CVE-2025-47914
- EPSS 0.02%
- Veröffentlicht 19.11.2025 20:33:43
- Zuletzt bearbeitet 11.12.2025 19:36:41
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
CVE-2025-58181
- EPSS 0.08%
- Veröffentlicht 19.11.2025 20:33:42
- Zuletzt bearbeitet 11.12.2025 19:29:24
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47913
- EPSS 0.03%
- Veröffentlicht 13.11.2025 21:29:39
- Zuletzt bearbeitet 09.01.2026 15:32:12
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
CVE-2024-45337
- EPSS 30.29%
- Veröffentlicht 12.12.2024 02:02:07
- Zuletzt bearbeitet 18.02.2025 21:15:22
Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this fu...
CVE-2022-30636
- EPSS 0.25%
- Veröffentlicht 02.07.2024 20:15:05
- Zuletzt bearbeitet 21.11.2024 07:03:04
httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user t...
CVE-2023-48795
- EPSS 47.99%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 04.11.2025 22:15:55
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
CVE-2019-11841
- EPSS 0.39%
- Veröffentlicht 22.05.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:21:52
A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain...
CVE-2019-11840
- EPSS 2.76%
- Veröffentlicht 09.05.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:21:52
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/sals...
CVE-2017-3204
- EPSS 1.81%
- Veröffentlicht 04.04.2017 14:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.