE) and Enterprise Edition (EE) prior to 8.17.8, 9.0.x prior to 9.0.13, 9.1.x prior to 9.1.10, 9.2.x prior to 9.2.10, 9.3.x prior to 9.3.10, and 9.4.x prior to 9.4.4 might allow remote malicious users to execute arbitrary code via a crafted SSH URL in a ...
Gitlab Gitlab 9.2.2
Gitlab Gitlab 9.0.9
Gitlab Gitlab 9.0.2
Gitlab Gitlab 9.4.0
Gitlab Gitlab 9.0.8
Gitlab Gitlab 9.0.1
Gitlab Gitlab 9.0.6
Gitlab Gitlab 9.3.4
Gitlab Gitlab 9.1.6
Gitlab Gitlab 9.0.12
Gitlab Gitlab 9.3.6
Gitlab Gitlab 9.2.8
Gitlab Gitlab 9.1.7
Gitlab Gitlab 9.1.1
Gitlab Gitlab 9.2.4
Gitlab Gitlab 9.3.2
Gitlab Gitlab 9.0.5
Gitlab Gitlab 9.1.8
Gitlab Gitlab 9.3.1
Gitlab Gitlab 9.2.1
Gitlab Gitlab 9.0.0
Gitlab Gitlab 9.1.4
6.8
CVSSv2
CVE-2013-4852
Integer overflow in PuTTY 0.62 and previous versions, WinSCP prior to 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an...
Winscp Winscp 5.1.4
Winscp Winscp 5.1.3
Winscp Winscp 5.1.2
Winscp Winscp 5.1.1
Winscp Winscp 4.3.8
Winscp Winscp 4.3.7
Winscp Winscp 4.3.6
Winscp Winscp 3.7.6
Winscp Winscp 5.0.6
Winscp Winscp 5.0.5
Winscp Winscp 5.0.4
Winscp Winscp 5.0.3
Winscp Winscp 5.0.2
Winscp Winscp 4.2.6
Winscp Winscp 4.2.7
Winscp Winscp 4.2.8
Winscp Winscp 4.2.9
Winscp Winscp 5.0.9
Winscp Winscp 5.0.7
Winscp Winscp 5.0
Winscp Winscp 4.3.9
Winscp Winscp 3.8.2
6.8
CVSSv2
CVE-2013-4206
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing ...
Simon Tatham Putty 0.53
Putty Putty 0.52
Putty Putty 0.51
Putty Putty 0.50
Putty Putty 0.61
Putty Putty 0.60
Putty Putty 0.59
Putty Putty 0.58
Putty Putty 0.57
Putty Putty 0.45
Putty Putty 2010-06-01
Simon Tatham Putty
Putty Putty 0.55
Putty Putty 0.53b
Putty Putty 0.49
Putty Putty 0.47
Putty Putty 0.56
Putty Putty 0.54
Putty Putty 0.48
Putty Putty 0.46
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »