Known Vulnerabilities for Tectia Server by Ssh

Listed below are 10 of the newest known vulnerabilities associated with "Tectia Server" by "Ssh".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-27893 SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecu... 7 - HIGH 2021-03-15 2022-07-12
CVE-2021-27892 SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected. 7.8 - HIGH 2021-03-15 2022-07-12
CVE-2021-27891 SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected. 8.8 - HIGH 2021-03-15 2021-03-23
CVE-2012-5975 The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5,... 9.3 - HIGH 2012-12-04 2012-12-05
CVE-2008-5161 Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, a... 2.6 - LOW 2008-11-19 2018-10-11
CVE-2007-5616 ssh-signer in SSH Tectia Client and Server 5.x before 5.2.4, and 5.3.x before 5.3.6, on Unix and Linux allows local users to ... 7.2 - HIGH 2008-01-09 2020-09-28
CVE-2007-2063 SSH Tectia Server for IBM z/OS before 5.4.0 uses insecure world-writable permissions for (1) the server pid file, which allow... 4.4 - MEDIUM 2007-04-18 2017-07-29
CVE-2006-5484 SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key wi... 5 - MEDIUM 2006-10-24 2019-08-28
CVE-2006-4315 Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1... 7.2 - HIGH 2006-08-23 2017-07-20
CVE-2005-2146 SSH Tectia Server 4.3.1 and earlier, and SSH Secure Shell for Windows Servers, uses insecure permissions when generating the ... 4.6 - MEDIUM 2005-07-05 2008-09-05

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSshTectia Server6.3.2AllAllAll
ApplicationSshTectia Server6.3.1AllAllAll
ApplicationSshTectia Server6.3.0AllAllAll
ApplicationSshTectia Server6.2.5AllAllAll
ApplicationSshTectia Server6.2.4AllAllAll
ApplicationSshTectia Server6.2.3AllAllAll
ApplicationSshTectia Server6.2.2AllAllAll
ApplicationSshTectia Server6.2.1AllAllAll
ApplicationSshTectia Server6.2.0.1275AllAllAll
ApplicationSshTectia Server6.2.0AllAllAll
ApplicationSshTectia Server6.1.9.95AllAllAll
ApplicationSshTectia Server6.1.9AllAllAll
ApplicationSshTectia Server6.1.8.136AllAllAll
ApplicationSshTectia Server6.1.8AllAllAll
ApplicationSshTectia Server6.1.7.149AllAllAll
ApplicationSshTectia Server6.1.7AllAllAll
ApplicationSshTectia Server6.1.6AllAllAll
ApplicationSshTectia Server6.1.5AllAllAll
ApplicationSshTectia Server6.1.4AllAllAll
ApplicationSshTectia Server6.1.3AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report