Known Vulnerabilities for products from Ssh
Listed below are 20 of the newest known vulnerabilities associated with the vendor "Ssh".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2021-27893 | SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecu... | 7 - HIGH | 2021-03-15 | 2022-07-12 |
| CVE-2021-27892 | SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected. | 7.8 - HIGH | 2021-03-15 | 2022-07-12 |
| CVE-2021-27891 | SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected. | 8.8 - HIGH | 2021-03-15 | 2021-03-23 |
| CVE-2012-5975 | The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5,... | 9.3 - HIGH | 2012-12-04 | 2012-12-05 |
| CVE-2011-0766 | The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh lib... | 7.8 - HIGH | 2011-05-31 | 2023-09-25 |
| CVE-2008-5161 | Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, a... | 2.6 - LOW | 2008-11-19 | 2018-10-11 |
| CVE-2007-5616 | ssh-signer in SSH Tectia Client and Server 5.x before 5.2.4, and 5.3.x before 5.3.6, on Unix and Linux allows local users to ... | 7.2 - HIGH | 2008-01-09 | 2020-09-28 |
| CVE-2007-2063 | SSH Tectia Server for IBM z/OS before 5.4.0 uses insecure world-writable permissions for (1) the server pid file, which allow... | 4.4 - MEDIUM | 2007-04-18 | 2017-07-29 |
| CVE-2006-5484 | SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key wi... | 5 - MEDIUM | 2006-10-24 | 2019-08-28 |
| CVE-2006-4316 | SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtai... | 7.2 - HIGH | 2006-08-23 | 2017-07-20 |
| CVE-2006-4315 | Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1... | 7.2 - HIGH | 2006-08-23 | 2017-07-20 |
| CVE-2005-4310 | SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong cr... | 7.5 - HIGH | 2005-12-17 | 2011-03-08 |
| CVE-2005-2146 | SSH Tectia Server 4.3.1 and earlier, and SSH Secure Shell for Windows Servers, uses insecure permissions when generating the ... | 4.6 - MEDIUM | 2005-07-05 | 2008-09-05 |
| CVE-2003-1120 | Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled,... | 3.7 - LOW | 2003-12-31 | 2017-07-11 |
| CVE-2003-1119 | SSH Secure Shell before 3.2.9 allows remote attackers to cause a denial of service via malformed BER/DER packets. | 5 - MEDIUM | 2003-12-31 | 2008-09-05 |
| CVE-2002-1715 | SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploadi... | 7.2 - HIGH | 2002-12-31 | 2017-07-11 |
| CVE-2002-1646 | SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote attackers to override the AllowedAuthentications configuration and ... | 7.5 - HIGH | 2002-12-31 | 2017-07-11 |
| CVE-2002-1645 | Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers ... | 10 - HIGH | 2002-11-25 | 2017-07-11 |
| CVE-2002-1644 | SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not... | 7.2 - HIGH | 2002-11-25 | 2017-07-11 |
| CVE-2001-1476 | SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to... | 7.5 - HIGH | 2001-01-18 | 2017-07-11 |
Known software with vulnerabilities from Ssh
| Type | Vendor | Product | Version |
|---|---|---|---|
| Application | Ssh | Accession | ssh_accession_1.2.84 |
| Application | Ssh | Daemon | - |
| Application | Ssh | Secure Shell | - |
| Application | Ssh | Secure Shell For Servers | - |
| Application | Ssh | Ssh | 1.2.0 |
| Application | Ssh | Ssh2 | - |
| Application | Ssh | Tectia Client | - |
| Application | Ssh | Tectia Client Server Connector | - |
| Application | Ssh | Tectia Connector | - |
| Application | Ssh | Tectia Manager | - |
| Application | Ssh | Tectia Server | - |