Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1vwp-yqcr-nkg6
SummaryMultiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Aliases
0
alias CVE-2002-1359
Fixed_packages
0
url pkg:deb/debian/openssh@0?distro=trixie
purl pkg:deb/debian/openssh@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie
1
url pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-a7m6-uqbt-nqd9
4
vulnerability VCID-ajmg-5kgx-k7h5
5
vulnerability VCID-b4uc-yh56-muej
6
vulnerability VCID-bnrq-2fsr-mfgd
7
vulnerability VCID-kgn5-p8kx-qucj
8
vulnerability VCID-wga4-sqwk-4bfj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-a7m6-uqbt-nqd9
4
vulnerability VCID-ajmg-5kgx-k7h5
5
vulnerability VCID-bnrq-2fsr-mfgd
6
vulnerability VCID-kgn5-p8kx-qucj
7
vulnerability VCID-wga4-sqwk-4bfj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-ajmg-5kgx-k7h5
4
vulnerability VCID-bnrq-2fsr-mfgd
5
vulnerability VCID-kgn5-p8kx-qucj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie
purl pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-bnrq-2fsr-mfgd
4
vulnerability VCID-kgn5-p8kx-qucj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie
5
url pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie
purl pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1359
reference_id
reference_type
scores
0
value 0.86998
scoring_system epss
scoring_elements 0.9943
published_at 2026-04-01T12:55:00Z
1
value 0.86998
scoring_system epss
scoring_elements 0.99429
published_at 2026-04-02T12:55:00Z
2
value 0.86998
scoring_system epss
scoring_elements 0.99431
published_at 2026-04-07T12:55:00Z
3
value 0.86998
scoring_system epss
scoring_elements 0.99433
published_at 2026-04-09T12:55:00Z
4
value 0.86998
scoring_system epss
scoring_elements 0.99435
published_at 2026-04-11T12:55:00Z
5
value 0.86998
scoring_system epss
scoring_elements 0.99436
published_at 2026-04-13T12:55:00Z
6
value 0.86998
scoring_system epss
scoring_elements 0.99439
published_at 2026-04-18T12:55:00Z
7
value 0.86998
scoring_system epss
scoring_elements 0.99438
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1359
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm
reference_id CVE-2002-1359
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm
2
reference_url http://www.rapid7.com/advisories/R7-0009.html
reference_id CVE-2002-1359
reference_type exploit
scores
url http://www.rapid7.com/advisories/R7-0009.html
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb
reference_id CVE-2002-1359;OSVDB-8044
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb
Weaknesses
Exploits
0
date_added null
description
This module exploits a buffer overflow in the PuTTY SSH client that is
          triggered through a validation error in SSH.c. This vulnerability
          affects versions 0.53 and earlier.
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2002-12-16
exploit_type null
platform Windows
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/ssh/putty_msg_debug.rb
1
date_added 2006-05-14
description PuTTy.exe 0.53 - Validation Remote Buffer Overflow (Metasploit)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2006-05-15
exploit_type remote
platform windows
source_date_updated 2016-07-29
data_source Exploit-DB
source_url http://www.rapid7.com/advisories/R7-0009.html
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1vwp-yqcr-nkg6