Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
putty vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-9897
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions prior to 0.71.
Putty Putty
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Oncommand Unified Manager -
Opensuse Leap 15.0
1 Github repository
5.7
CVSSv3
CVE-2017-17131
Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. ...
Huawei Dp300 Firmware V500r002c00
Huawei Rp200 Firmware V500r002c00
Huawei Rp200 Firmware V600r006c00
Huawei Te30 Firmware V100r001c10
Huawei Te30 Firmware V600r006c00
Huawei Te50 Firmware V600r006c00
Huawei Te60 Firmware V500r002c00
Huawei Te60 Firmware V100r001c10
Huawei Te60 Firmware V600r006c00
Huawei Vp9660 Firmware V500r002c10
9.8
CVSSv3
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY prior to 0.68 allows remote malicious users to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, w...
Putty Putty
Opensuse Project Leap 42.1
Opensuse Leap 42.2
1 EDB exploit
7.8
CVSSv3
CVE-2016-6167
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
Putty Putty 0.67
9.8
CVSSv3
CVE-2016-2563
Stack-based buffer overflow in the SCP command-line utility in PuTTY prior to 0.67 and KiTTY 0.66.6.3 and previous versions allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP d...
9bis Kitty
Simon Tatham Putty
1 EDB exploit
NA
CVE-2015-5309
Integer overflow in the terminal emulator in PuTTY prior to 0.66 allows remote malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer u...
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Simon Tatham Putty
NA
CVE-2015-2157
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 up to and including 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
Fedoraproject Fedora 20
Fedoraproject Fedora 22
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Putty Putty 0.54
Putty Putty 0.55
Putty Putty 0.62
Putty Putty 0.63
Putty Putty 0.51
Putty Putty 0.52
Putty Putty 0.58
Putty Putty 0.59
Putty Putty 0.56
Putty Putty 0.57
Simon Tatham Putty 0.53
Putty Putty 0.53b
Putty Putty 0.60
Putty Putty 0.61
NA
CVE-2011-4607
PuTTY 0.59 up to and including 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.
Putty Putty 0.61
Putty Putty 0.60
Putty Putty 0.59
NA
CVE-2013-4852
Integer overflow in PuTTY 0.62 and previous versions, WinSCP prior to 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an...
Winscp Winscp 5.1.4
Winscp Winscp 5.1.3
Winscp Winscp 5.1.2
Winscp Winscp 5.1.1
Winscp Winscp 4.3.8
Winscp Winscp 4.3.7
Winscp Winscp 4.3.6
Winscp Winscp 3.7.6
Winscp Winscp 5.0.6
Winscp Winscp 5.0.5
Winscp Winscp 5.0.4
Winscp Winscp 5.0.3
Winscp Winscp 5.0.2
Winscp Winscp 4.2.6
Winscp Winscp 4.2.7
Winscp Winscp 4.2.8
Winscp Winscp 4.2.9
Winscp Winscp 5.0.9
Winscp Winscp 5.0.7
Winscp Winscp 5.0
Winscp Winscp 4.3.9
Winscp Winscp 3.8.2
NA
CVE-2013-4206
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY prior to 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing ...
Simon Tatham Putty 0.53
Putty Putty 0.52
Putty Putty 0.51
Putty Putty 0.50
Putty Putty 0.61
Putty Putty 0.60
Putty Putty 0.59
Putty Putty 0.58
Putty Putty 0.57
Putty Putty 0.45
Putty Putty 2010-06-01
Simon Tatham Putty
Putty Putty 0.55
Putty Putty 0.53b
Putty Putty 0.49
Putty Putty 0.47
Putty Putty 0.56
Putty Putty 0.54
Putty Putty 0.48
Putty Putty 0.46
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »