Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2016-7406
Format string vulnerability in Dropbear SSH prior to 2016.74 allows remote malicious users to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
Dropbear Ssh Project Dropbear Ssh
890
VMScore
CVE-2016-7407
The dropbearconvert command in Dropbear SSH prior to 2016.74 allows malicious users to execute arbitrary code via a crafted OpenSSH key file.
Dropbear Ssh Project Dropbear Ssh
890
VMScore
CVE-2016-10177
An issue exists on the D-Link DWR-932B router. Undocumented TELNET and SSH services provide logins to admin with the password admin and root with the password 1234.
Dlink Dwr-932b Firmware 02.02eu
890
VMScore
CVE-2016-2362
Fonality (previously trixbox Pro) 12.6 up to and including 14.1i prior to 2016-06-01 has a hardcoded password for the FTP account, which allows remote malicious users to obtain access via a (1) FTP or (2) SSH connection.
Fonality Fonality 12.6
Fonality Fonality 12.8
Fonality Fonality 14.1i
890
VMScore
CVE-2016-4422
The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth might allow context-dependent malicious users to bypass authentication or gain privileges via a system user account.
Libpam-sshauth Project Libpam-sshauth -
Debian Debian Linux 8.0
890
VMScore
CVE-2016-1313
Cisco UCS Invicta C3124SA Appliance 4.3.1 up to and including 5.0.1, UCS Invicta Scaling System and Appliance, and Whiptail Racerunner improperly store a default SSH private key, which allows remote malicious users to obtain root access via unspecified vectors, aka Bug ID CSCun71...
Cisco Ucs Invicta C3124sa Appliance 4.5.0
Cisco Ucs Invicta C3124sa Appliance 5.0.1
Cisco Ucs Invicta C3124sa Appliance 4.3.1
890
VMScore
CVE-2016-1329
Cisco NX-OS 6.0(2)U6(1) up to and including 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) up to and including 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote malicious users to obtain root privileges via a (1) TELNET or (2) SSH...
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(5\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(4\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(3\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(2\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)u6\\\\\\(1\\\\\\)
Cisco Nx-ox 6.0\\\\\\(2\\\\\\)a7\\\\\\(1\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(1\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(5\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(4\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(3\\\\\\)
Cisco Nx-os 6.0\\\\\\(2\\\\\\)a6\\\\\\(2\\\\\\)
1 Article
890
VMScore
CVE-2016-2230
OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote malicious users to obtain access via an SSH session.
Openelec Openelec
890
VMScore
CVE-2015-6412
Cisco Modular Encoding Platform D9036 Software prior to 02.04.70 has hardcoded (1) root and (2) guest passwords, which makes it easier for remote malicious users to obtain access via an SSH session, aka Bug ID CSCut88070.
Cisco Modular Encoding Platform D9036 Software 02.02.30
Cisco Modular Encoding Platform D9036 Software 02.00.80
Cisco Modular Encoding Platform D9036 Software 02.01.50
Cisco Modular Encoding Platform D9036 Software 02.03.30
890
VMScore
CVE-2015-8362
The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices prior to 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote malicious users to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-20...
Harman Amx Firmware 1.2.322
Harman Amx Firmware 1.3.100
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »