Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6n7q-b264-b3c9
Summary
Multiple vulnerabilities have been found in OpenSSH, the worst of
    which may allow remote attackers to execute arbitrary code.
Aliases
0
alias CVE-2008-5161
Fixed_packages
0
url pkg:deb/debian/openssh@1:5.1p1-5?distro=trixie
purl pkg:deb/debian/openssh@1:5.1p1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.1p1-5%3Fdistro=trixie
1
url pkg:deb/debian/openssh@1:5.1p1-5
purl pkg:deb/debian/openssh@1:5.1p1-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11sf-sq1n-8ybk
1
vulnerability VCID-27t6-mvt2-6kcd
2
vulnerability VCID-3mzh-y1ek-cqh9
3
vulnerability VCID-45wb-44rx-1bhw
4
vulnerability VCID-4fj8-vfgx-pyh9
5
vulnerability VCID-81na-a8p9-3fc3
6
vulnerability VCID-87uy-3q5r-r3b7
7
vulnerability VCID-a7kr-mfau-bufd
8
vulnerability VCID-aaue-a343-u7f5
9
vulnerability VCID-ajmg-5kgx-k7h5
10
vulnerability VCID-bdnh-bkx5-h3fe
11
vulnerability VCID-c72q-f2cy-eqgc
12
vulnerability VCID-e3hw-afkw-f7bt
13
vulnerability VCID-fczw-59xy-83c6
14
vulnerability VCID-g5qe-8p8p-3kd6
15
vulnerability VCID-g8g3-ts9j-8uab
16
vulnerability VCID-ge2m-my5w-z3eb
17
vulnerability VCID-gns3-z8js-4fef
18
vulnerability VCID-gzmm-8kvw-6qbv
19
vulnerability VCID-ha8v-pqwf-r3a1
20
vulnerability VCID-hmqc-xunp-myap
21
vulnerability VCID-hse5-y15y-n3dw
22
vulnerability VCID-jzn6-bzzf-nugp
23
vulnerability VCID-k8ae-fc4a-gycy
24
vulnerability VCID-kbba-6c9u-tygk
25
vulnerability VCID-mpex-kz3k-97aq
26
vulnerability VCID-myec-kc76-9bc1
27
vulnerability VCID-qt1x-kyuf-gker
28
vulnerability VCID-qx5k-n11s-rucg
29
vulnerability VCID-t1sg-4bvj-qqfk
30
vulnerability VCID-u21t-acnr-dub2
31
vulnerability VCID-ubjj-qb2c-n3d4
32
vulnerability VCID-v1vq-wecd-1ud9
33
vulnerability VCID-v27n-4vt2-rffw
34
vulnerability VCID-vj3u-a1c3-6qe5
35
vulnerability VCID-vrgz-eguk-k3dy
36
vulnerability VCID-wkpy-uwex-93db
37
vulnerability VCID-yrzy-er8x-c3ad
38
vulnerability VCID-ytkr-ev34-buhd
39
vulnerability VCID-zncv-645p-f3gn
40
vulnerability VCID-zxw6-2um9-23e7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.1p1-5
2
url pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-a7m6-uqbt-nqd9
4
vulnerability VCID-ajmg-5kgx-k7h5
5
vulnerability VCID-b4uc-yh56-muej
6
vulnerability VCID-bnrq-2fsr-mfgd
7
vulnerability VCID-kgn5-p8kx-qucj
8
vulnerability VCID-wga4-sqwk-4bfj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie
3
url pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-a7m6-uqbt-nqd9
4
vulnerability VCID-ajmg-5kgx-k7h5
5
vulnerability VCID-bnrq-2fsr-mfgd
6
vulnerability VCID-kgn5-p8kx-qucj
7
vulnerability VCID-wga4-sqwk-4bfj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-ajmg-5kgx-k7h5
4
vulnerability VCID-bnrq-2fsr-mfgd
5
vulnerability VCID-kgn5-p8kx-qucj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie
purl pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-792n-jkzj-qqhd
1
vulnerability VCID-8efr-budq-6bb6
2
vulnerability VCID-a4eq-r71a-buhm
3
vulnerability VCID-bnrq-2fsr-mfgd
4
vulnerability VCID-kgn5-p8kx-qucj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie
6
url pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie
purl pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie
7
url pkg:ebuild/net-misc/openssh@6.6_p1-r1
purl pkg:ebuild/net-misc/openssh@6.6_p1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openssh@6.6_p1-r1
Affected_packages
0
url pkg:deb/debian/openssh@1:3.4p1-1.woody.3
purl pkg:deb/debian/openssh@1:3.4p1-1.woody.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11sf-sq1n-8ybk
1
vulnerability VCID-1pq3-ktfr-vqa4
2
vulnerability VCID-27t6-mvt2-6kcd
3
vulnerability VCID-3mzh-y1ek-cqh9
4
vulnerability VCID-45wb-44rx-1bhw
5
vulnerability VCID-48u8-uvvd-m7ef
6
vulnerability VCID-4fj8-vfgx-pyh9
7
vulnerability VCID-61qv-3p82-fuh9
8
vulnerability VCID-679v-qrkw-qbar
9
vulnerability VCID-6n7q-b264-b3c9
10
vulnerability VCID-6tgm-yq5b-gyev
11
vulnerability VCID-81na-a8p9-3fc3
12
vulnerability VCID-84r3-6n5q-1kft
13
vulnerability VCID-87uy-3q5r-r3b7
14
vulnerability VCID-9x46-xm8n-m3bs
15
vulnerability VCID-9zr9-947g-g7dn
16
vulnerability VCID-a7kr-mfau-bufd
17
vulnerability VCID-aaue-a343-u7f5
18
vulnerability VCID-ajmg-5kgx-k7h5
19
vulnerability VCID-akd1-gm5s-cfcs
20
vulnerability VCID-bdnh-bkx5-h3fe
21
vulnerability VCID-bemm-xfxx-bqhb
22
vulnerability VCID-c72q-f2cy-eqgc
23
vulnerability VCID-dw3s-w6py-muh9
24
vulnerability VCID-e3hw-afkw-f7bt
25
vulnerability VCID-fczw-59xy-83c6
26
vulnerability VCID-g1vx-bcxw-mqfg
27
vulnerability VCID-g5qe-8p8p-3kd6
28
vulnerability VCID-g8g3-ts9j-8uab
29
vulnerability VCID-ge2m-my5w-z3eb
30
vulnerability VCID-gns3-z8js-4fef
31
vulnerability VCID-gzmm-8kvw-6qbv
32
vulnerability VCID-ha8v-pqwf-r3a1
33
vulnerability VCID-hmqc-xunp-myap
34
vulnerability VCID-hse5-y15y-n3dw
35
vulnerability VCID-hu66-jpbe-dfhn
36
vulnerability VCID-jzk9-kyvp-5qdz
37
vulnerability VCID-jzn6-bzzf-nugp
38
vulnerability VCID-k8ae-fc4a-gycy
39
vulnerability VCID-kbba-6c9u-tygk
40
vulnerability VCID-kgja-5xxj-1ucg
41
vulnerability VCID-m6qv-m21j-g3cj
42
vulnerability VCID-mpex-kz3k-97aq
43
vulnerability VCID-myec-kc76-9bc1
44
vulnerability VCID-nrj6-k3qf-2ubp
45
vulnerability VCID-p5ps-aad3-que9
46
vulnerability VCID-qt1x-kyuf-gker
47
vulnerability VCID-qx5k-n11s-rucg
48
vulnerability VCID-rwzw-vrhk-sqfw
49
vulnerability VCID-sv83-ggsr-27au
50
vulnerability VCID-t1sg-4bvj-qqfk
51
vulnerability VCID-tqd9-nyt5-13e7
52
vulnerability VCID-tur1-ruxr-yqe3
53
vulnerability VCID-u21t-acnr-dub2
54
vulnerability VCID-u4sn-d8j6-bkdx
55
vulnerability VCID-u8z5-76zk-hqah
56
vulnerability VCID-ubjj-qb2c-n3d4
57
vulnerability VCID-v1vq-wecd-1ud9
58
vulnerability VCID-v27n-4vt2-rffw
59
vulnerability VCID-vj3u-a1c3-6qe5
60
vulnerability VCID-vrgz-eguk-k3dy
61
vulnerability VCID-wkpy-uwex-93db
62
vulnerability VCID-wx7h-g53d-67eh
63
vulnerability VCID-yrvb-stza-yfdp
64
vulnerability VCID-yrzy-er8x-c3ad
65
vulnerability VCID-ytkr-ev34-buhd
66
vulnerability VCID-z21r-z4zr-p3ex
67
vulnerability VCID-zncv-645p-f3gn
68
vulnerability VCID-zxw6-2um9-23e7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.4p1-1.woody.3
1
url pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.6
purl pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11sf-sq1n-8ybk
1
vulnerability VCID-27t6-mvt2-6kcd
2
vulnerability VCID-3mzh-y1ek-cqh9
3
vulnerability VCID-45wb-44rx-1bhw
4
vulnerability VCID-48u8-uvvd-m7ef
5
vulnerability VCID-4fj8-vfgx-pyh9
6
vulnerability VCID-6n7q-b264-b3c9
7
vulnerability VCID-81na-a8p9-3fc3
8
vulnerability VCID-84r3-6n5q-1kft
9
vulnerability VCID-87uy-3q5r-r3b7
10
vulnerability VCID-9x46-xm8n-m3bs
11
vulnerability VCID-9zr9-947g-g7dn
12
vulnerability VCID-a7kr-mfau-bufd
13
vulnerability VCID-aaue-a343-u7f5
14
vulnerability VCID-ajmg-5kgx-k7h5
15
vulnerability VCID-akd1-gm5s-cfcs
16
vulnerability VCID-bdnh-bkx5-h3fe
17
vulnerability VCID-c72q-f2cy-eqgc
18
vulnerability VCID-dw3s-w6py-muh9
19
vulnerability VCID-e3hw-afkw-f7bt
20
vulnerability VCID-fczw-59xy-83c6
21
vulnerability VCID-g1vx-bcxw-mqfg
22
vulnerability VCID-g5qe-8p8p-3kd6
23
vulnerability VCID-g8g3-ts9j-8uab
24
vulnerability VCID-ge2m-my5w-z3eb
25
vulnerability VCID-gns3-z8js-4fef
26
vulnerability VCID-gzmm-8kvw-6qbv
27
vulnerability VCID-ha8v-pqwf-r3a1
28
vulnerability VCID-hmqc-xunp-myap
29
vulnerability VCID-hse5-y15y-n3dw
30
vulnerability VCID-jzk9-kyvp-5qdz
31
vulnerability VCID-jzn6-bzzf-nugp
32
vulnerability VCID-k8ae-fc4a-gycy
33
vulnerability VCID-kbba-6c9u-tygk
34
vulnerability VCID-mpex-kz3k-97aq
35
vulnerability VCID-myec-kc76-9bc1
36
vulnerability VCID-p5ps-aad3-que9
37
vulnerability VCID-qt1x-kyuf-gker
38
vulnerability VCID-qx5k-n11s-rucg
39
vulnerability VCID-rwzw-vrhk-sqfw
40
vulnerability VCID-sv83-ggsr-27au
41
vulnerability VCID-t1sg-4bvj-qqfk
42
vulnerability VCID-tqd9-nyt5-13e7
43
vulnerability VCID-tur1-ruxr-yqe3
44
vulnerability VCID-u21t-acnr-dub2
45
vulnerability VCID-u4sn-d8j6-bkdx
46
vulnerability VCID-ubjj-qb2c-n3d4
47
vulnerability VCID-v1vq-wecd-1ud9
48
vulnerability VCID-v27n-4vt2-rffw
49
vulnerability VCID-vj3u-a1c3-6qe5
50
vulnerability VCID-vrgz-eguk-k3dy
51
vulnerability VCID-wkpy-uwex-93db
52
vulnerability VCID-yrvb-stza-yfdp
53
vulnerability VCID-yrzy-er8x-c3ad
54
vulnerability VCID-ytkr-ev34-buhd
55
vulnerability VCID-z21r-z4zr-p3ex
56
vulnerability VCID-zncv-645p-f3gn
57
vulnerability VCID-zxw6-2um9-23e7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.6
2
url pkg:deb/debian/openssh@1:4.3p2-9etch2%2Bm68k1
purl pkg:deb/debian/openssh@1:4.3p2-9etch2%2Bm68k1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11sf-sq1n-8ybk
1
vulnerability VCID-27t6-mvt2-6kcd
2
vulnerability VCID-3mzh-y1ek-cqh9
3
vulnerability VCID-45wb-44rx-1bhw
4
vulnerability VCID-4fj8-vfgx-pyh9
5
vulnerability VCID-6n7q-b264-b3c9
6
vulnerability VCID-81na-a8p9-3fc3
7
vulnerability VCID-84r3-6n5q-1kft
8
vulnerability VCID-87uy-3q5r-r3b7
9
vulnerability VCID-9x46-xm8n-m3bs
10
vulnerability VCID-9zr9-947g-g7dn
11
vulnerability VCID-a7kr-mfau-bufd
12
vulnerability VCID-aaue-a343-u7f5
13
vulnerability VCID-ajmg-5kgx-k7h5
14
vulnerability VCID-bdnh-bkx5-h3fe
15
vulnerability VCID-c72q-f2cy-eqgc
16
vulnerability VCID-dw3s-w6py-muh9
17
vulnerability VCID-e3hw-afkw-f7bt
18
vulnerability VCID-fczw-59xy-83c6
19
vulnerability VCID-g1vx-bcxw-mqfg
20
vulnerability VCID-g5qe-8p8p-3kd6
21
vulnerability VCID-g8g3-ts9j-8uab
22
vulnerability VCID-ge2m-my5w-z3eb
23
vulnerability VCID-gns3-z8js-4fef
24
vulnerability VCID-gzmm-8kvw-6qbv
25
vulnerability VCID-ha8v-pqwf-r3a1
26
vulnerability VCID-hmqc-xunp-myap
27
vulnerability VCID-hse5-y15y-n3dw
28
vulnerability VCID-jzn6-bzzf-nugp
29
vulnerability VCID-k8ae-fc4a-gycy
30
vulnerability VCID-kbba-6c9u-tygk
31
vulnerability VCID-mpex-kz3k-97aq
32
vulnerability VCID-myec-kc76-9bc1
33
vulnerability VCID-qt1x-kyuf-gker
34
vulnerability VCID-qx5k-n11s-rucg
35
vulnerability VCID-t1sg-4bvj-qqfk
36
vulnerability VCID-tqd9-nyt5-13e7
37
vulnerability VCID-u21t-acnr-dub2
38
vulnerability VCID-u4sn-d8j6-bkdx
39
vulnerability VCID-ubjj-qb2c-n3d4
40
vulnerability VCID-v1vq-wecd-1ud9
41
vulnerability VCID-v27n-4vt2-rffw
42
vulnerability VCID-vj3u-a1c3-6qe5
43
vulnerability VCID-vrgz-eguk-k3dy
44
vulnerability VCID-wkpy-uwex-93db
45
vulnerability VCID-yrvb-stza-yfdp
46
vulnerability VCID-yrzy-er8x-c3ad
47
vulnerability VCID-ytkr-ev34-buhd
48
vulnerability VCID-zncv-645p-f3gn
49
vulnerability VCID-zxw6-2um9-23e7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.3p2-9etch2%252Bm68k1
3
url pkg:deb/debian/openssh@1:4.3p2-9etch3
purl pkg:deb/debian/openssh@1:4.3p2-9etch3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11sf-sq1n-8ybk
1
vulnerability VCID-27t6-mvt2-6kcd
2
vulnerability VCID-3mzh-y1ek-cqh9
3
vulnerability VCID-45wb-44rx-1bhw
4
vulnerability VCID-4fj8-vfgx-pyh9
5
vulnerability VCID-6n7q-b264-b3c9
6
vulnerability VCID-81na-a8p9-3fc3
7
vulnerability VCID-84r3-6n5q-1kft
8
vulnerability VCID-87uy-3q5r-r3b7
9
vulnerability VCID-9x46-xm8n-m3bs
10
vulnerability VCID-9zr9-947g-g7dn
11
vulnerability VCID-a7kr-mfau-bufd
12
vulnerability VCID-aaue-a343-u7f5
13
vulnerability VCID-ajmg-5kgx-k7h5
14
vulnerability VCID-bdnh-bkx5-h3fe
15
vulnerability VCID-c72q-f2cy-eqgc
16
vulnerability VCID-dw3s-w6py-muh9
17
vulnerability VCID-e3hw-afkw-f7bt
18
vulnerability VCID-fczw-59xy-83c6
19
vulnerability VCID-g1vx-bcxw-mqfg
20
vulnerability VCID-g5qe-8p8p-3kd6
21
vulnerability VCID-g8g3-ts9j-8uab
22
vulnerability VCID-ge2m-my5w-z3eb
23
vulnerability VCID-gns3-z8js-4fef
24
vulnerability VCID-gzmm-8kvw-6qbv
25
vulnerability VCID-ha8v-pqwf-r3a1
26
vulnerability VCID-hmqc-xunp-myap
27
vulnerability VCID-hse5-y15y-n3dw
28
vulnerability VCID-jzn6-bzzf-nugp
29
vulnerability VCID-k8ae-fc4a-gycy
30
vulnerability VCID-kbba-6c9u-tygk
31
vulnerability VCID-mpex-kz3k-97aq
32
vulnerability VCID-myec-kc76-9bc1
33
vulnerability VCID-qt1x-kyuf-gker
34
vulnerability VCID-qx5k-n11s-rucg
35
vulnerability VCID-t1sg-4bvj-qqfk
36
vulnerability VCID-tqd9-nyt5-13e7
37
vulnerability VCID-u21t-acnr-dub2
38
vulnerability VCID-u4sn-d8j6-bkdx
39
vulnerability VCID-ubjj-qb2c-n3d4
40
vulnerability VCID-v1vq-wecd-1ud9
41
vulnerability VCID-v27n-4vt2-rffw
42
vulnerability VCID-vj3u-a1c3-6qe5
43
vulnerability VCID-vrgz-eguk-k3dy
44
vulnerability VCID-wkpy-uwex-93db
45
vulnerability VCID-yrvb-stza-yfdp
46
vulnerability VCID-yrzy-er8x-c3ad
47
vulnerability VCID-ytkr-ev34-buhd
48
vulnerability VCID-zncv-645p-f3gn
49
vulnerability VCID-zxw6-2um9-23e7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.3p2-9etch3
4
url pkg:rpm/redhat/openssh@4.3p2-36?arch=el5
purl pkg:rpm/redhat/openssh@4.3p2-36?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6n7q-b264-b3c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssh@4.3p2-36%3Farch=el5
References
0
reference_url http://isc.sans.org/diary.html?storyid=5366
reference_id
reference_type
scores
url http://isc.sans.org/diary.html?storyid=5366
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
2
reference_url http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
3
reference_url http://marc.info/?l=bugtraq&m=125017764422557&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125017764422557&w=2
4
reference_url http://openssh.org/txt/cbc.adv
reference_id
reference_type
scores
url http://openssh.org/txt/cbc.adv
5
reference_url http://osvdb.org/49872
reference_id
reference_type
scores
url http://osvdb.org/49872
6
reference_url http://osvdb.org/50035
reference_id
reference_type
scores
url http://osvdb.org/50035
7
reference_url http://osvdb.org/50036
reference_id
reference_type
scores
url http://osvdb.org/50036
8
reference_url http://rhn.redhat.com/errata/RHSA-2009-1287.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2009-1287.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5161.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5161
reference_id
reference_type
scores
0
value 0.02747
scoring_system epss
scoring_elements 0.86016
published_at 2026-04-18T12:55:00Z
1
value 0.02747
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-01T12:55:00Z
2
value 0.02747
scoring_system epss
scoring_elements 0.85941
published_at 2026-04-02T12:55:00Z
3
value 0.02747
scoring_system epss
scoring_elements 0.85957
published_at 2026-04-04T12:55:00Z
4
value 0.02747
scoring_system epss
scoring_elements 0.85956
published_at 2026-04-07T12:55:00Z
5
value 0.02747
scoring_system epss
scoring_elements 0.85975
published_at 2026-04-08T12:55:00Z
6
value 0.02747
scoring_system epss
scoring_elements 0.85985
published_at 2026-04-09T12:55:00Z
7
value 0.02747
scoring_system epss
scoring_elements 0.85999
published_at 2026-04-11T12:55:00Z
8
value 0.02747
scoring_system epss
scoring_elements 0.85997
published_at 2026-04-12T12:55:00Z
9
value 0.02747
scoring_system epss
scoring_elements 0.85993
published_at 2026-04-13T12:55:00Z
10
value 0.02747
scoring_system epss
scoring_elements 0.86011
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5161
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5161
12
reference_url http://secunia.com/advisories/32740
reference_id
reference_type
scores
url http://secunia.com/advisories/32740
13
reference_url http://secunia.com/advisories/32760
reference_id
reference_type
scores
url http://secunia.com/advisories/32760
14
reference_url http://secunia.com/advisories/32833
reference_id
reference_type
scores
url http://secunia.com/advisories/32833
15
reference_url http://secunia.com/advisories/33121
reference_id
reference_type
scores
url http://secunia.com/advisories/33121
16
reference_url http://secunia.com/advisories/33308
reference_id
reference_type
scores
url http://secunia.com/advisories/33308
17
reference_url http://secunia.com/advisories/34857
reference_id
reference_type
scores
url http://secunia.com/advisories/34857
18
reference_url http://secunia.com/advisories/36558
reference_id
reference_type
scores
url http://secunia.com/advisories/36558
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
20
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
21
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10106
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10106
22
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10163
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10163
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
25
reference_url http://support.apple.com/kb/HT3937
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3937
26
reference_url http://support.attachmate.com/techdocs/2398.html
reference_id
reference_type
scores
url http://support.attachmate.com/techdocs/2398.html
27
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
28
reference_url http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
reference_id
reference_type
scores
url http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
29
reference_url http://www.kb.cert.org/vuls/id/958563
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/958563
30
reference_url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
reference_id
reference_type
scores
url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
31
reference_url http://www.securityfocus.com/archive/1/498558/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498558/100/0/threaded
32
reference_url http://www.securityfocus.com/archive/1/498579/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498579/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/32319
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32319
34
reference_url http://www.securitytracker.com/id?1021235
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021235
35
reference_url http://www.securitytracker.com/id?1021236
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021236
36
reference_url http://www.securitytracker.com/id?1021382
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021382
37
reference_url http://www.ssh.com/company/news/article/953/
reference_id
reference_type
scores
url http://www.ssh.com/company/news/article/953/
38
reference_url http://www.vupen.com/english/advisories/2008/3172
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3172
39
reference_url http://www.vupen.com/english/advisories/2008/3173
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3173
40
reference_url http://www.vupen.com/english/advisories/2008/3409
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3409
41
reference_url http://www.vupen.com/english/advisories/2009/1135
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1135
42
reference_url http://www.vupen.com/english/advisories/2009/3184
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/3184
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=472068
reference_id 472068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=472068
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506115
reference_id 506115
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506115
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*
reference_id cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5161
reference_id CVE-2008-5161
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5161
213
reference_url https://security.gentoo.org/glsa/201405-06
reference_id GLSA-201405-06
reference_type
scores
url https://security.gentoo.org/glsa/201405-06
214
reference_url https://access.redhat.com/errata/RHSA-2009:1287
reference_id RHSA-2009:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1287
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
0
date_added null
description Detect SSH Version, and the server encryption
required_action null
due_date null
notes
{}
known_ransomware_campaign_use false
source_date_published null
exploit_type null
platform
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssh/ssh_version.rb
Severity_range_score2.6 - 2.6
Exploitability2.0
Weighted_severity2.3
Risk_score4.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6n7q-b264-b3c9