CVE-2021-36368
- EPSS 0.43%
- Veröffentlicht 13.03.2022 00:15:07
- Zuletzt bearbeitet 21.11.2024 06:13:36
An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the u...
- EPSS 0.27%
- Veröffentlicht 26.09.2021 19:15:07
- Zuletzt bearbeitet 12.05.2026 10:16:36
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsC...
CVE-2016-20012
- EPSS 14.6%
- Veröffentlicht 15.09.2021 20:15:07
- Zuletzt bearbeitet 21.11.2024 02:47:33
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combi...
CVE-2021-28041
- EPSS 0.24%
- Veröffentlicht 05.03.2021 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:59:01
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2020-15778
- EPSS 64.28%
- Veröffentlicht 24.07.2020 14:15:12
- Zuletzt bearbeitet 28.07.2025 18:12:45
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous arg...
CVE-2020-14145
- EPSS 1.56%
- Veröffentlicht 29.06.2020 18:15:11
- Zuletzt bearbeitet 18.12.2025 15:15:48
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has ...
CVE-2020-12062
- EPSS 0.83%
- Veröffentlicht 01.06.2020 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:59:12
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by cr...
CVE-2019-16905
- EPSS 0.27%
- Veröffentlicht 09.10.2019 20:15:23
- Zuletzt bearbeitet 23.04.2025 16:15:20
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution...
CVE-2019-6109
- EPSS 9.74%
- Veröffentlicht 31.01.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...
CVE-2019-6110
- EPSS 57.57%
- Veröffentlicht 31.01.2019 18:29:00
- Zuletzt bearbeitet 18.12.2025 15:15:47
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transfe...