Identifier Related Record Severity Date Published Description Versions Affected
CVE-2019-16905 BDSA-2019-3195 High Oct 09, 2019 OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or serve more...
7.7
CVE-2018-20685 BDSA-2018-4661 Medium Jan 10, 2019 In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. Th more...
7.7, 7.2, 7.1, 7.0, 6.9, 6.8, 6.7, 6.3, 6.2, 6.0
CVE-2018-15919 BDSA-2018-2986 Medium Aug 28, 2018 Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system w more...
7.7, 7.2, 7.1, 7.0, 6.9, 6.8, 6.7, 6.3, 6.2, 6.0
CVE-2018-15473 BDSA-2018-2820 Medium Aug 17, 2018 OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet more...
7.7, 7.2, 7.1, 7.0, 6.9, 6.8, 6.7, 6.3, 6.2, 6.0
CVE-2016-20012 BDSA-2016-1729 Medium Sep 15, 2021 OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to t more...
7.7, 7.2, 7.1, 7.0, 6.9, 6.8, 6.7, 6.3, 6.2, 6.0
BDSA-2023-3560 Medium Dec 28, 2023 OpenSSH is vulnerable to a specific [Rowhammer](https://en.wikipedia.org/wiki/Row_hammer) attack when running on a machine with most (89%) types of DRA more...
BDSA-2020-1286 Low Jun 05, 2020 OpenSSH is vulnerable to the overwriting of files due to the possibility of the file transfer mechanism becoming unsynchronized. A remote attacker coul more...
BDSA-2020-0264 Medium Feb 14, 2020 OpenSSH is vulnerable to SHA1 collision attacks. This is a known vulnerability against the SHA1 algorithm that can be abused by an attacker to break e more...
BDSA-2016-1582 High Dec 12, 2018 An untrusted search path vulnerability has been discovered in OpenSSH. An attacker could exploit this vulnerability by leveraging the control of the fo more...