Количество 31
Количество 31
ELSA-2023-4428
ELSA-2023-4428: openssh security update (IMPORTANT)

CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...
GHSA-f525-65h3-3qjh
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
ELSA-2017-2563
ELSA-2017-2563: openssh security update (MODERATE)

BDU:2016-02237
Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

SUSE-SU-2023:2950-1
Security update for openssh

SUSE-SU-2023:2947-1
Security update for openssh

SUSE-SU-2023:2946-1
Security update for openssh

SUSE-SU-2023:2945-1
Security update for openssh

SUSE-SU-2023:2940-1
Security update for openssh

RLSA-2023:4419
Important: openssh security update
GHSA-px36-p9hv-7h2v
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
ELSA-2023-4419
ELSA-2023-4419: openssh security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-4428 ELSA-2023-4428: openssh security update (IMPORTANT) | почти 2 года назад | |||
![]() | CVE-2016-6210 sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. | CVSS3: 5.9 | 92% Критический | больше 8 лет назад |
![]() | CVE-2016-6210 sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. | CVSS3: 5.3 | 92% Критический | почти 9 лет назад |
![]() | CVE-2016-6210 sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. | CVSS3: 5.9 | 92% Критический | больше 8 лет назад |
CVE-2016-6210 sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ... | CVSS3: 5.9 | 92% Критический | больше 8 лет назад | |
![]() | CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. | CVSS3: 9.8 | 58% Средний | почти 2 года назад |
![]() | CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. | CVSS3: 9.8 | 58% Средний | почти 2 года назад |
![]() | CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. | CVSS3: 9.8 | 58% Средний | почти 2 года назад |
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ... | CVSS3: 9.8 | 58% Средний | почти 2 года назад | |
GHSA-f525-65h3-3qjh sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. | CVSS3: 5.9 | 92% Критический | около 3 лет назад | |
ELSA-2017-2563 ELSA-2017-2563: openssh security update (MODERATE) | почти 8 лет назад | |||
![]() | BDU:2016-02237 Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.9 | 92% Критический | почти 9 лет назад |
![]() | SUSE-SU-2023:2950-1 Security update for openssh | 58% Средний | почти 2 года назад | |
![]() | SUSE-SU-2023:2947-1 Security update for openssh | 58% Средний | почти 2 года назад | |
![]() | SUSE-SU-2023:2946-1 Security update for openssh | 58% Средний | почти 2 года назад | |
![]() | SUSE-SU-2023:2945-1 Security update for openssh | 58% Средний | почти 2 года назад | |
![]() | SUSE-SU-2023:2940-1 Security update for openssh | 58% Средний | почти 2 года назад | |
![]() | RLSA-2023:4419 Important: openssh security update | 58% Средний | почти 2 года назад | |
GHSA-px36-p9hv-7h2v The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. | CVSS3: 9.8 | 58% Средний | почти 2 года назад | |
ELSA-2023-4419 ELSA-2023-4419: openssh security update (IMPORTANT) | почти 2 года назад |
Уязвимостей на страницу