Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
putty vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-17067
PuTTY prior to 0.73 on Windows improperly opens port-forwarding listening sockets, which allows malicious users to listen on the same port to steal an incoming connection.
Putty Putty
9.8
CVSSv3
CVE-2019-9895
In PuTTY versions prior to 0.71 on Unix, a remotely triggerable buffer overflow exists in any kind of server-to-client forwarding.
Putty Putty
Fedoraproject Fedora 28
Fedoraproject Fedora 29
9.8
CVSSv3
CVE-2019-9898
Potential recycling of random numbers used in cryptography exists within PuTTY prior to 0.71.
Putty Putty
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 15.0
Netapp Oncommand Unified Manager -
9.8
CVSSv3
CVE-2017-6542
The ssh_agent_channel_data function in PuTTY prior to 0.68 allows remote malicious users to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, w...
Putty Putty
Opensuse Project Leap 42.1
Opensuse Leap 42.2
1 EDB exploit
9.8
CVSSv3
CVE-2016-2563
Stack-based buffer overflow in the SCP command-line utility in PuTTY prior to 0.67 and KiTTY 0.66.6.3 and previous versions allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP d...
9bis Kitty
Simon Tatham Putty
1 EDB exploit
8.1
CVSSv3
CVE-2021-36367
PuTTY up to and including 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capt...
Putty Putty
7 Github repositories
7.8
CVSSv3
CVE-2019-9896
In PuTTY versions prior to 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
Putty Putty
Opensuse Backports Sle 15.0
Opensuse Leap 15.0
7.8
CVSSv3
CVE-2016-6167
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
Putty Putty 0.67
7.5
CVSSv3
CVE-2021-33500
PuTTY prior to 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affec...
Putty Putty
1 Github repository
7.5
CVSSv3
CVE-2019-17068
PuTTY prior to 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
Putty Putty
Opensuse Leap 15.1
Opensuse Leap 15.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »