Search for packages
| purl | pkg:alpm/archlinux/putty@0.75-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5524-rbbb-xydc
Aliases: CVE-2021-36367 |
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user). |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-px5z-rr8a-4fea | PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons. |
CVE-2021-33500
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:27:18.274969+00:00 | Arch Linux Importer | Fixing | VCID-px5z-rr8a-4fea | https://security.archlinux.org/AVG-1978 | 38.0.0 |
| 2026-04-01T18:27:17.534135+00:00 | Arch Linux Importer | Affected by | VCID-5524-rbbb-xydc | https://security.archlinux.org/AVG-2143 | 38.0.0 |