Vulnerabilities > Openbsd > Openssh > 5.8p2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-03-27 | CVE-2014-2653 | Improper Input Validation vulnerability in Openbsd Openssh The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate. | 5.8 |
2014-03-18 | CVE-2014-2532 | Permissions, Privileges, and Access Controls vulnerability in multiple products sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. | 5.8 |
2013-03-07 | CVE-2010-5107 | Denial of Service vulnerability in OpenSSH The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections. | 5.0 |