Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openssh vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-4752
ssh in OpenSSH prior to 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows malicious users to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Openbsd Openssh 4.3p2
Openbsd Openssh
Openbsd Openssh 4.1
Openbsd Openssh 4.0p1
Openbsd Openssh 4.4
Openbsd Openssh 4.1p1
Openbsd Openssh 4.2p1
Openbsd Openssh 4.5
Openbsd Openssh 4.2
Openbsd Openssh 4.4p1
Openbsd Openssh 4.3p1
Openbsd Openssh 4.3
Openbsd Openssh 4.0
5
CVSSv2
CVE-2007-4654
Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote malicious users to cause a denial of service (connection slot exhaustion and device crash) via a series of large packe...
Cisco Webns 8.20.0.1
Openbsd Openssh 3.0.2p1
Teamf1 Sshield 1.6.1
4.3
CVSSv2
CVE-2007-2768
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote malicious users to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issu...
Openbsd Openssh
Netapp Steelstore Cloud Integrated Storage -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Hci Storage Node -
5
CVSSv2
CVE-2007-2243
OpenSSH 4.6 and previous versions, when ChallengeResponseAuthentication is enabled, allows remote malicious users to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue t...
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 4.3p2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 3.0.2p1
Openbsd Openssh 4.1
Openbsd Openssh 3.8.1
Openbsd Openssh 2.1.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9
Openbsd Openssh 3.0
Openbsd Openssh 1.2.1
Openbsd Openssh 2.2
Openbsd Openssh 3.2
Openbsd Openssh 3.6
Openbsd Openssh 1.2.3
5
CVSSv2
CVE-2007-0726
The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 up to and including 10.4.8 allows remote malicious users to cause a denial of service by connecting to the server before SSH has finished creating keys, which causes the keys to be regenerated and can bre...
Apple Mac Os X 10.4.3
Apple Mac Os X Server 10.4.3
Apple Mac Os X 10.4.1
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.1
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.4
Apple Mac Os X Server 10.4
Apple Mac Os X Server 10.4.5
Apple Mac Os X 10.4
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4.8
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.5
Apple Mac Os X 10.3.9
Apple Mac Os X 10.4.8
Apple Mac Os X Server 10.4.7
Apple Mac Os X 10.4.2
7.5
CVSSv2
CVE-2006-5794
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH prior to 4.5 causes weaker verification that authentication has been successful, which might allow malicious users to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only ...
Openbsd Openssh
2.6
CVSSv2
CVE-2006-5229
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote malicious users to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as d...
Openbsd Openssh 4.1
1 EDB exploit
5
CVSSv2
CVE-2006-4925
packet.c in ssh in OpenSSH allows remote malicious users to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
Openbsd Openssh 4.5
9.3
CVSSv2
CVE-2006-5051
Signal handler race condition in OpenSSH prior to 4.4 allows remote malicious users to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Openbsd Openssh
Debian Debian Linux 3.1
Apple Mac Os X
Apple Mac Os X Server
5
CVSSv2
CVE-2006-5052
Unspecified vulnerability in portable OpenSSH prior to 4.4, when running on some platforms, allows remote malicious users to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.8.1
Openbsd Openssh 2.1.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9
Openbsd Openssh 3.0
Openbsd Openssh 1.2.1
Openbsd Openssh 2.2
Openbsd Openssh 3.2
Openbsd Openssh 3.6
Openbsd Openssh 1.2.3
Openbsd Openssh 3.7
Openbsd Openssh 4.0p1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »