Логотип exploitDog
bind:CVE-2021-36367
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-36367

Количество 5

Количество 5

ubuntu логотип

CVE-2021-36367

больше 4 лет назад

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2021-36367

больше 4 лет назад

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2021-36367

больше 4 лет назад

PuTTY through 0.75 proceeds with establishing an SSH session even if i ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-wccm-6vx2-7p8c

больше 3 лет назад

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2021-04545

больше 4 лет назад

Уязвимость реализации протокола SSH средства криптографической защиты PuTTY, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-36367

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-36367

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-36367

PuTTY through 0.75 proceeds with establishing an SSH session even if i ...

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-wccm-6vx2-7p8c

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS3: 8.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04545

Уязвимость реализации протокола SSH средства криптографической защиты PuTTY, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 8.1
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу