|Max CVSS||9.3||Min CVSS||5.0||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
|17-10-2018 - 21:40||27-09-2006 - 23:07|
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack d
|17-10-2018 - 21:40||27-09-2006 - 01:07|
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
|17-10-2018 - 21:40||29-09-2006 - 00:07|
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. Successful
|11-10-2017 - 01:31||27-09-2006 - 23:07|