Lucene search

K
OpenbsdOpenssh

5 matches found

CVE
CVE
added 2023/07/20 3:15 a.m.29593 views

CVE-2023-38408

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because ...

9.8CVSS8.3AI score0.60483EPSS
CVE
CVE
added 2006/09/27 11:7 p.m.4164 views

CVE-2006-5051

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

9.3CVSS8.4AI score0.01458EPSS
CVE
CVE
added 2023/03/17 4:15 a.m.3983 views

CVE-2023-28531

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.

9.8CVSS9.1AI score0.00104EPSS
CVE
CVE
added 2008/08/27 8:41 p.m.2824 views

CVE-2008-3844

Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not dist...

9.3CVSS6.1AI score0.02467EPSS
CVE
CVE
added 2017/04/11 6:59 p.m.1770 views

CVE-2016-1908

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on...

9.8CVSS9AI score0.02402EPSS