Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2021-36369
An issue exists in Dropbear up to and including 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security mea...
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 10.0
2 Github repositories
5
CVSSv2
CVE-2018-15599
The recv_msg_userauth_request function in svr-auth.c in Dropbear up to and including 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codeb...
Debian Debian Linux 8.0
Dropbear Ssh Project Dropbear Ssh
2 Github repositories
8.5
CVSSv2
CVE-2017-9078
The server in Dropbear prior to 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 8.0
Netapp H410c Firmware -
4
CVSSv2
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote malicious user to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Openbsd Openssh 1.2.3
Ssh Ssh
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
7.5
CVSSv2
CVE-2020-9355
danfruehauf NetworkManager-ssh prior to 1.2.11 allows privilege escalation because extra options are mishandled.
Networkmanager-ssh Project Networkmanager-ssh
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.1
CVSSv2
CVE-2012-0920
Use-after-free vulnerability in Dropbear SSH Server 0.52 up to and including 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command reque...
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 6.0
Debian Debian Linux 7.0
6.5
CVSSv2
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.0
Debian Debian Linux 3.1
5
CVSSv2
CVE-2020-29652
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote malicious users to cause a denial of service against SSH servers.
Golang Ssh
2 Github repositories
5
CVSSv2
CVE-2017-1000245
The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file.
Jenkins Ssh
NA
CVE-2021-43565
The x/crypto/ssh package prior to 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an malicious user to panic an SSH server.
Golang Ssh
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
client side
CVE-2023-31889
template injection
CVE-2024-4304
CVE-2006-4304
CVE-2024-33272
type confusion
CVE-2024-21345
CVE-2024-33271
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »