Логотип exploitDog
bind:"BDU:2025-01959" OR bind:"CVE-2025-26465"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-01959" OR bind:"CVE-2025-26465"

Количество 16

Количество 16

fstec логотип

BDU:2025-01959

около 1 года назад

Уязвимость компонента VerifyHostKeyDNS средства криптографической защиты OpenSSH, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.8
EPSS: Высокий
redos логотип

ROS-20250307-13

около 1 года назад

Уязвимость openssh

CVSS3: 6.8
EPSS: Высокий
ubuntu логотип

CVE-2025-26465

около 1 года назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Высокий
redhat логотип

CVE-2025-26465

около 1 года назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Высокий
nvd логотип

CVE-2025-26465

около 1 года назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Высокий
msrc логотип

CVE-2025-26465

около 1 года назад

Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled

CVSS3: 6.8
EPSS: Высокий
debian логотип

CVE-2025-26465

около 1 года назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

CVSS3: 6.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2025:0744-1

около 1 года назад

Security update for openssh8.4

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2025:0659-1

около 1 года назад

Security update for openssh

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2025:0605-1

около 1 года назад

Security update for openssh

EPSS: Высокий
rocky логотип

RLSA-2025:6993

6 месяцев назад

Moderate: openssh security update

EPSS: Высокий
rocky логотип

RLSA-2025:16823

6 месяцев назад

Moderate: openssh security update

EPSS: Высокий
github логотип

GHSA-jrwv-mv4h-7rrq

около 1 года назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Высокий
oracle-oval логотип

ELSA-2025-6993

11 месяцев назад

ELSA-2025-6993: openssh security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16823

6 месяцев назад

ELSA-2025-16823: openssh security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0585-1

около 1 года назад

Security update for openssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-01959

Уязвимость компонента VerifyHostKeyDNS средства криптографической защиты OpenSSH, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.8
74%
Высокий
около 1 года назад
redos логотип
ROS-20250307-13

Уязвимость openssh

CVSS3: 6.8
74%
Высокий
около 1 года назад
ubuntu логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
74%
Высокий
около 1 года назад
redhat логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
74%
Высокий
около 1 года назад
nvd логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
74%
Высокий
около 1 года назад
msrc логотип
CVE-2025-26465

Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled

CVSS3: 6.8
74%
Высокий
около 1 года назад
debian логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

CVSS3: 6.8
74%
Высокий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0744-1

Security update for openssh8.4

74%
Высокий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0659-1

Security update for openssh

74%
Высокий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0605-1

Security update for openssh

74%
Высокий
около 1 года назад
rocky логотип
RLSA-2025:6993

Moderate: openssh security update

74%
Высокий
6 месяцев назад
rocky логотип
RLSA-2025:16823

Moderate: openssh security update

74%
Высокий
6 месяцев назад
github логотип
GHSA-jrwv-mv4h-7rrq

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
74%
Высокий
около 1 года назад
oracle-oval логотип
ELSA-2025-6993

ELSA-2025-6993: openssh security update (MODERATE)

11 месяцев назад
oracle-oval логотип
ELSA-2025-16823

ELSA-2025-16823: openssh security update (MODERATE)

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0585-1

Security update for openssh

около 1 года назад

Уязвимостей на страницу