Логотип exploitDog
bind:"CVE-2023-38408" OR bind:"CVE-2016-6210"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-38408" OR bind:"CVE-2016-6210"

Количество 31

Количество 31

oracle-oval логотип

ELSA-2023-4428

около 2 лет назад

ELSA-2023-4428: openssh security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
redhat логотип

CVE-2016-6210

около 9 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.3
EPSS: Критический
nvd логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
debian логотип

CVE-2016-6210

больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
EPSS: Критический
ubuntu логотип

CVE-2023-38408

около 2 лет назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2023-38408

около 2 лет назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Высокий
nvd логотип

CVE-2023-38408

около 2 лет назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2023-38408

около 2 лет назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-f525-65h3-3qjh

больше 3 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
EPSS: Критический
oracle-oval логотип

ELSA-2017-2563

почти 8 лет назад

ELSA-2017-2563: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2016-02237

около 9 лет назад

Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:2950-1

около 2 лет назад

Security update for openssh

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2023:2947-1

около 2 лет назад

Security update for openssh

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2023:2946-1

около 2 лет назад

Security update for openssh

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2023:2945-1

около 2 лет назад

Security update for openssh

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2023:2940-1

около 2 лет назад

Security update for openssh

EPSS: Высокий
rocky логотип

RLSA-2023:4419

около 2 лет назад

Important: openssh security update

EPSS: Высокий
github логотип

GHSA-px36-p9hv-7h2v

около 2 лет назад

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
EPSS: Высокий
oracle-oval логотип

ELSA-2023-4419

около 2 лет назад

ELSA-2023-4419: openssh security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-4428

ELSA-2023-4428: openssh security update (IMPORTANT)

около 2 лет назад
ubuntu логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
больше 8 лет назад
redhat логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.3
92%
Критический
около 9 лет назад
nvd логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
больше 8 лет назад
debian логотип
CVE-2016-6210

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
92%
Критический
больше 8 лет назад
ubuntu логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
73%
Высокий
около 2 лет назад
redhat логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
73%
Высокий
около 2 лет назад
nvd логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
73%
Высокий
около 2 лет назад
debian логотип
CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...

CVSS3: 9.8
73%
Высокий
около 2 лет назад
github логотип
GHSA-f525-65h3-3qjh

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
92%
Критический
больше 3 лет назад
oracle-oval логотип
ELSA-2017-2563

ELSA-2017-2563: openssh security update (MODERATE)

почти 8 лет назад
fstec логотип
BDU:2016-02237

Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
92%
Критический
около 9 лет назад
suse-cvrf логотип
SUSE-SU-2023:2950-1

Security update for openssh

73%
Высокий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2947-1

Security update for openssh

73%
Высокий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2946-1

Security update for openssh

73%
Высокий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2945-1

Security update for openssh

73%
Высокий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2940-1

Security update for openssh

73%
Высокий
около 2 лет назад
rocky логотип
RLSA-2023:4419

Important: openssh security update

73%
Высокий
около 2 лет назад
github логотип
GHSA-px36-p9hv-7h2v

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS3: 9.8
73%
Высокий
около 2 лет назад
oracle-oval логотип
ELSA-2023-4419

ELSA-2023-4419: openssh security update (IMPORTANT)

около 2 лет назад

Уязвимостей на страницу