CVE-2025-61984
- EPSS 0.01%
- Veröffentlicht 06.10.2025 00:00:00
- Zuletzt bearbeitet 06.10.2025 19:15:36
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence exp...
CVE-2025-61985
- EPSS 0.01%
- Veröffentlicht 06.10.2025 00:00:00
- Zuletzt bearbeitet 06.10.2025 19:15:36
ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
CVE-2025-32728
- EPSS 0.03%
- Veröffentlicht 10.04.2025 00:00:00
- Zuletzt bearbeitet 22.05.2025 16:51:54
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
CVE-2025-26466
- EPSS 46.32%
- Veröffentlicht 28.02.2025 22:15:40
- Zuletzt bearbeitet 27.05.2025 16:15:31
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious cli...
CVE-2025-26465
- EPSS 58.35%
- Veröffentlicht 18.02.2025 19:15:29
- Zuletzt bearbeitet 26.09.2025 07:15:41
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in spec...
- EPSS 78.16%
- Veröffentlicht 08.07.2024 18:15:09
- Zuletzt bearbeitet 21.11.2024 09:49:35
A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handl...
CVE-2024-39894
- EPSS 1.71%
- Veröffentlicht 02.07.2024 18:15:03
- Zuletzt bearbeitet 29.01.2025 22:15:29
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
CVE-2024-6387
- EPSS 38.58%
- Veröffentlicht 01.07.2024 13:15:06
- Zuletzt bearbeitet 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
- EPSS 0.01%
- Veröffentlicht 24.12.2023 07:15:07
- Zuletzt bearbeitet 22.09.2025 17:16:06
OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...
CVE-2023-51384
- EPSS 0.04%
- Veröffentlicht 18.12.2023 19:15:08
- Zuletzt bearbeitet 21.11.2024 08:37:59
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a...