Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/putty@0.75-1
purl pkg:alpm/archlinux/putty@0.75-1
Next non-vulnerable version 0.76-1
Latest non-vulnerable version 0.76-1
Risk 3.6
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-5524-rbbb-xydc
Aliases:
CVE-2021-36367
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).
0.76-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-px5z-rr8a-4fea PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons. CVE-2021-33500

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T18:27:18.274969+00:00 Arch Linux Importer Fixing VCID-px5z-rr8a-4fea https://security.archlinux.org/AVG-1978 38.0.0
2026-04-01T18:27:17.534135+00:00 Arch Linux Importer Affected by VCID-5524-rbbb-xydc https://security.archlinux.org/AVG-2143 38.0.0