Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh client vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-10009
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH prior to 7.4 allows remote malicious users to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
Openbsd Openssh
1 EDB exploit
2 Github repositories
6.1
CVSSv2
CVE-2012-4898
Mesh OS prior to 7.9.1.1 on Tropos wireless mesh routers does not use a sufficient source of entropy for SSH keys, which makes it easier for man-in-the-middle malicious users to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product i...
Tropos Mesh Os
Tropos 4310 Mobile Mesh Router -
Tropos 1310 Distrubution Automation Mesh Router -
Tropos 3320 Indoor Mesh Router -
Tropos 3310 Indoor Mesh Router -
Tropos 1410 Mesh Router -
Tropos 6310 Mesh Router -
Tropos 1410 Wireless Mesh Router -
Tropos 6320 Mesh Router -
6.8
CVSSv2
CVE-2019-3857
An integer overflow flaw which could lead to an out of bounds write exists in libssh2 prior to 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a u...
Libssh2 Libssh2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Ontap Select Deploy Administration Utility -
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 28
Oracle Peoplesoft Enterprise Peopletools 8.56
Oracle Peoplesoft Enterprise Peopletools 8.57
6.5
CVSSv2
CVE-2018-1000805
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
Paramiko Paramiko 2.1.5
Paramiko Paramiko 1.18.5
Paramiko Paramiko 2.3.2
Paramiko Paramiko 2.2.3
Paramiko Paramiko 2.4.1
Paramiko Paramiko 2.0.8
Paramiko Paramiko 1.17.6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 6.7
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Tus 6.6
Redhat Enterprise Linux Server Tus 7.6
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Workstation 6.0
Redhat Ansible Tower 3.3
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Server Aus 6.6
1 Github repository
6.8
CVSSv2
CVE-2013-4206
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing ...
Simon Tatham Putty 0.53
Putty Putty 0.52
Putty Putty 0.51
Putty Putty 0.50
Putty Putty 0.61
Putty Putty 0.60
Putty Putty 0.59
Putty Putty 0.58
Putty Putty 0.57
Putty Putty 0.45
Putty Putty 2010-06-01
Simon Tatham Putty
Putty Putty 0.55
Putty Putty 0.53b
Putty Putty 0.49
Putty Putty 0.47
Putty Putty 0.56
Putty Putty 0.54
Putty Putty 0.48
Putty Putty 0.46
4.3
CVSSv2
CVE-2013-4207
Buffer overflow in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum fun...
Putty Putty 0.57
Putty Putty 0.56
Putty Putty 0.55
Putty Putty 0.54
Putty Putty 0.53b
Simon Tatham Putty
Putty Putty 0.49
Putty Putty 0.48
Putty Putty 0.47
Putty Putty 0.46
Putty Putty 0.60
Putty Putty 0.58
Putty Putty 0.52
Putty Putty 0.50
Putty Putty 0.45
Putty Putty 0.61
Putty Putty 0.59
Simon Tatham Putty 0.53
Putty Putty 0.51
Putty Putty 2010-06-01
7.6
CVSSv2
CVE-2012-4694
Moxa EDR-G903 series routers with firmware prior to 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle malicious users to spoof a device or modify a client-server data stream by leveraging knowledge of a key fr...
Moxa Edr G903 Firmware
Moxa Edr G903 Firmware 2.1
Moxa Edr G903 Firmware 2.0
Moxa Edr G903 Firmware 1.0
Moxa Edr-g903 -
10
CVSSv2
CVE-2021-31580
The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be bypassed by switching the OpenSSH channel from `shell` to `exec` and providing the ssh client a single execution parameter. This issue was resolved in Akkadian OVA appliance version 3.0 (and later)...
Akkadianlabs Ova Appliance
Akkadianlabs Provisioning Manager
6.8
CVSSv2
CVE-2019-3863
A flaw was found in libssh2 prior to 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
Libssh2 Libssh2
Debian Debian Linux 8.0
Netapp Ontap Select Deploy Administration Utility -
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
2.9
CVSSv2
CVE-2020-3442
The DuoConnect client enables users to establish SSH connections to hosts protected by a DNG instance. When a user initiates an SSH connection to a DNG-protected host for the first time using DuoConnect, the user’s browser is opened to a login screen in order to complete au...
Duo Duoconnect
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »