Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-25592
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
Saltstack Salt 3001
Saltstack Salt
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Github repository
1 Article
9.8
CVSSv3
CVE-2020-16259
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
Winstonprivacy Winston Firmware 1.5.4
9.8
CVSSv3
CVE-2020-16137
A privilege escalation issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows malicious users to reset the credentials for the SSH administrative console to arbitrary values. Note: We cannot prove this vulnerability exists. Out of an abundance of cautio...
Cisco Unified Ip Conference Station 7937g Firmware
2 Github repositories
9.8
CVSSv3
CVE-2020-5759
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command.
Grandstream Ucm6202 Firmware
Grandstream Ucm6204 Firmware
Grandstream Ucm6208 Firmware
9.8
CVSSv3
CVE-2020-10654
Ping Identity PingID SSH prior to 4.0.14 contains a heap buffer overflow in PingID-enrolled servers. This condition can be potentially exploited into a Remote Code Execution vector on the authenticating endpoint.
Pingidentity Pingid Ssh Integration
9.8
CVSSv3
CVE-2020-3125
A vulnerability in the Kerberos authentication feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote malicious user to impersonate the Kerberos key distribution center (KDC) and bypass authentication on an affected device that is confi...
Cisco Asa 5505 Firmware 9.10\\(1.220\\)
Cisco Asa 5510 Firmware 9.10\\(1.220\\)
Cisco Asa 5512-x Firmware 9.10\\(1.220\\)
Cisco Asa 5515-x Firmware 9.10\\(1.220\\)
Cisco Asa 5520 Firmware 9.10\\(1.220\\)
Cisco Asa 5525-x Firmware 9.10\\(1.220\\)
Cisco Asa 5540 Firmware 9.10\\(1.220\\)
Cisco Asa 5545-x Firmware 9.10\\(1.220\\)
Cisco Asa 5550 Firmware 9.10\\(1.220\\)
Cisco Asa 5555-x Firmware 9.10\\(1.220\\)
Cisco Asa 5580 Firmware 9.10\\(1.220\\)
Cisco Asa 5585-x Firmware 9.10\\(1.220\\)
Cisco Adaptive Security Appliance Software
1 Article
9.8
CVSSv3
CVE-2020-11939
In nDPI up to and including 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the cont...
Ntop Ndpi
9.8
CVSSv3
CVE-2020-11965
In IQrouter up to and including 3.3.1, there is a root user without a password, which allows malicious users to gain full remote access via SSH. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configu...
Evenroute Iqrouter Firmware
9.8
CVSSv3
CVE-2020-11543
OpsRamp Gateway prior to 7.0.0 has a backdoor account vadmin with the password 9vt@f3Vt that allows root SSH access to the server. This issue has been resolved in OpsRamp Gateway firmware version 7.0.0 where an administrator and a system user accounts are the only available user ...
Opsramp Gateway 3.0.0
9.8
CVSSv3
CVE-2020-10887
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from t...
Tp-link Ac1750 Firmware 190726
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »