Логотип exploitDog
bind:"GHSA-jrwv-mv4h-7rrq" OR bind:"CVE-2025-26465"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-jrwv-mv4h-7rrq" OR bind:"CVE-2025-26465"

Количество 13

Количество 13

github логотип

GHSA-jrwv-mv4h-7rrq

4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Средний
ubuntu логотип

CVE-2025-26465

4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Средний
redhat логотип

CVE-2025-26465

4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Средний
nvd логотип

CVE-2025-26465

4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
EPSS: Средний
msrc логотип

CVE-2025-26465

4 месяца назад

CVSS3: 6.8
EPSS: Средний
debian логотип

CVE-2025-26465

4 месяца назад

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

CVSS3: 6.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0744-1

4 месяца назад

Security update for openssh8.4

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0659-1

4 месяца назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0605-1

4 месяца назад

Security update for openssh

EPSS: Средний
oracle-oval логотип

ELSA-2025-6993

около 1 месяца назад

ELSA-2025-6993: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2025-01959

4 месяца назад

Уязвимость компонента VerifyHostKeyDNS средства криптографической защиты OpenSSH, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0585-1

4 месяца назад

Security update for openssh

EPSS: Низкий
redos логотип

ROS-20250307-13

4 месяца назад

Уязвимость openssh

CVSS3: 6.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-jrwv-mv4h-7rrq

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
49%
Средний
4 месяца назад
ubuntu логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
49%
Средний
4 месяца назад
redhat логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
49%
Средний
4 месяца назад
nvd логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVSS3: 6.8
49%
Средний
4 месяца назад
msrc логотип
CVSS3: 6.8
49%
Средний
4 месяца назад
debian логотип
CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...

CVSS3: 6.8
49%
Средний
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0744-1

Security update for openssh8.4

49%
Средний
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0659-1

Security update for openssh

49%
Средний
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0605-1

Security update for openssh

49%
Средний
4 месяца назад
oracle-oval логотип
ELSA-2025-6993

ELSA-2025-6993: openssh security update (MODERATE)

около 1 месяца назад
fstec логотип
BDU:2025-01959

Уязвимость компонента VerifyHostKeyDNS средства криптографической защиты OpenSSH, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.8
49%
Средний
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0585-1

Security update for openssh

4 месяца назад
redos логотип
ROS-20250307-13

Уязвимость openssh

CVSS3: 6.8
49%
Средний
4 месяца назад

Уязвимостей на страницу