CVE-2024-31497
- EPSS 14.7%
- Veröffentlicht 15.04.2024 20:15:11
- Zuletzt bearbeitet 27.03.2025 15:15:51
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is abl...
CVE-2023-48795
- EPSS 64.06%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 29.09.2025 21:56:10
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
CVE-2021-36367
- EPSS 0.14%
- Veröffentlicht 09.07.2021 21:15:08
- Zuletzt bearbeitet 21.11.2024 06:13:36
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attack...
CVE-2021-33500
- EPSS 0.4%
- Veröffentlicht 21.05.2021 20:15:07
- Zuletzt bearbeitet 21.11.2024 06:08:57
PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same ...
CVE-2020-14002
- EPSS 0.48%
- Veröffentlicht 29.06.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:02:19
PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the ...
CVE-2019-17069
- EPSS 0.47%
- Veröffentlicht 01.10.2019 17:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:38
PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
CVE-2019-17068
- EPSS 0.47%
- Veröffentlicht 01.10.2019 17:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:38
PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
CVE-2019-17067
- EPSS 0.43%
- Veröffentlicht 01.10.2019 17:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:38
PuTTY before 0.73 on Windows improperly opens port-forwarding listening sockets, which allows attackers to listen on the same port to steal an incoming connection.
CVE-2019-9898
- EPSS 4.44%
- Veröffentlicht 21.03.2019 16:01:17
- Zuletzt bearbeitet 21.11.2024 04:52:32
Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.
CVE-2019-9897
- EPSS 2.02%
- Veröffentlicht 21.03.2019 16:01:17
- Zuletzt bearbeitet 21.11.2024 04:52:31
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.