CVE-2007-4752
- EPSS 2.37%
- Veröffentlicht 12.09.2007 01:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted...
- EPSS 0.71%
- Veröffentlicht 04.09.2007 22:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via...
CVE-2007-2768
- EPSS 0.25%
- Veröffentlicht 21.05.2007 20:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwor...
- EPSS 0.39%
- Veröffentlicht 25.04.2007 16:19:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a s...
CVE-2006-5794
- EPSS 3.25%
- Veröffentlicht 08.11.2006 20:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed th...
CVE-2006-5229
- EPSS 37.83%
- Veröffentlicht 10.10.2006 23:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames...
- EPSS 2.99%
- Veröffentlicht 29.09.2006 00:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
CVE-2006-5051
- EPSS 2.28%
- Veröffentlicht 27.09.2006 23:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
- EPSS 14.97%
- Veröffentlicht 27.09.2006 23:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
CVE-2006-4924
- EPSS 47.95%
- Veröffentlicht 27.09.2006 01:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack d...