[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:74488
The host is installed with Putty through 0.75 and is prone to an insufficient verification of data authenticity vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SSH session. Successful exploitation allows an attacker to capture credential data, and ...

oval:org.secpod.oval:def:612881
Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the Terrapin attack. This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport protocol by sending extra messa ...

oval:org.secpod.oval:def:96941
Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the Terrapin attack. This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport protocol by sending extra messa ...

CWE    1
CWE-345
*CVE
CVE-2021-36367

© SecPod Technologies