Логотип exploitDog
bind:"CVE-2023-38408" OR bind:"CVE-2016-6210"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-38408" OR bind:"CVE-2016-6210"

Количество 31

Количество 31

oracle-oval логотип

ELSA-2023-4428

почти 2 года назад

ELSA-2023-4428: openssh security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
redhat логотип

CVE-2016-6210

почти 9 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.3
EPSS: Критический
nvd логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
debian логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
EPSS: Критический
ubuntu логотип

CVE-2023-38408

почти 2 года назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2023-38408

почти 2 года назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2023-38408

почти 2 года назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2023-38408

почти 2 года назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-f525-65h3-3qjh

около 3 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
oracle-oval логотип

ELSA-2017-2563

почти 8 лет назад

ELSA-2017-2563: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2016-02237

почти 9 лет назад

Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:2950-1

почти 2 года назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:2947-1

почти 2 года назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:2946-1

почти 2 года назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:2945-1

почти 2 года назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:2940-1

почти 2 года назад

Security update for openssh

EPSS: Средний
rocky логотип

RLSA-2023:4419

почти 2 года назад

Important: openssh security update

EPSS: Средний
github логотип

GHSA-px36-p9hv-7h2v

почти 2 года назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Средний
oracle-oval логотип

ELSA-2023-4419

почти 2 года назад

ELSA-2023-4419: openssh security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-4428

ELSA-2023-4428: openssh security update (IMPORTANT)

почти 2 года назад
ubuntu логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
больше 8 лет назад
redhat логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.3
92%
Критический
почти 9 лет назад
nvd логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
больше 8 лет назад
debian логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
92%
Критический
больше 8 лет назад
ubuntu логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
58%
Средний
почти 2 года назад
redhat логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
58%
Средний
почти 2 года назад
nvd логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
58%
Средний
почти 2 года назад
debian логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...

CVSS3: 9.8
58%
Средний
почти 2 года назад
github логотип
GHSA-f525-65h3-3qjh

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
около 3 лет назад
oracle-oval логотип
ELSA-2017-2563

ELSA-2017-2563: openssh security update (MODERATE)

почти 8 лет назад
fstec логотип
BDU:2016-02237

Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
92%
Критический
почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2023:2950-1

Security update for openssh

58%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2947-1

Security update for openssh

58%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2946-1

Security update for openssh

58%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2945-1

Security update for openssh

58%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2940-1

Security update for openssh

58%
Средний
почти 2 года назад
rocky логотип
RLSA-2023:4419

Important: openssh security update

58%
Средний
почти 2 года назад
github логотип
GHSA-px36-p9hv-7h2v

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
58%
Средний
почти 2 года назад
oracle-oval логотип
ELSA-2023-4419

ELSA-2023-4419: openssh security update (IMPORTANT)

почти 2 года назад

Уязвимостей на страницу