Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openssh vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0787
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows malicious users to modify the stack and possibly gain privileges.
Openbsd Openssh 3.7.1
Openbsd Openssh 3.7.1p1
7.5
CVSSv2
CVE-2003-0682
"Memory bugs" in OpenSSH 3.7.1 and previous versions, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
Openbsd Openssh
7.5
CVSSv2
CVE-2003-0695
Multiple "buffer management errors" in OpenSSH prior to 3.7.1 may allow malicious users to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerabi...
Openbsd Openssh
10
CVSSv2
CVE-2003-0693
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH prior to 3.7 may allow remote malicious users to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.
Openbsd Openssh
7.5
CVSSv2
CVE-2003-0386
OpenSSH 3.6.1 and previous versions, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote malicious users to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose r...
Openbsd Openssh 3.6.1
5
CVSSv2
CVE-2003-0190
OpenSSH-portable (OpenSSH) 3.6.1p1 and previous versions with PAM support enabled immediately sends an error message when a user does not exist, which allows remote malicious users to determine valid usernames via a timing attack.
Openbsd Openssh
Openbsd Openssh 3.6.1
Openpkg Openpkg 1.3
Openpkg Openpkg 1.2
Siemens Scalance X204rna Ecc Firmware
Siemens Scalance X204rna Firmware
3 EDB exploits
7.5
CVSSv2
CVE-2002-0765
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
Openbsd Openssh 3.2.2
Openbsd Openbsd 3.1
10
CVSSv2
CVE-2002-0639
Integer overflow in sshd in OpenSSH 2.9.9 up to and including 3.3 allows remote malicious users to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
Openbsd Openssh
10
CVSSv2
CVE-2002-0640
Buffer overflow in sshd in OpenSSH 2.3.1 up to and including 3.3 may allow remote malicious users to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuth...
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 1.2.2
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.3
Openbsd Openssh 3.3p1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
2 EDB exploits
7.5
CVSSv2
CVE-2002-0575
Buffer overflow in OpenSSH prior to 2.9.9, and 3.x prior to 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.9p1
Openbsd Openssh 2.9p2
Openbsd Openssh 2.2
Openbsd Openssh 2.3
Openbsd Openssh 3.0
Openbsd Openssh 3.0.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 2.9.9
Openbsd Openssh 3.2
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »