{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","type":"deb","namespace":"debian","name":"openssh","version":"1:8.4p1-5+deb11u3","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1:8.4p1-5+deb11u4","latest_non_vulnerable_version":"1:10.3p1-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349222?format=json","vulnerability_id":"VCID-792n-jkzj-qqhd","summary":"In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35385.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35385","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11782","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35385"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132572","reference_id":"1132572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132572"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454469","reference_id":"2454469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454469"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/02/3","reference_id":"3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:06:07Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/02/3"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2","reference_id":"?l=openssh-unix-dev&m=177513443901484&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:06:07Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2"},{"reference_url":"https://www.openssh.org/releasenotes.html#10.3p1","reference_id":"releasenotes.html#10.3p1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:06:07Z/"}],"url":"https://www.openssh.org/releasenotes.html#10.3p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12389","reference_id":"RHSA-2026:12389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13380","reference_id":"RHSA-2026:13380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13381","reference_id":"RHSA-2026:13381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13383","reference_id":"RHSA-2026:13383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13383"},{"reference_url":"https://usn.ubuntu.com/8222-1/","reference_id":"USN-8222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-35385"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-792n-jkzj-qqhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349220?format=json","vulnerability_id":"VCID-8efr-budq-6bb6","summary":"OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35414.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35414","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05159","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0524","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35414"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132576","reference_id":"1132576","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454490","reference_id":"2454490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454490"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/02/3","reference_id":"3","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:42:45Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/02/3"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2","reference_id":"?l=openssh-unix-dev&m=177513443901484&w=2","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:42:45Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2"},{"reference_url":"https://www.openssh.org/releasenotes.html#10.3p1","reference_id":"releasenotes.html#10.3p1","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:42:45Z/"}],"url":"https://www.openssh.org/releasenotes.html#10.3p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12389","reference_id":"RHSA-2026:12389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13380","reference_id":"RHSA-2026:13380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13381","reference_id":"RHSA-2026:13381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13383","reference_id":"RHSA-2026:13383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13383"},{"reference_url":"https://usn.ubuntu.com/8222-1/","reference_id":"USN-8222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-35414"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8efr-budq-6bb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349224?format=json","vulnerability_id":"VCID-a4eq-r71a-buhm","summary":"In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35386.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35386","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08006","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00508","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0051","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00678","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00663","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00664","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00656","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00661","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00703","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00704","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00705","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0067","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35386"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132573","reference_id":"1132573","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454506","reference_id":"2454506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454506"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/02/3","reference_id":"3","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:12:12Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/02/3"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2","reference_id":"?l=openssh-unix-dev&m=177513443901484&w=2","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:12:12Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2"},{"reference_url":"https://www.openssh.org/releasenotes.html#10.3p1","reference_id":"releasenotes.html#10.3p1","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:12:12Z/"}],"url":"https://www.openssh.org/releasenotes.html#10.3p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12389","reference_id":"RHSA-2026:12389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13380","reference_id":"RHSA-2026:13380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13381","reference_id":"RHSA-2026:13381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13383","reference_id":"RHSA-2026:13383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13383"},{"reference_url":"https://usn.ubuntu.com/8222-1/","reference_id":"USN-8222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-35386"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a4eq-r71a-buhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67063?format=json","vulnerability_id":"VCID-a7m6-uqbt-nqd9","summary":"openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61985.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-61985","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03756","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03759","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03732","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-61985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-06T18:33:49Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/10/06/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117530","reference_id":"1117530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117530"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401962","reference_id":"2401962","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401962"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=175974522032149&w=2","reference_id":"?l=openssh-unix-dev&m=175974522032149&w=2","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-06T18:33:49Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=175974522032149&w=2"},{"reference_url":"https://www.openssh.com/releasenotes.html#10.1p1","reference_id":"releasenotes.html#10.1p1","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-06T18:33:49Z/"}],"url":"https://www.openssh.com/releasenotes.html#10.1p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23479","reference_id":"RHSA-2025:23479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23480","reference_id":"RHSA-2025:23480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23481","reference_id":"RHSA-2025:23481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0414","reference_id":"RHSA-2026:0414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0685","reference_id":"RHSA-2026:0685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0693","reference_id":"RHSA-2026:0693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0976","reference_id":"RHSA-2026:0976","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1652","reference_id":"RHSA-2026:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1678","reference_id":"RHSA-2026:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1790","reference_id":"RHSA-2026:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1815","reference_id":"RHSA-2026:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1858","reference_id":"RHSA-2026:1858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5475","reference_id":"RHSA-2026:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5475"},{"reference_url":"https://usn.ubuntu.com/8090-1/","reference_id":"USN-8090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-1/"},{"reference_url":"https://usn.ubuntu.com/8090-2/","reference_id":"USN-8090-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062515?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933948?format=json","purl":"pkg:deb/debian/openssh@1:10.1p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.1p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2025-61985"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a7m6-uqbt-nqd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64289?format=json","vulnerability_id":"VCID-ajmg-5kgx-k7h5","summary":"openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3497.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3497","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10136","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3497"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130595","reference_id":"1130595","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130595"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447085","reference_id":"2447085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447085"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/03/12/3","reference_id":"3","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T19:04:05Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/03/12/3"},{"reference_url":"https://ubuntu.com/security/CVE-2026-3497","reference_id":"CVE-2026-3497","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T19:04:05Z/"}],"url":"https://ubuntu.com/security/CVE-2026-3497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10714","reference_id":"RHSA-2026:10714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13750","reference_id":"RHSA-2026:13750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13812","reference_id":"RHSA-2026:13812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5475","reference_id":"RHSA-2026:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6461","reference_id":"RHSA-2026:6461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6462","reference_id":"RHSA-2026:6462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6463","reference_id":"RHSA-2026:6463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7107","reference_id":"RHSA-2026:7107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9415","reference_id":"RHSA-2026:9415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9732","reference_id":"RHSA-2026:9732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9732"},{"reference_url":"https://usn.ubuntu.com/8090-1/","reference_id":"USN-8090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-1/"},{"reference_url":"https://usn.ubuntu.com/8090-2/","reference_id":"USN-8090-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067596?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062516?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062517?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3497"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ajmg-5kgx-k7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79589?format=json","vulnerability_id":"VCID-b4uc-yh56-muej","summary":"openssh: possible bypass of fido 2 devices and ssh-askpass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36368.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36368","reference_id":"","reference_type":"","scores":[{"value":"0.0031","scoring_system":"epss","scoring_elements":"0.54195","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60245","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60366","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62751","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67319","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086690","reference_id":"2086690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086690"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933930?format=json","purl":"pkg:deb/debian/openssh@1:8.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-36368"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4uc-yh56-muej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349223?format=json","vulnerability_id":"VCID-bnrq-2fsr-mfgd","summary":"OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35388.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35388","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01686","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01604","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35388"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132575","reference_id":"1132575","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132575"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454500","reference_id":"2454500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454500"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/02/3","reference_id":"3","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:46:05Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/02/3"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2","reference_id":"?l=openssh-unix-dev&m=177513443901484&w=2","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:46:05Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2"},{"reference_url":"https://www.openssh.org/releasenotes.html#10.3p1","reference_id":"releasenotes.html#10.3p1","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-02T17:46:05Z/"}],"url":"https://www.openssh.org/releasenotes.html#10.3p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12389","reference_id":"RHSA-2026:12389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13380","reference_id":"RHSA-2026:13380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13381","reference_id":"RHSA-2026:13381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13383","reference_id":"RHSA-2026:13383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13383"},{"reference_url":"https://usn.ubuntu.com/8222-1/","reference_id":"USN-8222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-35388"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bnrq-2fsr-mfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349401?format=json","vulnerability_id":"VCID-kgn5-p8kx-qucj","summary":"OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35387.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35387","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08515","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08528","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08676","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09386","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-35387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35387"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132574","reference_id":"1132574","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132574"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454494","reference_id":"2454494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454494"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/02/3","reference_id":"3","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-03T13:07:49Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/02/3"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2","reference_id":"?l=openssh-unix-dev&m=177513443901484&w=2","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-03T13:07:49Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=177513443901484&w=2"},{"reference_url":"https://www.openssh.org/releasenotes.html#10.3p1","reference_id":"releasenotes.html#10.3p1","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-03T13:07:49Z/"}],"url":"https://www.openssh.org/releasenotes.html#10.3p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12389","reference_id":"RHSA-2026:12389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13380","reference_id":"RHSA-2026:13380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13381","reference_id":"RHSA-2026:13381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13383","reference_id":"RHSA-2026:13383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13383"},{"reference_url":"https://usn.ubuntu.com/8222-1/","reference_id":"USN-8222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-35387"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kgn5-p8kx-qucj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67062?format=json","vulnerability_id":"VCID-wga4-sqwk-4bfj","summary":"openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61984.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-61984","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01211","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-61984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/10/06/1","reference_id":"1","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-08T03:55:10Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/10/06/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117529","reference_id":"1117529","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117529"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401960","reference_id":"2401960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401960"},{"reference_url":"https://marc.info/?l=openssh-unix-dev&m=175974522032149&w=2","reference_id":"?l=openssh-unix-dev&m=175974522032149&w=2","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-08T03:55:10Z/"}],"url":"https://marc.info/?l=openssh-unix-dev&m=175974522032149&w=2"},{"reference_url":"https://www.openssh.com/releasenotes.html#10.1p1","reference_id":"releasenotes.html#10.1p1","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-08T03:55:10Z/"}],"url":"https://www.openssh.com/releasenotes.html#10.1p1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23479","reference_id":"RHSA-2025:23479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23480","reference_id":"RHSA-2025:23480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23481","reference_id":"RHSA-2025:23481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0414","reference_id":"RHSA-2026:0414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0685","reference_id":"RHSA-2026:0685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0693","reference_id":"RHSA-2026:0693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0976","reference_id":"RHSA-2026:0976","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1652","reference_id":"RHSA-2026:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1678","reference_id":"RHSA-2026:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1790","reference_id":"RHSA-2026:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1815","reference_id":"RHSA-2026:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1858","reference_id":"RHSA-2026:1858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5475","reference_id":"RHSA-2026:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5475"},{"reference_url":"https://usn.ubuntu.com/8090-1/","reference_id":"USN-8090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-1/"},{"reference_url":"https://usn.ubuntu.com/8090-2/","reference_id":"USN-8090-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062515?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933948?format=json","purl":"pkg:deb/debian/openssh@1:10.1p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.1p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2025-61984"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wga4-sqwk-4bfj"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84974?format=json","vulnerability_id":"VCID-11sf-sq1n-8ybk","summary":"openssh: Denial of service via very long passwords","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6515.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6515","reference_id":"","reference_type":"","scores":[{"value":"0.81624","scoring_system":"epss","scoring_elements":"0.99185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.81624","scoring_system":"epss","scoring_elements":"0.99184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.81624","scoring_system":"epss","scoring_elements":"0.99186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.81624","scoring_system":"epss","scoring_elements":"0.99188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.82549","scoring_system":"epss","scoring_elements":"0.99238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.82549","scoring_system":"epss","scoring_elements":"0.9924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.82549","scoring_system":"epss","scoring_elements":"0.99235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.85051","scoring_system":"epss","scoring_elements":"0.99345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.85051","scoring_system":"epss","scoring_elements":"0.99347","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364935","reference_id":"1364935","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833823","reference_id":"833823","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833823"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40888.py","reference_id":"CVE-2016-6515","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40888.py"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://usn.ubuntu.com/3061-1/","reference_id":"USN-3061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3061-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933920?format=json","purl":"pkg:deb/debian/openssh@1:7.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.3p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-6515"],"risk_score":9.6,"exploitability":"2.0","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11sf-sq1n-8ybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/106146?format=json","vulnerability_id":"VCID-1bv8-wap7-ybec","summary":"SSH Secure Shell before 3.2.9 allows remote attackers to cause a denial of service via malformed BER/DER packets.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1119","reference_id":"","reference_type":"","scores":[{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72172","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-1119"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1bv8-wap7-ybec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89700?format=json","vulnerability_id":"VCID-1pq3-ktfr-vqa4","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0190.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0190","reference_id":"","reference_type":"","scores":[{"value":"0.20579","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20579","scoring_system":"epss","scoring_elements":"0.95591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20579","scoring_system":"epss","scoring_elements":"0.95592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.9584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95848","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95852","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22646","scoring_system":"epss","scoring_elements":"0.95838","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616997","reference_id":"1616997","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616997"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196413","reference_id":"196413","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196413"},{"reference_url":"http://lab.mediaservice.net/advisory/2003-01-openssh.txt","reference_id":"OSVDB-2140;CVE-2003-0190","reference_type":"exploit","scores":[],"url":"http://lab.mediaservice.net/advisory/2003-01-openssh.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/25.c","reference_id":"OSVDB-2140;CVE-2003-0190","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/25.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/26.sh","reference_id":"OSVDB-2140;CVE-2003-0190","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/26.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/3303.sh","reference_id":"OSVDB-32721;CVE-2006-5229;OSVDB-2140;CVE-2003-0190","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/3303.sh"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:222","reference_id":"RHSA-2003:222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:224","reference_id":"RHSA-2003:224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:224"},{"reference_url":"https://usn.ubuntu.com/34-1/","reference_id":"USN-34-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/34-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933886?format=json","purl":"pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0190"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pq3-ktfr-vqa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103804?format=json","vulnerability_id":"VCID-1vwp-yqcr-nkg6","summary":"Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1359","reference_id":"","reference_type":"","scores":[{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99435","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99436","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99439","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.9944","published_at":"2026-04-26T12:55:00Z"},{"value":"0.86998","scoring_system":"epss","scoring_elements":"0.99441","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1359"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm","reference_id":"CVE-2002-1359","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm"},{"reference_url":"http://www.rapid7.com/advisories/R7-0009.html","reference_id":"CVE-2002-1359","reference_type":"exploit","scores":[],"url":"http://www.rapid7.com/advisories/R7-0009.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb","reference_id":"CVE-2002-1359;OSVDB-8044","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1359"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vwp-yqcr-nkg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74423?format=json","vulnerability_id":"VCID-1x8n-5rvu-1kfu","summary":"openssh: OpenSSH pre-authentication async signal safety issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7589.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7589","reference_id":"","reference_type":"","scores":[{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95081","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17408","scoring_system":"epss","scoring_elements":"0.95083","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21961","scoring_system":"epss","scoring_elements":"0.95751","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21961","scoring_system":"epss","scoring_elements":"0.95744","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7589"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2304416","reference_id":"2304416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2304416"},{"reference_url":"https://www.cve.org/CVERecord?id=CVE-2006-5051","reference_id":"CVERecord?id=CVE-2006-5051","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T13:50:54Z/"}],"url":"https://www.cve.org/CVERecord?id=CVE-2006-5051"},{"reference_url":"https://www.cve.org/CVERecord?id=CVE-2024-6387","reference_id":"CVERecord?id=CVE-2024-6387","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T13:50:54Z/"}],"url":"https://www.cve.org/CVERecord?id=CVE-2024-6387"},{"reference_url":"https://security.freebsd.org/advisories/FreeBSD-SA-24:08.openssh.asc","reference_id":"FreeBSD-SA-24:08.openssh.asc","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T13:50:54Z/"}],"url":"https://security.freebsd.org/advisories/FreeBSD-SA-24:08.openssh.asc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2024-7589"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1x8n-5rvu-1kfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60627?format=json","vulnerability_id":"VCID-27t6-mvt2-6kcd","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which allows remote attackers to cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6210.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6210","reference_id":"","reference_type":"","scores":[{"value":"0.90046","scoring_system":"epss","scoring_elements":"0.99588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.90046","scoring_system":"epss","scoring_elements":"0.99586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.90046","scoring_system":"epss","scoring_elements":"0.99587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99737","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92487","scoring_system":"epss","scoring_elements":"0.99731","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357442","reference_id":"1357442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1357442"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831902","reference_id":"831902","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831902"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Jul/51","reference_id":"CVE-2016-6210","reference_type":"exploit","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Jul/51"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40113.txt","reference_id":"CVE-2016-6210","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40113.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40136.py","reference_id":"CVE-2016-6210","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40136.py"},{"reference_url":"https://security.gentoo.org/glsa/201612-18","reference_id":"GLSA-201612-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2563","reference_id":"RHSA-2017:2563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2563"},{"reference_url":"https://usn.ubuntu.com/3061-1/","reference_id":"USN-3061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3061-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933919?format=json","purl":"pkg:deb/debian/openssh@1:7.2p2-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.2p2-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-6210"],"risk_score":9.6,"exploitability":"2.0","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-27t6-mvt2-6kcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88042?format=json","vulnerability_id":"VCID-3jeb-49yf-xbfw","summary":"openssh: possible privilege escalation when using ChrootDirectory setting","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2904.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2904","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12062","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11812","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11786","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2904"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=522141","reference_id":"522141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=522141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1470","reference_id":"RHSA-2009:1470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1470"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2009-2904"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jeb-49yf-xbfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42226?format=json","vulnerability_id":"VCID-3mzh-y1ek-cqh9","summary":"Multiple vulnerabilities have been discovered in OpenSSH, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51385.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51385","reference_id":"","reference_type":"","scores":[{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94922","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.9488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16522","scoring_system":"epss","scoring_elements":"0.94923","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255271","reference_id":"2255271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255271"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/26/4","reference_id":"4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-08-15T14:20:00Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/26/4"},{"reference_url":"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a","reference_id":"7ef3787c84b6b524501211b11a26c742f829af1a","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-08-15T14:20:00Z/"}],"url":"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240105-0005/","reference_id":"ntap-20240105-0005","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-08-15T14:20:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240105-0005/"},{"reference_url":"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html","reference_id":"openssh-proxycommand-libssh-rce.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-08-15T14:20:00Z/"}],"url":"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0429","reference_id":"RHSA-2024:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0455","reference_id":"RHSA-2024:0455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0594","reference_id":"RHSA-2024:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0606","reference_id":"RHSA-2024:0606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1130","reference_id":"RHSA-2024:1130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1790","reference_id":"RHSA-2026:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1790"},{"reference_url":"https://usn.ubuntu.com/6560-2/","reference_id":"USN-6560-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6560-2/"},{"reference_url":"https://usn.ubuntu.com/6560-3/","reference_id":"USN-6560-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6560-3/"},{"reference_url":"https://usn.ubuntu.com/6565-1/","reference_id":"USN-6565-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6565-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933933?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933938?format=json","purl":"pkg:deb/debian/openssh@1:9.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-51385"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3mzh-y1ek-cqh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50010?format=json","vulnerability_id":"VCID-42rr-5scb-rkbt","summary":"Multiple vulnerbilities have been discovered in OpenSSH, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25136.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25136","reference_id":"","reference_type":"","scores":[{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.99502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.99494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.99498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.99499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.88329","scoring_system":"epss","scoring_elements":"0.99495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.89568","scoring_system":"epss","scoring_elements":"0.99553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89568","scoring_system":"epss","scoring_elements":"0.99555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.89568","scoring_system":"epss","scoring_elements":"0.99556","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25136"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167636","reference_id":"2167636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167636"},{"reference_url":"https://security.archlinux.org/AVG-2832","reference_id":"AVG-2832","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2832"},{"reference_url":"https://security.gentoo.org/glsa/202307-01","reference_id":"GLSA-202307-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202307-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2645","reference_id":"RHSA-2023:2645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2645"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933932?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-25136"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42rr-5scb-rkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34555?format=json","vulnerability_id":"VCID-45wb-44rx-1bhw","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0814.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0814","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49586","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49593","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49622","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49553","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0814"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445","reference_id":"657445","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=785292","reference_id":"785292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=785292"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933910?format=json","purl":"pkg:deb/debian/openssh@1:5.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2012-0814"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45wb-44rx-1bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88795?format=json","vulnerability_id":"VCID-48u8-uvvd-m7ef","summary":"OpenSSH privilege separation flaw","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2006-0738.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2006-0738.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5794.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5794","reference_id":"","reference_type":"","scores":[{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88453","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.8849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88507","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.8851","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04037","scoring_system":"epss","scoring_elements":"0.88523","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794"},{"reference_url":"http://secunia.com/advisories/22771","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22771"},{"reference_url":"http://secunia.com/advisories/22772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22772"},{"reference_url":"http://secunia.com/advisories/22773","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22773"},{"reference_url":"http://secunia.com/advisories/22778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22778"},{"reference_url":"http://secunia.com/advisories/22814","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22814"},{"reference_url":"http://secunia.com/advisories/22872","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22872"},{"reference_url":"http://secunia.com/advisories/22932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22932"},{"reference_url":"http://secunia.com/advisories/23513","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23513"},{"reference_url":"http://secunia.com/advisories/23680","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23680"},{"reference_url":"http://secunia.com/advisories/24055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24055"},{"reference_url":"http://securitytracker.com/id?1017183","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017183"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30120","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30120"},{"reference_url":"https://issues.rpath.com/browse/RPL-766","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-766"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=461854&group_id=69227","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=461854&group_id=69227"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11840","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11840"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-048.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-048.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:204","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:204"},{"reference_url":"http://www.novell.com/linux/security/advisories/2006_26_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2006_26_sr.html"},{"reference_url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.032-openssh.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.032-openssh.html"},{"reference_url":"http://www.openssh.org/txt/release-4.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.org/txt/release-4.5"},{"reference_url":"http://www.securityfocus.com/archive/1/451100/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/451100/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/20956","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/20956"},{"reference_url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"reference_url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4399","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4399"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4400","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4400"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=214641","reference_id":"214641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=214641"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5794","reference_id":"CVE-2006-5794","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0738","reference_id":"RHSA-2006:0738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0738"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933901?format=json","purl":"pkg:deb/debian/openssh@1:4.3p2-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.3p2-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-5794"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48u8-uvvd-m7ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84679?format=json","vulnerability_id":"VCID-4fj8-vfgx-pyh9","summary":"openssh: privilege escalation via Unix domain socket forwarding","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10010.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10010","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25906","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406278","reference_id":"1406278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406278"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848715","reference_id":"848715","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848715"},{"reference_url":"https://security.archlinux.org/ASA-201612-20","reference_id":"ASA-201612-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-20"},{"reference_url":"https://security.archlinux.org/AVG-110","reference_id":"AVG-110","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-110"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1010","reference_id":"CVE-2016-10010","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1010"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40962.txt","reference_id":"CVE-2016-10010","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40962.txt"},{"reference_url":"https://usn.ubuntu.com/3538-1/","reference_id":"USN-3538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933916?format=json","purl":"pkg:deb/debian/openssh@1:7.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10010"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fj8-vfgx-pyh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89515?format=json","vulnerability_id":"VCID-61qv-3p82-fuh9","summary":"openssh information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2760.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2760","reference_id":"","reference_type":"","scores":[{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53577","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.5359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53554","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=457832","reference_id":"457832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=457832"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933893?format=json","purl":"pkg:deb/debian/openssh@1:3.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2004-2760"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-61qv-3p82-fuh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89623?format=json","vulnerability_id":"VCID-679v-qrkw-qbar","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0682.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0682","reference_id":"","reference_type":"","scores":[{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55956","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55901","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0682"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617063","reference_id":"1617063","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:279","reference_id":"RHSA-2003:279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:280","reference_id":"RHSA-2003:280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:280"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933888?format=json","purl":"pkg:deb/debian/openssh@1:3.6.1p2-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.6.1p2-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0682"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-679v-qrkw-qbar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87398?format=json","vulnerability_id":"VCID-6azx-wz7x-d7cr","summary":"openssh: Unauthorized local access to host keys on platforms where ssh-rand-helper used","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4327.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4327","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20076","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19825","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4327"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=755640","reference_id":"755640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=755640"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4327"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6azx-wz7x-d7cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34550?format=json","vulnerability_id":"VCID-6n7q-b264-b3c9","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://isc.sans.org/diary.html?storyid=5366","reference_id":"","reference_type":"","scores":[],"url":"http://isc.sans.org/diary.html?storyid=5366"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=125017764422557&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=125017764422557&w=2"},{"reference_url":"http://openssh.org/txt/cbc.adv","reference_id":"","reference_type":"","scores":[],"url":"http://openssh.org/txt/cbc.adv"},{"reference_url":"http://osvdb.org/49872","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/49872"},{"reference_url":"http://osvdb.org/50035","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/50035"},{"reference_url":"http://osvdb.org/50036","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/50036"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2009-1287.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2009-1287.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5161.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5161","reference_id":"","reference_type":"","scores":[{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.86036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.8593","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85985","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.85993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.86011","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.86016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.86006","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02747","scoring_system":"epss","scoring_elements":"0.86026","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5161"},{"reference_url":"http://secunia.com/advisories/32740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32740"},{"reference_url":"http://secunia.com/advisories/32760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32760"},{"reference_url":"http://secunia.com/advisories/32833","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32833"},{"reference_url":"http://secunia.com/advisories/33121","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33121"},{"reference_url":"http://secunia.com/advisories/33308","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33308"},{"reference_url":"http://secunia.com/advisories/34857","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34857"},{"reference_url":"http://secunia.com/advisories/36558","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/36558"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10163","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10163"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1"},{"reference_url":"http://support.apple.com/kb/HT3937","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3937"},{"reference_url":"http://support.attachmate.com/techdocs/2398.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.attachmate.com/techdocs/2398.html"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm"},{"reference_url":"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt"},{"reference_url":"http://www.kb.cert.org/vuls/id/958563","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/958563"},{"reference_url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html"},{"reference_url":"http://www.securityfocus.com/archive/1/498558/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498558/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/498579/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498579/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32319","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32319"},{"reference_url":"http://www.securitytracker.com/id?1021235","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021235"},{"reference_url":"http://www.securitytracker.com/id?1021236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021236"},{"reference_url":"http://www.securitytracker.com/id?1021382","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021382"},{"reference_url":"http://www.ssh.com/company/news/article/953/","reference_id":"","reference_type":"","scores":[],"url":"http://www.ssh.com/company/news/article/953/"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3172","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3172"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3173","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3173"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3409","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3409"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1135","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1135"},{"reference_url":"http://www.vupen.com/english/advisories/2009/3184","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/3184"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=472068","reference_id":"472068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=472068"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506115","reference_id":"506115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5161","reference_id":"CVE-2008-5161","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5161"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1287","reference_id":"RHSA-2009:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1287"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933899?format=json","purl":"pkg:deb/debian/openssh@1:5.1p1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.1p1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-5161"],"risk_score":4.6,"exploitability":"2.0","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6n7q-b264-b3c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86108?format=json","vulnerability_id":"VCID-6sgs-5zm4-rqcg","summary":"openssh: ~/.k5users unexpectedly grants remote login","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0425.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0425.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9278.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9278","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57446","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57539","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9278"},{"reference_url":"https://bugzilla.mindrot.org/show_bug.cgi?id=1867","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mindrot.org/show_bug.cgi?id=1867"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/99090","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/99090"},{"reference_url":"http://thread.gmane.org/gmane.comp.encryption.kerberos.general/15855","reference_id":"","reference_type":"","scores":[],"url":"http://thread.gmane.org/gmane.comp.encryption.kerberos.general/15855"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/12/02/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/12/02/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/12/04/17","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/12/04/17"},{"reference_url":"http://www.securityfocus.com/bid/71420","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71420"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169843","reference_id":"1169843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169843"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9278","reference_id":"CVE-2014-9278","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0425","reference_id":"RHSA-2015:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9278"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgs-5zm4-rqcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89559?format=json","vulnerability_id":"VCID-6tgm-yq5b-gyev","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2069.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2069.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2069","reference_id":"","reference_type":"","scores":[{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89506","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89553","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.89569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0485","scoring_system":"epss","scoring_elements":"0.8957","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2069"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617421","reference_id":"1617421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:550","reference_id":"RHSA-2005:550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:550"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933892?format=json","purl":"pkg:deb/debian/openssh@1:3.8p1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8p1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2004-2069"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6tgm-yq5b-gyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86508?format=json","vulnerability_id":"VCID-81na-a8p9-3fc3","summary":"openssh: post-auth memory corruption when using AES-GCM cipher","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4548.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4548","reference_id":"","reference_type":"","scores":[{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53756","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53816","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53762","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1028418","reference_id":"1028418","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1028418"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729029","reference_id":"729029","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729029"},{"reference_url":"https://usn.ubuntu.com/2014-1/","reference_id":"USN-2014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2014-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933911?format=json","purl":"pkg:deb/debian/openssh@1:6.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4548"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81na-a8p9-3fc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51620?format=json","vulnerability_id":"VCID-84r3-6n5q-1kft","summary":"Several Denial of Service vulnerabilities have been identified in OpenSSH.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5052.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5052","reference_id":"","reference_type":"","scores":[{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94561","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.9456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14969","scoring_system":"epss","scoring_elements":"0.94583","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=234643","reference_id":"234643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=234643"},{"reference_url":"https://security.gentoo.org/glsa/200611-06","reference_id":"GLSA-200611-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0540","reference_id":"RHSA-2007:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0703","reference_id":"RHSA-2007:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0703"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933900?format=json","purl":"pkg:deb/debian/openssh@1:4.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-5052"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84r3-6n5q-1kft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81244?format=json","vulnerability_id":"VCID-87uy-3q5r-r3b7","summary":"openssh: scp can send duplicate responses to the server upon a utimes system call failure leading to overwrite of arbitrary files","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12062","reference_id":"","reference_type":"","scores":[{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74452","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74483","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74545","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74572","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12062"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1854145","reference_id":"1854145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1854145"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933928?format=json","purl":"pkg:deb/debian/openssh@1:8.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.3p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-12062"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87uy-3q5r-r3b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57328?format=json","vulnerability_id":"VCID-88tp-4d2a-1ydh","summary":"A vulnerability has been discovered in OpenSSH, which can lead to remote code execution with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6387.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6387","reference_id":"","reference_type":"","scores":[{"value":"0.42417","scoring_system":"epss","scoring_elements":"0.97438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.44589","scoring_system":"epss","scoring_elements":"0.97567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.44589","scoring_system":"epss","scoring_elements":"0.97564","published_at":"2026-04-09T12:55:00Z"},{"value":"0.44589","scoring_system":"epss","scoring_elements":"0.97579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.44589","scoring_system":"epss","scoring_elements":"0.97578","published_at":"2026-04-16T12:55:00Z"},{"value":"0.44589","scoring_system":"epss","scoring_elements":"0.9757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46693","scoring_system":"epss","scoring_elements":"0.97651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46693","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46693","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5451","scoring_system":"epss","scoring_elements":"0.98033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.56169","scoring_system":"epss","scoring_elements":"0.98113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.57627","scoring_system":"epss","scoring_elements":"0.98177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.57627","scoring_system":"epss","scoring_elements":"0.98171","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6387"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604","reference_id":"2294604","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604"},{"reference_url":"https://security.archlinux.org/ASA-202407-1","reference_id":"ASA-202407-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202407-1"},{"reference_url":"https://security.archlinux.org/AVG-2855","reference_id":"AVG-2855","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2855"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:5","reference_id":"cpe:/a:redhat:ceph_storage:5","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:5"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:6","reference_id":"cpe:/a:redhat:ceph_storage:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7","reference_id":"cpe:/a:redhat:ceph_storage:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8","reference_id":"cpe:/a:redhat:openshift:4.13::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9","reference_id":"cpe:/a:redhat:openshift:4.13::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8","reference_id":"cpe:/a:redhat:openshift:4.14::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9","reference_id":"cpe:/a:redhat:openshift:4.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8","reference_id":"cpe:/a:redhat:openshift:4.15::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9","reference_id":"cpe:/a:redhat:openshift:4.15::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9","reference_id":"cpe:/a:redhat:openshift:4.16::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-6387","reference_id":"CVE-2024-6387","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-6387"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/52269.c","reference_id":"CVE-2024-6387","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/52269.c"},{"reference_url":"https://security.gentoo.org/glsa/202407-09","reference_id":"GLSA-202407-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-09"},{"reference_url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt","reference_id":"regresshion.txt","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"},{"reference_url":"https://www.openssh.com/txt/release-9.8","reference_id":"release-9.8","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://www.openssh.com/txt/release-9.8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4312","reference_id":"RHSA-2024:4312","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4340","reference_id":"RHSA-2024:4340","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4389","reference_id":"RHSA-2024:4389","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4469","reference_id":"RHSA-2024:4469","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4474","reference_id":"RHSA-2024:4474","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4479","reference_id":"RHSA-2024:4479","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4484","reference_id":"RHSA-2024:4484","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4484"},{"reference_url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html","reference_id":"sshing_the_masses.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:18:34Z/"}],"url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"},{"reference_url":"https://usn.ubuntu.com/6859-1/","reference_id":"USN-6859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6859-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933940?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933941?format=json","purl":"pkg:deb/debian/openssh@1:9.7p1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.7p1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2024-6387"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88tp-4d2a-1ydh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90508?format=json","vulnerability_id":"VCID-995z-np7r-abe9","summary":"OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0166","reference_id":"","reference_type":"","scores":[{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85336","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85367","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85299","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.8532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02491","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02559","scoring_system":"epss","scoring_elements":"0.85451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02559","scoring_system":"epss","scoring_elements":"0.85471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02559","scoring_system":"epss","scoring_elements":"0.85475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02559","scoring_system":"epss","scoring_elements":"0.85439","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0166"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5622.txt","reference_id":"CVE-2008-0166","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5622.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5632.rb","reference_id":"CVE-2008-0166","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5632.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5720.py","reference_id":"OSVDB-45029;CVE-2008-3280;CVE-2008-0166","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/5720.py"},{"reference_url":"https://usn.ubuntu.com/612-1/","reference_id":"USN-612-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-1/"},{"reference_url":"https://usn.ubuntu.com/612-2/","reference_id":"USN-612-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-2/"},{"reference_url":"https://usn.ubuntu.com/612-3/","reference_id":"USN-612-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-3/"},{"reference_url":"https://usn.ubuntu.com/612-4/","reference_id":"USN-612-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-4/"},{"reference_url":"https://usn.ubuntu.com/612-7/","reference_id":"USN-612-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-7/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933903?format=json","purl":"pkg:deb/debian/openssh@4.7p1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@4.7p1-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-0166"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-995z-np7r-abe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58536?format=json","vulnerability_id":"VCID-9x46-xm8n-m3bs","summary":"Two flaws have been discovered in OpenSSH which could allow local attackers\n    to escalate their privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1483","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38652","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45546","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45577","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=439079","reference_id":"439079","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=439079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011","reference_id":"463011","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011"},{"reference_url":"https://security.gentoo.org/glsa/200804-03","reference_id":"GLSA-200804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:527","reference_id":"RHSA-2005:527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:527"},{"reference_url":"https://usn.ubuntu.com/597-1/","reference_id":"USN-597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/597-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933904?format=json","purl":"pkg:deb/debian/openssh@1:4.7p1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.7p1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1483"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x46-xm8n-m3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88607?format=json","vulnerability_id":"VCID-9ycq-9rwj-8kav","summary":"audit logging of failed logins","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3102.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3102","reference_id":"","reference_type":"","scores":[{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.8562","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85676","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02629","scoring_system":"epss","scoring_elements":"0.85741","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3102"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=243204","reference_id":"243204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=243204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0540","reference_id":"RHSA-2007:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0555","reference_id":"RHSA-2007:0555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0703","reference_id":"RHSA-2007:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0737","reference_id":"RHSA-2007:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0737"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3102"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycq-9rwj-8kav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91016?format=json","vulnerability_id":"VCID-9yt5-4t74-5qc1","summary":"OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.","references":[{"reference_url":"http://marc.info/?l=bugtraq&m=99324968918628&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=99324968918628&w=2"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1459","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6044","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60414","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60452","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1459"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1459"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6757","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6757"},{"reference_url":"http://www.kb.cert.org/vuls/id/797027","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/797027"},{"reference_url":"http://www.securityfocus.com/bid/2917","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/2917"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1459","reference_id":"CVE-2001-1459","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1459"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933881?format=json","purl":"pkg:deb/debian/openssh@1:3.0.1p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.0.1p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2001-1459"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yt5-4t74-5qc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58537?format=json","vulnerability_id":"VCID-9zr9-947g-g7dn","summary":"Two flaws have been discovered in OpenSSH which could allow local attackers\n    to escalate their privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1657","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63995","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64016","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64048","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64046","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440268","reference_id":"440268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440268"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475156","reference_id":"475156","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475156"},{"reference_url":"https://security.gentoo.org/glsa/200804-03","reference_id":"GLSA-200804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-03"},{"reference_url":"https://usn.ubuntu.com/649-1/","reference_id":"USN-649-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/649-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933905?format=json","purl":"pkg:deb/debian/openssh@1:4.7p1-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.7p1-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1657"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9zr9-947g-g7dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62403?format=json","vulnerability_id":"VCID-aaue-a343-u7f5","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6563.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6563.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6563","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22496","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2765","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2748","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252844","reference_id":"1252844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252844"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795711","reference_id":"795711","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795711"},{"reference_url":"https://security.gentoo.org/glsa/201512-04","reference_id":"GLSA-201512-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2088","reference_id":"RHSA-2015:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0741","reference_id":"RHSA-2016:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0741"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933913?format=json","purl":"pkg:deb/debian/openssh@1:6.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6563"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aaue-a343-u7f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64289?format=json","vulnerability_id":"VCID-ajmg-5kgx-k7h5","summary":"openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3497.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3497","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10136","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3497"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130595","reference_id":"1130595","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130595"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447085","reference_id":"2447085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447085"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/03/12/3","reference_id":"3","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T19:04:05Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/03/12/3"},{"reference_url":"https://ubuntu.com/security/CVE-2026-3497","reference_id":"CVE-2026-3497","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T19:04:05Z/"}],"url":"https://ubuntu.com/security/CVE-2026-3497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10714","reference_id":"RHSA-2026:10714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13750","reference_id":"RHSA-2026:13750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13812","reference_id":"RHSA-2026:13812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5475","reference_id":"RHSA-2026:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6461","reference_id":"RHSA-2026:6461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6462","reference_id":"RHSA-2026:6462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6463","reference_id":"RHSA-2026:6463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7107","reference_id":"RHSA-2026:7107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9415","reference_id":"RHSA-2026:9415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9732","reference_id":"RHSA-2026:9732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9732"},{"reference_url":"https://usn.ubuntu.com/8090-1/","reference_id":"USN-8090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-1/"},{"reference_url":"https://usn.ubuntu.com/8090-2/","reference_id":"USN-8090-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8090-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067596?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062516?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062517?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3497"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ajmg-5kgx-k7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89051?format=json","vulnerability_id":"VCID-akd1-gm5s-cfcs","summary":"openssh vulnerable to known_hosts address harvesting","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt"},{"reference_url":"http://nms.csail.mit.edu/projects/ssh/","reference_id":"","reference_type":"","scores":[],"url":"http://nms.csail.mit.edu/projects/ssh/"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2666","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22015","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22056","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22049","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21849","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2666"},{"reference_url":"http://secunia.com/advisories/19243","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19243"},{"reference_url":"http://secunia.com/advisories/25098","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25098"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10201","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10201"},{"reference_url":"http://www.eweek.com/article2/0%2C1759%2C1815795%2C00.asp","reference_id":"","reference_type":"","scores":[],"url":"http://www.eweek.com/article2/0%2C1759%2C1815795%2C00.asp"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0257.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0257.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=162681","reference_id":"162681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=162681"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2666","reference_id":"CVE-2005-2666","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0257","reference_id":"RHSA-2007:0257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0257"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933894?format=json","purl":"pkg:deb/debian/openssh@1:4.0p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.0p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2005-2666"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-akd1-gm5s-cfcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85374?format=json","vulnerability_id":"VCID-bdnh-bkx5-h3fe","summary":"openssh: out-of-bounds read in packet handling code","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175676.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1907.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1907.json"},{"reference_url":"https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0","reference_id":"","reference_type":"","scores":[],"url":"https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1907","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64812","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68459","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1907"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa109","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa109"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1907"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"http://www.openssh.com/txt/release-7.1p2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/release-7.1p2"},{"reference_url":"http://www.securityfocus.com/bid/81293","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81293"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298746","reference_id":"1298746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298746"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1907","reference_id":"CVE-2016-1907","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1907"},{"reference_url":"https://usn.ubuntu.com/2966-1/","reference_id":"USN-2966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2966-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933915?format=json","purl":"pkg:deb/debian/openssh@1:7.1p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.1p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1907"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdnh-bkx5-h3fe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89626?format=json","vulnerability_id":"VCID-bemm-xfxx-bqhb","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0695","reference_id":"","reference_type":"","scores":[{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.7714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.7715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.7724","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617071","reference_id":"1617071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:279","reference_id":"RHSA-2003:279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:280","reference_id":"RHSA-2003:280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:280"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933890?format=json","purl":"pkg:deb/debian/openssh@1:3.7.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.7.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0695"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bemm-xfxx-bqhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91022?format=json","vulnerability_id":"VCID-bj5f-rdma-kkbu","summary":"sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2002-05/0235.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2002-05/0235.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0765","reference_id":"","reference_type":"","scores":[{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69446","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.6954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.6951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.6955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69541","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.696","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0765"},{"reference_url":"http://www.iss.net/security_center/static/9215.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.iss.net/security_center/static/9215.php"},{"reference_url":"http://www.openbsd.org/errata.html#sshbsdauth","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata.html#sshbsdauth"},{"reference_url":"http://www.osvdb.org/5113","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/5113"},{"reference_url":"http://www.securityfocus.com/bid/4803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/4803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0765","reference_id":"CVE-2002-0765","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0765"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933885?format=json","purl":"pkg:deb/debian/openssh@1:3.3p1-0.0woody1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.3p1-0.0woody1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-0765"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bj5f-rdma-kkbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88456?format=json","vulnerability_id":"VCID-bytd-a69u-dkfv","summary":"openssh: SO_REUSEADDR insecure for X11 forwarding sockets on some platforms","references":[{"reference_url":"http://openssh.com/security.html","reference_id":"","reference_type":"","scores":[],"url":"http://openssh.com/security.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3259.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3259","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06879","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07009","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07113","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3259"},{"reference_url":"http://secunia.com/advisories/31179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31179"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43940","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43940"},{"reference_url":"http://www.openssh.com/txt/release-5.1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/release-5.1"},{"reference_url":"http://www.securityfocus.com/bid/30339","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30339"},{"reference_url":"http://www.securitytracker.com/id?1020537","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020537"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2148","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=456426","reference_id":"456426","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=456426"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3259","reference_id":"CVE-2008-3259","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3259"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3259"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bytd-a69u-dkfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75014?format=json","vulnerability_id":"VCID-c52m-7sh8-eke1","summary":"openssh: Logic error in ObscureKeystrokeTiming","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39894.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39894.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39894","reference_id":"","reference_type":"","scores":[{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86424","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02949","scoring_system":"epss","scoring_elements":"0.865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03028","scoring_system":"epss","scoring_elements":"0.86661","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39894"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html","reference_id":"000158.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/02/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/02/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076764","reference_id":"1076764","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076764"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295273","reference_id":"2295273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295273"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/28/3","reference_id":"3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/28/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/23/4","reference_id":"4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/23/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/03/6","reference_id":"6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/23/6","reference_id":"6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/23/6"},{"reference_url":"https://news.ycombinator.com/item?id=41508530","reference_id":"item?id=41508530","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://news.ycombinator.com/item?id=41508530"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240712-0004/","reference_id":"ntap-20240712-0004","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240712-0004/"},{"reference_url":"https://www.openssh.com/txt/release-9.8","reference_id":"release-9.8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://www.openssh.com/txt/release-9.8"},{"reference_url":"https://crzphil.github.io/posts/ssh-obfuscation-bypass/","reference_id":"ssh-obfuscation-bypass","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-03T13:15:38Z/"}],"url":"https://crzphil.github.io/posts/ssh-obfuscation-bypass/"},{"reference_url":"https://usn.ubuntu.com/6887-1/","reference_id":"USN-6887-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6887-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933939?format=json","purl":"pkg:deb/debian/openssh@1:9.8p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.8p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2024-39894"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c52m-7sh8-eke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83710?format=json","vulnerability_id":"VCID-c72q-f2cy-eqgc","summary":"openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10708.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10708","reference_id":"","reference_type":"","scores":[{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.8684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86813","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0312","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102780","reference_id":"102780","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"http://www.securityfocus.com/bid/102780"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537929","reference_id":"1537929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537929"},{"reference_url":"http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html","reference_id":"fuzzing-tcp-servers.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html"},{"reference_url":"https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737","reference_id":"?id=28652bca29046f62c7045e933e6b931de1d16737","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737"},{"reference_url":"https://support.f5.com/csp/article/K32485746?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"K32485746?utm_source=f5support&amp%3Butm_medium=RSS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://support.f5.com/csp/article/K32485746?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00031.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180423-0003/","reference_id":"ntap-20180423-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180423-0003/"},{"reference_url":"https://www.openssh.com/releasenotes.html","reference_id":"releasenotes.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://www.openssh.com/releasenotes.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf","reference_id":"ssa-676336.pdf","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf"},{"reference_url":"https://usn.ubuntu.com/3809-1/","reference_id":"USN-3809-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-28T15:50:42Z/"}],"url":"https://usn.ubuntu.com/3809-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933916?format=json","purl":"pkg:deb/debian/openssh@1:7.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10708"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c72q-f2cy-eqgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47190?format=json","vulnerability_id":"VCID-cz6k-qmqx-cybc","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of which could allow a remote attacker to gain unauthorized access.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26466.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26466","reference_id":"","reference_type":"","scores":[{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.98269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.60426","scoring_system":"epss","scoring_elements":"0.9829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.62871","scoring_system":"epss","scoring_elements":"0.98397","published_at":"2026-04-29T12:55:00Z"},{"value":"0.62871","scoring_system":"epss","scoring_elements":"0.98392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.62871","scoring_system":"epss","scoring_elements":"0.98396","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/oss-sec/2025/q1/144","reference_id":"144","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T19:51:35Z/"}],"url":"https://seclists.org/oss-sec/2025/q1/144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345043","reference_id":"2345043","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T19:51:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345043"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26466","reference_id":"CVE-2025-26466","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T19:51:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26466"},{"reference_url":"https://security.gentoo.org/glsa/202502-01","reference_id":"GLSA-202502-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202502-01"},{"reference_url":"https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt","reference_id":"openssh-mitm-dos.txt","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T19:51:35Z/"}],"url":"https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt"},{"reference_url":"https://usn.ubuntu.com/7270-1/","reference_id":"USN-7270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933944?format=json","purl":"pkg:deb/debian/openssh@1:9.9p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.9p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26466"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cz6k-qmqx-cybc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86804?format=json","vulnerability_id":"VCID-daku-ks5y-rbdj","summary":"openssh: uninitialized variable use in J-PAKE implementation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1692.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1692","reference_id":"","reference_type":"","scores":[{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93962","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12538","scoring_system":"epss","scoring_elements":"0.93964","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1692"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1059052","reference_id":"1059052","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1059052"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-1692"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-daku-ks5y-rbdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103802?format=json","vulnerability_id":"VCID-dr6k-gpbz-5qcs","summary":"Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1357","reference_id":"","reference_type":"","scores":[{"value":"0.18474","scoring_system":"epss","scoring_elements":"0.95203","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18474","scoring_system":"epss","scoring_elements":"0.95215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18474","scoring_system":"epss","scoring_elements":"0.95217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.21352","scoring_system":"epss","scoring_elements":"0.95707","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1357"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1357"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dr6k-gpbz-5qcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91821?format=json","vulnerability_id":"VCID-dw3s-w6py-muh9","summary":"The ssh-vulnkey tool on Ubuntu Linux 7.04, 7.10, and 8.04 LTS does not recognize authorized_keys lines that contain options, which makes it easier for remote attackers to exploit CVE-2008-0166 by guessing a key that was not identified by this tool.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2285","reference_id":"","reference_type":"","scores":[{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.5777","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.5785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57884","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57844","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00356","scoring_system":"epss","scoring_elements":"0.57845","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2285"},{"reference_url":"https://usn.ubuntu.com/612-5/","reference_id":"USN-612-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/612-5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933906?format=json","purl":"pkg:deb/debian/openssh@1:4.7p1-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.7p1-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-2285"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dw3s-w6py-muh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61832?format=json","vulnerability_id":"VCID-e3hw-afkw-f7bt","summary":"Multiple vulnerabilities have been found in OpenSSH, allowing\n    attackers to leak client memory to a server, including private keys.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176516.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176349.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html"},{"reference_url":"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0778.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0778","reference_id":"","reference_type":"","scores":[{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77994","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83826","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83781","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.83985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02099","scoring_system":"epss","scoring_elements":"0.83999","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0778"},{"reference_url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/"},{"reference_url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa109","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa109"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Jan/44","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Jan/44"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://support.apple.com/HT206167","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT206167"},{"reference_url":"http://www.debian.org/security/2016/dsa-3446","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3446"},{"reference_url":"http://www.openssh.com/txt/release-7.1p2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/release-7.1p2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/14/7"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/archive/1/537295/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/537295/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/80698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80698"},{"reference_url":"http://www.securitytracker.com/id/1034671","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034671"},{"reference_url":"http://www.ubuntu.com/usn/USN-2869-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2869-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298033","reference_id":"1298033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298033"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.2:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.3:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.4:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.5:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.6:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.7:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.9:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.0:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:7.1:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.353:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:virtual_customer_access_system:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0778","reference_id":"CVE-2016-0778","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0778"},{"reference_url":"https://security.gentoo.org/glsa/201601-01","reference_id":"GLSA-201601-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201601-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0043","reference_id":"RHSA-2016:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0043"},{"reference_url":"https://usn.ubuntu.com/2869-1/","reference_id":"USN-2869-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2869-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933915?format=json","purl":"pkg:deb/debian/openssh@1:7.1p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.1p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0778"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e3hw-afkw-f7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74977?format=json","vulnerability_id":"VCID-fafq-mggp-cbem","summary":"openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6409.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6409","reference_id":"","reference_type":"","scores":[{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.9893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.76397","scoring_system":"epss","scoring_elements":"0.98935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.76726","scoring_system":"epss","scoring_elements":"0.98959","published_at":"2026-04-29T12:55:00Z"},{"value":"0.76726","scoring_system":"epss","scoring_elements":"0.98957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.76726","scoring_system":"epss","scoring_elements":"0.98958","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6409"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295085","reference_id":"2295085","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295085"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8","reference_id":"cpe:/a:redhat:openshift:4.13::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9","reference_id":"cpe:/a:redhat:openshift:4.13::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8","reference_id":"cpe:/a:redhat:openshift:4.14::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9","reference_id":"cpe:/a:redhat:openshift:4.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8","reference_id":"cpe:/a:redhat:openshift:4.15::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9","reference_id":"cpe:/a:redhat:openshift:4.15::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9","reference_id":"cpe:/a:redhat:openshift:4.16::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-6409","reference_id":"CVE-2024-6409","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-6409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4457","reference_id":"RHSA-2024:4457","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4716","reference_id":"RHSA-2024:4716","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4910","reference_id":"RHSA-2024:4910","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4955","reference_id":"RHSA-2024:4955","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5444","reference_id":"RHSA-2024:5444","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:22:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:5444"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2024-6409"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fafq-mggp-cbem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80019?format=json","vulnerability_id":"VCID-fczw-59xy-83c6","summary":"openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-41617","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50808","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50859","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-41617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2008291","reference_id":"2008291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2008291"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995130","reference_id":"995130","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995130"},{"reference_url":"https://security.archlinux.org/AVG-2422","reference_id":"AVG-2422","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4782","reference_id":"RHSA-2021:4782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2013","reference_id":"RHSA-2022:2013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2013"},{"reference_url":"https://usn.ubuntu.com/5666-1/","reference_id":"USN-5666-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5666-1/"},{"reference_url":"https://usn.ubuntu.com/6565-1/","reference_id":"USN-6565-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6565-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933931?format=json","purl":"pkg:deb/debian/openssh@1:8.7p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.7p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-41617"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fczw-59xy-83c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90535?format=json","vulnerability_id":"VCID-g1vx-bcxw-mqfg","summary":"A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4109.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4109.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4109","reference_id":"","reference_type":"","scores":[{"value":"0.01058","scoring_system":"epss","scoring_elements":"0.77704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78325","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78303","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.78332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01128","scoring_system":"epss","scoring_elements":"0.7833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.8069","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4109"},{"reference_url":"http://secunia.com/advisories/31885","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://secunia.com/advisories/31885"},{"reference_url":"http://secunia.com/advisories/32080","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://secunia.com/advisories/32080"},{"reference_url":"http://secunia.com/advisories/32181","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://secunia.com/advisories/32181"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45202","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45202"},{"reference_url":"http://www.debian.org/security/2008/dsa-1638","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://www.debian.org/security/2008/dsa-1638"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/01/3","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/3"},{"reference_url":"http://www.securitytracker.com/id?1020891","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://www.securitytracker.com/id?1020891"},{"reference_url":"http://www.ubuntu.com/usn/usn-649-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T17:46:27Z/"}],"url":"http://www.ubuntu.com/usn/usn-649-1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:linux:unknown:unknown:etch:*:*:*:*:*","reference_id":"cpe:2.3:a:debian:linux:unknown:unknown:etch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:linux:unknown:unknown:etch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:linux:unknown:unknown:sid:*:*:*:*:*","reference_id":"cpe:2.3:a:debian:linux:unknown:unknown:sid:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:linux:unknown:unknown:sid:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4109","reference_id":"CVE-2008-4109","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4109"},{"reference_url":"https://usn.ubuntu.com/649-1/","reference_id":"USN-649-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/649-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933900?format=json","purl":"pkg:deb/debian/openssh@1:4.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-4109"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1vx-bcxw-mqfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/101609?format=json","vulnerability_id":"VCID-g514-1b64-kudx","summary":"SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html"},{"reference_url":"http://online.securityfocus.com/bid/2356","reference_id":"","reference_type":"","scores":[],"url":"http://online.securityfocus.com/bid/2356"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1585","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55248","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57456","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57455","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57443","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1585"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6084","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6084"},{"reference_url":"http://www.openbsd.org/advisories/ssh_bypass.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/advisories/ssh_bypass.txt"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1585","reference_id":"CVE-2001-1585","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1585"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2001-1585"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g514-1b64-kudx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60624?format=json","vulnerability_id":"VCID-g5qe-8p8p-3kd6","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which allows remote attackers to cause Denial of Service.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2588.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2588.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0641.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0641.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8325.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8325.json"},{"reference_url":"https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755","reference_id":"","reference_type":"","scores":[],"url":"https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8325","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29428","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29326","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29386","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8325"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html","reference_id":"","reference_type":"","scores":[],"url":"https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180628-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180628-0001/"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2015-8325","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2015-8325"},{"reference_url":"http://www.debian.org/security/2016/dsa-3550","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3550"},{"reference_url":"http://www.securityfocus.com/bid/86187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/86187"},{"reference_url":"http://www.securitytracker.com/id/1036487","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036487"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328012","reference_id":"1328012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328012"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8325","reference_id":"CVE-2015-8325","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8325"},{"reference_url":"https://security.gentoo.org/glsa/201612-18","reference_id":"GLSA-201612-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2588","reference_id":"RHSA-2016:2588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0641","reference_id":"RHSA-2017:0641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0641"},{"reference_url":"https://usn.ubuntu.com/2966-1/","reference_id":"USN-2966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2966-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933914?format=json","purl":"pkg:deb/debian/openssh@1:7.2p2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.2p2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8325"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g5qe-8p8p-3kd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57307?format=json","vulnerability_id":"VCID-g8g3-ts9j-8uab","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could allow a remote attacker to gain unauthorized access.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6109.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6109.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6109","reference_id":"","reference_type":"","scores":[{"value":"0.07414","scoring_system":"epss","scoring_elements":"0.91703","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92928","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92953","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09738","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666119","reference_id":"1666119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666119"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793412","reference_id":"793412","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793412"},{"reference_url":"https://security.archlinux.org/ASA-201904-11","reference_id":"ASA-201904-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201904-11"},{"reference_url":"https://security.archlinux.org/AVG-951","reference_id":"AVG-951","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-951"},{"reference_url":"https://security.gentoo.org/glsa/201903-16","reference_id":"GLSA-201903-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3702","reference_id":"RHSA-2019:3702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3702"},{"reference_url":"https://usn.ubuntu.com/3885-1/","reference_id":"USN-3885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933926?format=json","purl":"pkg:deb/debian/openssh@1:7.9p1-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.9p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6109"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g8g3-ts9j-8uab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39451?format=json","vulnerability_id":"VCID-ge2m-my5w-z3eb","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could allow a remote attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28041.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28041","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46999","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47109","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47044","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47057","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47114","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1935055","reference_id":"1935055","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1935055"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984940","reference_id":"984940","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984940"},{"reference_url":"https://security.archlinux.org/ASA-202103-6","reference_id":"ASA-202103-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-6"},{"reference_url":"https://security.archlinux.org/AVG-1657","reference_id":"AVG-1657","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1657"},{"reference_url":"https://security.gentoo.org/glsa/202105-35","reference_id":"GLSA-202105-35","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-35"},{"reference_url":"https://usn.ubuntu.com/4762-1/","reference_id":"USN-4762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933929?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-28041"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge2m-my5w-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90278?format=json","vulnerability_id":"VCID-ggn2-8udw-u7an","summary":"Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.","references":[{"reference_url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"},{"reference_url":"http://marc.info/?l=bugtraq&m=102514371522793&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102514371522793&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102514631524575&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102514631524575&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102521542826833&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102521542826833&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0639.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0639","reference_id":"","reference_type":"","scores":[{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.96975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.96976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.96952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.9696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.96964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34268","scoring_system":"epss","scoring_elements":"0.96967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97155","published_at":"2026-04-24T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97139","published_at":"2026-04-11T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.9714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.9715","published_at":"2026-04-18T12:55:00Z"},{"value":"0.36717","scoring_system":"epss","scoring_elements":"0.97154","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0639"},{"reference_url":"https://twitter.com/RooneyMcNibNug/status/1152332585349111810","reference_id":"","reference_type":"","scores":[],"url":"https://twitter.com/RooneyMcNibNug/status/1152332585349111810"},{"reference_url":"https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html","reference_id":"","reference_type":"","scores":[],"url":"https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html"},{"reference_url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195","reference_id":"","reference_type":"","scores":[],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"},{"reference_url":"http://www.cert.org/advisories/CA-2002-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.cert.org/advisories/CA-2002-18.html"},{"reference_url":"http://www.debian.org/security/2002/dsa-134","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2002/dsa-134"},{"reference_url":"http://www.iss.net/security_center/static/9169.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.iss.net/security_center/static/9169.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/369347","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/369347"},{"reference_url":"http://www.linuxsecurity.com/advisories/other_advisory-2177.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.linuxsecurity.com/advisories/other_advisory-2177.html"},{"reference_url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"},{"reference_url":"http://www.osvdb.org/6245","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/6245"},{"reference_url":"http://www.securityfocus.com/bid/5093","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/5093"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0639","reference_id":"CVE-2002-0639","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0639"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933884?format=json","purl":"pkg:deb/debian/openssh@1:3.4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-0639"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggn2-8udw-u7an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34554?format=json","vulnerability_id":"VCID-gns3-z8js-4fef","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5000.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5000","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59434","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59449","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=809938","reference_id":"809938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=809938"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0884","reference_id":"RHSA-2012:0884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0884"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933909?format=json","purl":"pkg:deb/debian/openssh@1:5.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2011-5000"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gns3-z8js-4fef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57310?format=json","vulnerability_id":"VCID-gzmm-8kvw-6qbv","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could allow a remote attacker to gain unauthorized access.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6111.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6111","reference_id":"","reference_type":"","scores":[{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98026","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.98012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54405","scoring_system":"epss","scoring_elements":"0.9802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.5497","scoring_system":"epss","scoring_elements":"0.98057","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5497","scoring_system":"epss","scoring_elements":"0.98058","published_at":"2026-04-26T12:55:00Z"},{"value":"0.5497","scoring_system":"epss","scoring_elements":"0.98061","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/04/18/1","reference_id":"1","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/04/18/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/02/1","reference_id":"1","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/02/1"},{"reference_url":"http://www.securityfocus.com/bid/106741","reference_id":"106741","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"http://www.securityfocus.com/bid/106741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666127","reference_id":"1666127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666127"},{"reference_url":"https://www.exploit-db.com/exploits/46193/","reference_id":"46193","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://www.exploit-db.com/exploits/46193/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923486","reference_id":"923486","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923486"},{"reference_url":"https://security.archlinux.org/ASA-201904-11","reference_id":"ASA-201904-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201904-11"},{"reference_url":"https://security.archlinux.org/AVG-951","reference_id":"AVG-951","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-951"},{"reference_url":"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E","reference_id":"c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E","reference_id":"c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E","reference_id":"d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://www.debian.org/security/2019/dsa-4387","reference_id":"dsa-4387","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://www.debian.org/security/2019/dsa-4387"},{"reference_url":"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E","reference_id":"e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc","reference_id":"FreeBSD-EN-19:10.scp.asc","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc"},{"reference_url":"https://security.gentoo.org/glsa/201903-16","reference_id":"GLSA-201903-16","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://security.gentoo.org/glsa/201903-16"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html","reference_id":"msg00058.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190213-0001/","reference_id":"ntap-20190213-0001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190213-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3702","reference_id":"RHSA-2019:3702","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3702"},{"reference_url":"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c","reference_id":"scp.c","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677794","reference_id":"show_bug.cgi?id=1677794","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677794"},{"reference_url":"https://usn.ubuntu.com/3885-1/","reference_id":"USN-3885-1","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://usn.ubuntu.com/3885-1/"},{"reference_url":"https://usn.ubuntu.com/3885-2/","reference_id":"USN-3885-2","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://usn.ubuntu.com/3885-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/","reference_id":"W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T14:34:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933927?format=json","purl":"pkg:deb/debian/openssh@1:7.9p1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.9p1-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2019-6111"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gzmm-8kvw-6qbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77890?format=json","vulnerability_id":"VCID-h6pg-t5c8-53br","summary":"openssh: destination constraints only apply to first PKCS#11 key","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51384.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51384","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11455","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11513","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1139","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51384"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255268","reference_id":"2255268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255268"},{"reference_url":"https://usn.ubuntu.com/6565-1/","reference_id":"USN-6565-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6565-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933933?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933938?format=json","purl":"pkg:deb/debian/openssh@1:9.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-51384"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h6pg-t5c8-53br"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47189?format=json","vulnerability_id":"VCID-ha8v-pqwf-r3a1","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of which could allow a remote attacker to gain unauthorized access.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26465.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26465.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26465","reference_id":"","reference_type":"","scores":[{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98813","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98804","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.9882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.73605","scoring_system":"epss","scoring_elements":"0.98814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73977","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.73977","scoring_system":"epss","scoring_elements":"0.98815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73977","scoring_system":"epss","scoring_elements":"0.98818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73977","scoring_system":"epss","scoring_elements":"0.98835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73977","scoring_system":"epss","scoring_elements":"0.98839","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26465"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/oss-sec/2025/q1/144","reference_id":"144","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://seclists.org/oss-sec/2025/q1/144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344780","reference_id":"2344780","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344780"},{"reference_url":"https://access.redhat.com/solutions/7109879","reference_id":"7109879","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/solutions/7109879"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9","reference_id":"cpe:/a:redhat:discovery:1.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-26465","reference_id":"CVE-2025-26465","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-26465"},{"reference_url":"https://security.gentoo.org/glsa/202502-01","reference_id":"GLSA-202502-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202502-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16823","reference_id":"RHSA-2025:16823","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3837","reference_id":"RHSA-2025:3837","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:6993","reference_id":"RHSA-2025:6993","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:6993"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8385","reference_id":"RHSA-2025:8385","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-19T15:02:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8385"},{"reference_url":"https://usn.ubuntu.com/7270-1/","reference_id":"USN-7270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7270-1/"},{"reference_url":"https://usn.ubuntu.com/7270-2/","reference_id":"USN-7270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933943?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933942?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933944?format=json","purl":"pkg:deb/debian/openssh@1:9.9p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.9p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2025-26465"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ha8v-pqwf-r3a1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60626?format=json","vulnerability_id":"VCID-hmqc-xunp-myap","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which allows remote attackers to cause Denial of Service.","references":[{"reference_url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c","reference_id":"","reference_type":"","scores":[],"url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c"},{"reference_url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h","reference_id":"","reference_type":"","scores":[],"url":"http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html"},{"reference_url":"http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0465.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0465.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0466.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0466.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3115.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3115","reference_id":"","reference_type":"","scores":[{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97536","published_at":"2026-04-11T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97547","published_at":"2026-04-16T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.43987","scoring_system":"epss","scoring_elements":"0.97531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47105","scoring_system":"epss","scoring_elements":"0.97697","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47105","scoring_system":"epss","scoring_elements":"0.97691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47105","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3115"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa121","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Mar/46","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Mar/46"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Mar/47","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Mar/47"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html"},{"reference_url":"https://www.exploit-db.com/exploits/39569/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39569/"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc"},{"reference_url":"http://www.openssh.com/txt/x11fwd.adv","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/x11fwd.adv"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/84314","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84314"},{"reference_url":"http://www.securitytracker.com/id/1035249","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1316829","reference_id":"1316829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1316829"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/tintinweb/pub/tree/e8fe09e2123f07f09e3f8e34fc4e3e58fe804fd4/pocs/cve-2016-3115","reference_id":"CVE-2016-3115","reference_type":"exploit","scores":[],"url":"https://github.com/tintinweb/pub/tree/e8fe09e2123f07f09e3f8e34fc4e3e58fe804fd4/pocs/cve-2016-3115"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39569.py","reference_id":"CVE-2016-3115","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/39569.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3115","reference_id":"CVE-2016-3115","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:N"},{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3115"},{"reference_url":"https://security.gentoo.org/glsa/201612-18","reference_id":"GLSA-201612-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0465","reference_id":"RHSA-2016:0465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0466","reference_id":"RHSA-2016:0466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0466"},{"reference_url":"https://usn.ubuntu.com/2966-1/","reference_id":"USN-2966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2966-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933918?format=json","purl":"pkg:deb/debian/openssh@1:7.2p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.2p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3115"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmqc-xunp-myap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/151876?format=json","vulnerability_id":"VCID-hmyj-ztb3-rbhz","summary":"FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed.","references":[{"reference_url":"http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8475","reference_id":"","reference_type":"","scores":[{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79438","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79455","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79514","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79515","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0127","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8475"},{"reference_url":"http://secunia.com/advisories/61440","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61440"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98491","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98491"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A24.sshd.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A24.sshd.asc"},{"reference_url":"http://www.securityfocus.com/bid/70913","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70913"},{"reference_url":"http://www.securitytracker.com/id/1031168","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031168"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8475","reference_id":"CVE-2014-8475","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8475"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8475"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmyj-ztb3-rbhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70416?format=json","vulnerability_id":"VCID-hse5-y15y-n3dw","summary":"openssh: OpenSSH SSHD Agent Forwarding and X11 Forwarding","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32728.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32728.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32728","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50778","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32728"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/013_ssh.patch.sig","reference_id":"013_ssh.patch.sig","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T18:35:34Z/"}],"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/013_ssh.patch.sig"},{"reference_url":"https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html","reference_id":"041879.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T18:35:34Z/"}],"url":"https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102603","reference_id":"1102603","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102603"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358767","reference_id":"2358767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358767"},{"reference_url":"https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b628a9d1460f367","reference_id":"fc86875e6acb36401dfc1dfb6b628a9d1460f367","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T18:35:34Z/"}],"url":"https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b628a9d1460f367"},{"reference_url":"https://www.openssh.com/txt/release-10.0","reference_id":"release-10.0","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T18:35:34Z/"}],"url":"https://www.openssh.com/txt/release-10.0"},{"reference_url":"https://www.openssh.com/txt/release-7.4","reference_id":"release-7.4","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T18:35:34Z/"}],"url":"https://www.openssh.com/txt/release-7.4"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20126","reference_id":"RHSA-2025:20126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20126"},{"reference_url":"https://usn.ubuntu.com/7457-1/","reference_id":"USN-7457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933946?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933945?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933947?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2025-32728"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hse5-y15y-n3dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89627?format=json","vulnerability_id":"VCID-hu66-jpbe-dfhn","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0693.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0693","reference_id":"","reference_type":"","scores":[{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96347","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96369","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.9637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.26823","scoring_system":"epss","scoring_elements":"0.96371","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0693"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617069","reference_id":"1617069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:279","reference_id":"RHSA-2003:279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:280","reference_id":"RHSA-2003:280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:280"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933889?format=json","purl":"pkg:deb/debian/openssh@1:3.6.1p2-6.0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.6.1p2-6.0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0693"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hu66-jpbe-dfhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34551?format=json","vulnerability_id":"VCID-jvn2-cgzv-u3fn","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4478","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.62971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.6303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63074","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.6309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63115","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63094","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63129","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4478"},{"reference_url":"http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf"},{"reference_url":"https://github.com/seb-m/jpake","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/seb-m/jpake"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12338","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12338"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=660642","reference_id":"660642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=660642"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4478","reference_id":"CVE-2010-4478","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4478"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2010-4478"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvn2-cgzv-u3fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90329?format=json","vulnerability_id":"VCID-jzk9-kyvp-5qdz","summary":"OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding (\"-D\" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt"},{"reference_url":"http://marc.info/?l=bugtraq&m=112605977304049&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112605977304049&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2797","reference_id":"","reference_type":"","scores":[{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72404","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2797"},{"reference_url":"http://secunia.com/advisories/16686","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16686"},{"reference_url":"http://secunia.com/advisories/18010","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18010"},{"reference_url":"http://secunia.com/advisories/18661","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18661"},{"reference_url":"http://secunia.com/advisories/19243","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19243"},{"reference_url":"http://securitytracker.com/id?1014845","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014845"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm"},{"reference_url":"http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html"},{"reference_url":"http://www.osvdb.org/19142","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/19142"},{"reference_url":"http://www.securityfocus.com/bid/14727","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14727"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326065","reference_id":"326065","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326065"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2797","reference_id":"CVE-2005-2797","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2797"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933895?format=json","purl":"pkg:deb/debian/openssh@1:4.2p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.2p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2005-2797"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzk9-kyvp-5qdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/20351?format=json","vulnerability_id":"VCID-jzn6-bzzf-nugp","summary":"Improper Validation of Integrity Check Value\nThe SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.","references":[{"reference_url":"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-48795.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-48795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-48795","reference_id":"","reference_type":"","scores":[{"value":"0.53559","scoring_system":"epss","scoring_elements":"0.97994","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98114","published_at":"2026-04-02T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.5673","scoring_system":"epss","scoring_elements":"0.98134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.58603","scoring_system":"epss","scoring_elements":"0.98219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.58603","scoring_system":"epss","scoring_elements":"0.98218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.61084","scoring_system":"epss","scoring_elements":"0.98316","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-48795"},{"reference_url":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack"},{"reference_url":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"},{"reference_url":"https://bugs.gentoo.org/920280","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://bugs.gentoo.org/920280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254210","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254210"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1217950","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1217950"},{"reference_url":"https://crates.io/crates/thrussh/versions","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://crates.io/crates/thrussh/versions"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/21","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/21"},{"reference_url":"https://filezilla-project.org/versions.php","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://filezilla-project.org/versions.php"},{"reference_url":"https://forum.netgate.com/topic/184941/terrapin-ssh-attack","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://forum.netgate.com/topic/184941/terrapin-ssh-attack"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/apache/mina-sshd/issues/445","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/apache/mina-sshd/issues/445"},{"reference_url":"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"},{"reference_url":"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"},{"reference_url":"https://github.com/cyd01/KiTTY/issues/520","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/cyd01/KiTTY/issues/520"},{"reference_url":"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"},{"reference_url":"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"},{"reference_url":"https://github.com/erlang/otp/releases/tag/OTP-26.2.1","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/erlang/otp/releases/tag/OTP-26.2.1"},{"reference_url":"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"},{"reference_url":"https://github.com/hierynomus/sshj/issues/916","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/hierynomus/sshj/issues/916"},{"reference_url":"https://github.com/janmojzis/tinyssh/issues/81","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/janmojzis/tinyssh/issues/81"},{"reference_url":"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"},{"reference_url":"https://github.com/libssh2/libssh2/pull/1291","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/libssh2/libssh2/pull/1291"},{"reference_url":"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"},{"reference_url":"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"},{"reference_url":"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"},{"reference_url":"https://github.com/mwiede/jsch/issues/457","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/mwiede/jsch/issues/457"},{"reference_url":"https://github.com/mwiede/jsch/pull/461","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/mwiede/jsch/pull/461"},{"reference_url":"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"},{"reference_url":"https://github.com/NixOS/nixpkgs/pull/275249","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/NixOS/nixpkgs/pull/275249"},{"reference_url":"https://github.com/openssh/openssh-portable/commits/master","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/openssh/openssh-portable/commits/master"},{"reference_url":"https://github.com/paramiko/paramiko/issues/2337","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/paramiko/paramiko/issues/2337"},{"reference_url":"https://github.com/paramiko/paramiko/issues/2337#issuecomment-1887642773","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/paramiko/paramiko/issues/2337#issuecomment-1887642773"},{"reference_url":"https://github.com/PowerShell/Win32-OpenSSH/issues/2189","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/PowerShell/Win32-OpenSSH/issues/2189"},{"reference_url":"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"},{"reference_url":"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"},{"reference_url":"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"},{"reference_url":"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"},{"reference_url":"https://github.com/proftpd/proftpd/issues/456","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/proftpd/proftpd/issues/456"},{"reference_url":"https://github.com/rapier1/hpn-ssh/releases","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/rapier1/hpn-ssh/releases"},{"reference_url":"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"},{"reference_url":"https://github.com/ronf/asyncssh/tags","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/ronf/asyncssh/tags"},{"reference_url":"https://github.com/ssh-mitm/ssh-mitm/issues/165","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/ssh-mitm/ssh-mitm/issues/165"},{"reference_url":"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"},{"reference_url":"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"},{"reference_url":"https://github.com/warp-tech/russh","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/warp-tech/russh"},{"reference_url":"https://github.com/warp-tech/russh/commit/1aa340a7df1d5be1c0f4a9e247aade76dfdd2951","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/warp-tech/russh/commit/1aa340a7df1d5be1c0f4a9e247aade76dfdd2951"},{"reference_url":"https://github.com/warp-tech/russh/releases/tag/v0.40.2","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/warp-tech/russh/releases/tag/v0.40.2"},{"reference_url":"https://gitlab.com/libssh/libssh-mirror/-/tags","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://gitlab.com/libssh/libssh-mirror/-/tags"},{"reference_url":"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"},{"reference_url":"https://go.dev/cl/550715","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/cl/550715"},{"reference_url":"https://go.dev/issue/64784","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/issue/64784"},{"reference_url":"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"},{"reference_url":"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"},{"reference_url":"https://help.panic.com/releasenotes/transmit5","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://help.panic.com/releasenotes/transmit5"},{"reference_url":"https://help.panic.com/releasenotes/transmit5/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://help.panic.com/releasenotes/transmit5/"},{"reference_url":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795"},{"reference_url":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB"},{"reference_url":"https://matt.ucc.asn.au/dropbear/CHANGES","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://matt.ucc.asn.au/dropbear/CHANGES"},{"reference_url":"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"},{"reference_url":"https://news.ycombinator.com/item?id=38684904","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://news.ycombinator.com/item?id=38684904"},{"reference_url":"https://news.ycombinator.com/item?id=38685286","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://news.ycombinator.com/item?id=38685286"},{"reference_url":"https://news.ycombinator.com/item?id=38732005","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://news.ycombinator.com/item?id=38732005"},{"reference_url":"https://nova.app/releases/#v11.8","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://nova.app/releases/#v11.8"},{"reference_url":"https://oryx-embedded.com/download/#changelog","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://oryx-embedded.com/download/#changelog"},{"reference_url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"},{"reference_url":"https://roumenpetrov.info/secsh/#news20231220","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://roumenpetrov.info/secsh/#news20231220"},{"reference_url":"https://security.gentoo.org/glsa/202312-16","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security.gentoo.org/glsa/202312-16"},{"reference_url":"https://security.gentoo.org/glsa/202312-17","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security.gentoo.org/glsa/202312-17"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240105-0004","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240105-0004"},{"reference_url":"https://security-tracker.debian.org/tracker/source-package/libssh2","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security-tracker.debian.org/tracker/source-package/libssh2"},{"reference_url":"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"},{"reference_url":"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"},{"reference_url":"https://support.apple.com/kb/HT214084","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://support.apple.com/kb/HT214084"},{"reference_url":"https://twitter.com/TrueSkrillor/status/1736774389725565005","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://twitter.com/TrueSkrillor/status/1736774389725565005"},{"reference_url":"https://winscp.net/eng/docs/history#6.2.2","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://winscp.net/eng/docs/history#6.2.2"},{"reference_url":"https://www.bitvise.com/ssh-client-version-history#933","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.bitvise.com/ssh-client-version-history#933"},{"reference_url":"https://www.bitvise.com/ssh-server-version-history","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.bitvise.com/ssh-server-version-history"},{"reference_url":"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"},{"reference_url":"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"},{"reference_url":"https://www.debian.org/security/2023/dsa-5586","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.debian.org/security/2023/dsa-5586"},{"reference_url":"https://www.debian.org/security/2023/dsa-5588","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.debian.org/security/2023/dsa-5588"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"},{"reference_url":"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"},{"reference_url":"https://www.netsarang.com/en/xshell-update-history","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.netsarang.com/en/xshell-update-history"},{"reference_url":"https://www.netsarang.com/en/xshell-update-history/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.netsarang.com/en/xshell-update-history/"},{"reference_url":"https://www.openssh.com/openbsd.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.openssh.com/openbsd.html"},{"reference_url":"https://www.openssh.com/txt/release-9.6","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.openssh.com/txt/release-9.6"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/12/18/2","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/12/18/2"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/12/20/3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/12/20/3"},{"reference_url":"https://www.paramiko.org/changelog.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.paramiko.org/changelog.html"},{"reference_url":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed"},{"reference_url":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"},{"reference_url":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795"},{"reference_url":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"},{"reference_url":"https://www.terrapin-attack.com","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.terrapin-attack.com"},{"reference_url":"https://www.theregister.com/2023/12/20/terrapin_attack_ssh","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.theregister.com/2023/12/20/terrapin_attack_ssh"},{"reference_url":"https://www.vandyke.com/products/securecrt/history.txt","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://www.vandyke.com/products/securecrt/history.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/18/3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/18/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/19/5","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/19/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/20/3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/20/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/06/3","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/06/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/17/8","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059001","reference_id":"1059001","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059001"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059002","reference_id":"1059002","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059002"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059003","reference_id":"1059003","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059003"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059004","reference_id":"1059004","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059004"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059005","reference_id":"1059005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059005"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059006","reference_id":"1059006","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059006"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059007","reference_id":"1059007","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059007"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059058","reference_id":"1059058","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059058"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059144","reference_id":"1059144","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059144"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059290","reference_id":"1059290","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059290"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059294","reference_id":"1059294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059294"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/","reference_id":"33XHJUB6ROFUOH2OQNENFROTVH6MHSHA","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/","reference_id":"3CAYYW35MUTNO65RVAELICTNZZFMT2XS","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/","reference_id":"3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/","reference_id":"6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/","reference_id":"BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/","reference_id":"C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","reference_id":"CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"},{"reference_url":"https://access.redhat.com/security/cve/cve-2023-48795","reference_id":"CVE-2023-48795","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://access.redhat.com/security/cve/cve-2023-48795"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48795","reference_id":"CVE-2023-48795","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48795"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2023-48795","reference_id":"CVE-2023-48795","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2023-48795"},{"reference_url":"https://ubuntu.com/security/CVE-2023-48795","reference_id":"CVE-2023-48795","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://ubuntu.com/security/CVE-2023-48795"},{"reference_url":"https://thorntech.com/cve-2023-48795-and-sftp-gateway","reference_id":"CVE-2023-48795-AND-SFTP-GATEWAY","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://thorntech.com/cve-2023-48795-and-sftp-gateway"},{"reference_url":"https://thorntech.com/cve-2023-48795-and-sftp-gateway/","reference_id":"CVE-2023-48795-AND-SFTP-GATEWAY","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://thorntech.com/cve-2023-48795-and-sftp-gateway/"},{"reference_url":"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit","reference_id":"CVE-2023-48795-DETECT-OPENSSH-VULNERABILIT","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit"},{"reference_url":"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability","reference_id":"CVE-2023-48795-MITIGATE-OPENSSH-VULNERABILITY","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"},{"reference_url":"https://github.com/advisories/GHSA-45x7-px36-x8w8","reference_id":"GHSA-45x7-px36-x8w8","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://github.com/advisories/GHSA-45x7-px36-x8w8"},{"reference_url":"https://github.com/warp-tech/russh/security/advisories/GHSA-45x7-px36-x8w8","reference_id":"GHSA-45x7-px36-x8w8","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/warp-tech/russh/security/advisories/GHSA-45x7-px36-x8w8"},{"reference_url":"https://security.gentoo.org/glsa/202407-11","reference_id":"GLSA-202407-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-11"},{"reference_url":"https://security.gentoo.org/glsa/202407-12","reference_id":"GLSA-202407-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-12"},{"reference_url":"https://security.gentoo.org/glsa/202509-06","reference_id":"GLSA-202509-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/","reference_id":"HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/","reference_id":"I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","reference_id":"KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/","reference_id":"L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","reference_id":"LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240105-0004/","reference_id":"ntap-20240105-0004","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-22T05:01:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240105-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7197","reference_id":"RHSA-2023:7197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7198","reference_id":"RHSA-2023:7198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7201","reference_id":"RHSA-2023:7201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0040","reference_id":"RHSA-2024:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0429","reference_id":"RHSA-2024:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0455","reference_id":"RHSA-2024:0455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0499","reference_id":"RHSA-2024:0499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0538","reference_id":"RHSA-2024:0538","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0538"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0594","reference_id":"RHSA-2024:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0606","reference_id":"RHSA-2024:0606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0625","reference_id":"RHSA-2024:0625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0628","reference_id":"RHSA-2024:0628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0766","reference_id":"RHSA-2024:0766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0789","reference_id":"RHSA-2024:0789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0843","reference_id":"RHSA-2024:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0880","reference_id":"RHSA-2024:0880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0954","reference_id":"RHSA-2024:0954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1130","reference_id":"RHSA-2024:1130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1150","reference_id":"RHSA-2024:1150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1192","reference_id":"RHSA-2024:1192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1193","reference_id":"RHSA-2024:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1196","reference_id":"RHSA-2024:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1197","reference_id":"RHSA-2024:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1210","reference_id":"RHSA-2024:1210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1557","reference_id":"RHSA-2024:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1859","reference_id":"RHSA-2024:1859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2728","reference_id":"RHSA-2024:2728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2735","reference_id":"RHSA-2024:2735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2768","reference_id":"RHSA-2024:2768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2988","reference_id":"RHSA-2024:2988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3479","reference_id":"RHSA-2024:3479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3634","reference_id":"RHSA-2024:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3635","reference_id":"RHSA-2024:3635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3636","reference_id":"RHSA-2024:3636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3918","reference_id":"RHSA-2024:3918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4010","reference_id":"RHSA-2024:4010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4151","reference_id":"RHSA-2024:4151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4329","reference_id":"RHSA-2024:4329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4479","reference_id":"RHSA-2024:4479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4484","reference_id":"RHSA-2024:4484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4597","reference_id":"RHSA-2024:4597","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4662","reference_id":"RHSA-2024:4662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4955","reference_id":"RHSA-2024:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4959","reference_id":"RHSA-2024:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5200","reference_id":"RHSA-2024:5200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5432","reference_id":"RHSA-2024:5432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5433","reference_id":"RHSA-2024:5433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5438","reference_id":"RHSA-2024:5438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8235","reference_id":"RHSA-2024:8235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4664","reference_id":"RHSA-2025:4664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4664"},{"reference_url":"https://usn.ubuntu.com/6560-1/","reference_id":"USN-6560-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6560-1/"},{"reference_url":"https://usn.ubuntu.com/6560-2/","reference_id":"USN-6560-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6560-2/"},{"reference_url":"https://usn.ubuntu.com/6561-1/","reference_id":"USN-6561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6561-1/"},{"reference_url":"https://usn.ubuntu.com/6585-1/","reference_id":"USN-6585-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6585-1/"},{"reference_url":"https://usn.ubuntu.com/6589-1/","reference_id":"USN-6589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6589-1/"},{"reference_url":"https://usn.ubuntu.com/6598-1/","reference_id":"USN-6598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6598-1/"},{"reference_url":"https://usn.ubuntu.com/6738-1/","reference_id":"USN-6738-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6738-1/"},{"reference_url":"https://usn.ubuntu.com/7051-1/","reference_id":"USN-7051-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7051-1/"},{"reference_url":"https://usn.ubuntu.com/7292-1/","reference_id":"USN-7292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7292-1/"},{"reference_url":"https://usn.ubuntu.com/7297-1/","reference_id":"USN-7297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7297-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933933?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933938?format=json","purl":"pkg:deb/debian/openssh@1:9.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-48795","GHSA-45x7-px36-x8w8"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzn6-bzzf-nugp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34553?format=json","vulnerability_id":"VCID-k8ae-fc4a-gycy","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://marc.info/?l=bugtraq&m=144050155601375&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=144050155601375&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1591.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1591.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5107.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5107.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5107","reference_id":"","reference_type":"","scores":[{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83169","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.8323","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.8324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01901","scoring_system":"epss","scoring_elements":"0.83305","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5107"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/07/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/07/3"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/58162","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58162"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700102","reference_id":"700102","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700102"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=908707","reference_id":"908707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=908707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.8p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.8p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-5107","reference_id":"CVE-2010-5107","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-5107"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1527","reference_id":"RHSA-2013:1527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1591","reference_id":"RHSA-2013:1591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1591"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933907?format=json","purl":"pkg:deb/debian/openssh@1:6.0p1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.0p1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2010-5107"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8ae-fc4a-gycy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62401?format=json","vulnerability_id":"VCID-kbba-6c9u-tygk","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5352.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5352","reference_id":"","reference_type":"","scores":[{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238231","reference_id":"1238231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238231"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790798","reference_id":"790798","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790798"},{"reference_url":"https://security.gentoo.org/glsa/201512-04","reference_id":"GLSA-201512-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0741","reference_id":"RHSA-2016:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0741"},{"reference_url":"https://usn.ubuntu.com/2710-1/","reference_id":"USN-2710-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2710-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933913?format=json","purl":"pkg:deb/debian/openssh@1:6.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5352"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbba-6c9u-tygk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90346?format=json","vulnerability_id":"VCID-kgja-5xxj-1ucg","summary":"OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0883.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0883","reference_id":"","reference_type":"","scores":[{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.8361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01974","scoring_system":"epss","scoring_elements":"0.83621","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0883"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933897?format=json","purl":"pkg:deb/debian/openssh@1:3.8.1p1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8.1p1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-0883"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kgja-5xxj-1ucg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90292?format=json","vulnerability_id":"VCID-m6qv-m21j-g3cj","summary":"The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0787.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0787.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0787","reference_id":"","reference_type":"","scores":[{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64361","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0787"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933891?format=json","purl":"pkg:deb/debian/openssh@1:3.7.1p2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.7.1p2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0787"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m6qv-m21j-g3cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57602?format=json","vulnerability_id":"VCID-mpex-kz3k-97aq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2653","reference_id":"","reference_type":"","scores":[{"value":"0.0289","scoring_system":"epss","scoring_elements":"0.86328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0289","scoring_system":"epss","scoring_elements":"0.86348","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0289","scoring_system":"epss","scoring_elements":"0.86358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0289","scoring_system":"epss","scoring_elements":"0.86355","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03883","scoring_system":"epss","scoring_elements":"0.88219","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1081338","reference_id":"1081338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1081338"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513","reference_id":"742513","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1552","reference_id":"RHSA-2014:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0425","reference_id":"RHSA-2015:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0425"},{"reference_url":"https://usn.ubuntu.com/2164-1/","reference_id":"USN-2164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2164-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933912?format=json","purl":"pkg:deb/debian/openssh@1:6.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-2653"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mpex-kz3k-97aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60625?format=json","vulnerability_id":"VCID-myec-kc76-9bc1","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which allows remote attackers to cause Denial of Service.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2016/01/15/13","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2016/01/15/13"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0465.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0465.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0741.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0741.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1908.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1908.json"},{"reference_url":"https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c","reference_id":"","reference_type":"","scores":[],"url":"https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1908","reference_id":"","reference_type":"","scores":[{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.8437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84373","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1908"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html"},{"reference_url":"http://www.openssh.com/txt/release-7.2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/release-7.2"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/84427","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84427"},{"reference_url":"http://www.securitytracker.com/id/1034705","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034705"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298741","reference_id":"1298741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298741"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1908","reference_id":"CVE-2016-1908","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1908"},{"reference_url":"https://security.gentoo.org/glsa/201612-18","reference_id":"GLSA-201612-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0465","reference_id":"RHSA-2016:0465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0741","reference_id":"RHSA-2016:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0741"},{"reference_url":"https://usn.ubuntu.com/2966-1/","reference_id":"USN-2966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2966-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933917?format=json","purl":"pkg:deb/debian/openssh@1:7.2p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.2p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1908"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myec-kc76-9bc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91140?format=json","vulnerability_id":"VCID-nrj6-k3qf-2ubp","summary":"The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0786","reference_id":"","reference_type":"","scores":[{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86829","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86883","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03141","scoring_system":"epss","scoring_elements":"0.86932","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0786"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933891?format=json","purl":"pkg:deb/debian/openssh@1:3.7.1p2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.7.1p2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0786"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrj6-k3qf-2ubp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88989?format=json","vulnerability_id":"VCID-p5ps-aad3-que9","summary":"security flaw","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2798.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2798","reference_id":"","reference_type":"","scores":[{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.86011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.8595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.8596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.8599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.85982","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02736","scoring_system":"epss","scoring_elements":"0.86001","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2798"},{"reference_url":"http://secunia.com/advisories/16686","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16686"},{"reference_url":"http://secunia.com/advisories/17077","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17077"},{"reference_url":"http://secunia.com/advisories/17245","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17245"},{"reference_url":"http://secunia.com/advisories/18010","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18010"},{"reference_url":"http://secunia.com/advisories/18406","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18406"},{"reference_url":"http://secunia.com/advisories/18507","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18507"},{"reference_url":"http://secunia.com/advisories/18661","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18661"},{"reference_url":"http://secunia.com/advisories/18717","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18717"},{"reference_url":"http://securitytracker.com/id?1014845","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014845"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24064","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24064"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:172","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:172"},{"reference_url":"http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html"},{"reference_url":"http://www.osvdb.org/19141","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/19141"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-527.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-527.html"},{"reference_url":"http://www.securityfocus.com/archive/1/421411/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/421411/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14729","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14729"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0144","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617757","reference_id":"1617757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326065","reference_id":"326065","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326065"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2798","reference_id":"CVE-2005-2798","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2798"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:527","reference_id":"RHSA-2005:527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:527"},{"reference_url":"https://usn.ubuntu.com/209-1/","reference_id":"USN-209-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/209-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933895?format=json","purl":"pkg:deb/debian/openssh@1:4.2p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.2p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2005-2798"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ps-aad3-que9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84680?format=json","vulnerability_id":"VCID-qt1x-kyuf-gker","summary":"openssh: Leak of host private key material to privilege-separated child process via realloc()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10011.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10011","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03769","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03937","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406286","reference_id":"1406286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406286"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848716","reference_id":"848716","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848716"},{"reference_url":"https://security.archlinux.org/ASA-201612-20","reference_id":"ASA-201612-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-20"},{"reference_url":"https://security.archlinux.org/AVG-110","reference_id":"AVG-110","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://usn.ubuntu.com/3538-1/","reference_id":"USN-3538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933916?format=json","purl":"pkg:deb/debian/openssh@1:7.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10011"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qt1x-kyuf-gker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34556?format=json","vulnerability_id":"VCID-qx5k-n11s-rucg","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2532.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2532","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42148","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42159","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42063","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077843","reference_id":"1077843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077843"},{"reference_url":"https://security.gentoo.org/glsa/201405-06","reference_id":"GLSA-201405-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1552","reference_id":"RHSA-2014:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1552"},{"reference_url":"https://usn.ubuntu.com/2155-1/","reference_id":"USN-2155-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2155-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933912?format=json","purl":"pkg:deb/debian/openssh@1:6.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-2532"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5k-n11s-rucg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60697?format=json","vulnerability_id":"VCID-rwzw-vrhk-sqfw","summary":"A flaw in OpenSSH and Dropbear allows local users to elevate their\n    privileges via scp.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0225.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0225","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25844","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25791","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=168167","reference_id":"168167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=168167"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349645","reference_id":"349645","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349645"},{"reference_url":"https://security.gentoo.org/glsa/200602-11","reference_id":"GLSA-200602-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200602-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0044","reference_id":"RHSA-2006:0044","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0298","reference_id":"RHSA-2006:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0698","reference_id":"RHSA-2006:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0698"},{"reference_url":"https://usn.ubuntu.com/255-1/","reference_id":"USN-255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933896?format=json","purl":"pkg:deb/debian/openssh@1:4.3p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.3p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-0225"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwzw-vrhk-sqfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61449?format=json","vulnerability_id":"VCID-sv83-ggsr-27au","summary":"A flaw in the OpenSSH daemon allows remote unauthenticated attackers to\n    cause a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4924.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4924","reference_id":"","reference_type":"","scores":[{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.9801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98023","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.9803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54323","scoring_system":"epss","scoring_elements":"0.98032","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=207957","reference_id":"207957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=207957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=389995","reference_id":"389995","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=389995"},{"reference_url":"https://security.gentoo.org/glsa/200609-17","reference_id":"GLSA-200609-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-17"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2444.sh","reference_id":"OSVDB-29152;CVE-2006-4924","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2444.sh"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0697","reference_id":"RHSA-2006:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0698","reference_id":"RHSA-2006:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0698"},{"reference_url":"https://usn.ubuntu.com/355-1/","reference_id":"USN-355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/355-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933898?format=json","purl":"pkg:deb/debian/openssh@1:4.3p2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.3p2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4924"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv83-ggsr-27au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62402?format=json","vulnerability_id":"VCID-t1sg-4bvj-qqfk","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5600","reference_id":"","reference_type":"","scores":[{"value":"0.70907","scoring_system":"epss","scoring_elements":"0.9869","published_at":"2026-04-01T12:55:00Z"},{"value":"0.70907","scoring_system":"epss","scoring_elements":"0.98691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.70907","scoring_system":"epss","scoring_elements":"0.98694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.70907","scoring_system":"epss","scoring_elements":"0.98697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.70907","scoring_system":"epss","scoring_elements":"0.98698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98806","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98813","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98816","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.9882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.73594","scoring_system":"epss","scoring_elements":"0.98821","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1245969","reference_id":"1245969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1245969"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793616","reference_id":"793616","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793616"},{"reference_url":"https://security.gentoo.org/glsa/201512-04","reference_id":"GLSA-201512-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2088","reference_id":"RHSA-2015:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0466","reference_id":"RHSA-2016:0466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0466"},{"reference_url":"https://usn.ubuntu.com/2710-1/","reference_id":"USN-2710-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2710-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933913?format=json","purl":"pkg:deb/debian/openssh@1:6.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5600"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1sg-4bvj-qqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90380?format=json","vulnerability_id":"VCID-tqd9-nyt5-13e7","summary":"packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4925.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4925","reference_id":"","reference_type":"","scores":[{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87342","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87379","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03372","scoring_system":"epss","scoring_elements":"0.87406","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4925"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933899?format=json","purl":"pkg:deb/debian/openssh@1:5.1p1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.1p1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4925"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqd9-nyt5-13e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90184?format=json","vulnerability_id":"VCID-tur1-ruxr-yqe3","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0175.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0175","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59594","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59693","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5973","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0175"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617166","reference_id":"1617166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617166"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=270770","reference_id":"270770","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=270770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:074","reference_id":"RHSA-2005:074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:106","reference_id":"RHSA-2005:106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:165","reference_id":"RHSA-2005:165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:481","reference_id":"RHSA-2005:481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:495","reference_id":"RHSA-2005:495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:562","reference_id":"RHSA-2005:562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:567","reference_id":"RHSA-2005:567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:567"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933877?format=json","purl":"pkg:deb/debian/openssh@1:3.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2004-0175"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tur1-ruxr-yqe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84681?format=json","vulnerability_id":"VCID-u21t-acnr-dub2","summary":"openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10012.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10012","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05837","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406293","reference_id":"1406293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406293"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848717","reference_id":"848717","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848717"},{"reference_url":"https://security.archlinux.org/ASA-201612-20","reference_id":"ASA-201612-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-20"},{"reference_url":"https://security.archlinux.org/AVG-110","reference_id":"AVG-110","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://usn.ubuntu.com/3538-1/","reference_id":"USN-3538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933916?format=json","purl":"pkg:deb/debian/openssh@1:7.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10012"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u21t-acnr-dub2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51619?format=json","vulnerability_id":"VCID-u4sn-d8j6-bkdx","summary":"Several Denial of Service vulnerabilities have been identified in OpenSSH.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5051.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5051","reference_id":"","reference_type":"","scores":[{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85528","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.85482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02554","scoring_system":"epss","scoring_elements":"0.8549","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02623","scoring_system":"epss","scoring_elements":"0.85721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02623","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02902","scoring_system":"epss","scoring_elements":"0.86394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02902","scoring_system":"epss","scoring_elements":"0.86368","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=208347","reference_id":"208347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=208347"},{"reference_url":"https://security.gentoo.org/glsa/200611-06","reference_id":"GLSA-200611-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0697","reference_id":"RHSA-2006:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0698","reference_id":"RHSA-2006:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0698"},{"reference_url":"https://usn.ubuntu.com/355-1/","reference_id":"USN-355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/355-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933900?format=json","purl":"pkg:deb/debian/openssh@1:4.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2006-5051"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4sn-d8j6-bkdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90309?format=json","vulnerability_id":"VCID-u7hg-g61b-q7fy","summary":"The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1653","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.5993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59969","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.5995","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59938","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1653"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2004-1653"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u7hg-g61b-q7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89699?format=json","vulnerability_id":"VCID-u8z5-76zk-hqah","summary":"openssh information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-1562.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-1562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1562","reference_id":"","reference_type":"","scores":[{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74045","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.7409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74168","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=457820","reference_id":"457820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=457820"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933886?format=json","purl":"pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8.1p1-8.sarge.4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-1562"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8z5-76zk-hqah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44840?format=json","vulnerability_id":"VCID-ubjj-qb2c-n3d4","summary":"An integer overflow in OpenSSH might allow an attacker to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16905.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16905.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16905","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5048","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50556","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5051","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16905"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16905"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767966","reference_id":"1767966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767966"},{"reference_url":"https://security.gentoo.org/glsa/201911-01","reference_id":"GLSA-201911-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201911-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933925?format=json","purl":"pkg:deb/debian/openssh@1:8.1p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.1p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2019-16905"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubjj-qb2c-n3d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84678?format=json","vulnerability_id":"VCID-v1vq-wecd-1ud9","summary":"openssh: loading of untrusted PKCS#11 modules in ssh-agent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10009.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10009","reference_id":"","reference_type":"","scores":[{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.8163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81511","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81564","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81565","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01579","scoring_system":"epss","scoring_elements":"0.81608","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406269","reference_id":"1406269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406269"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848714","reference_id":"848714","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848714"},{"reference_url":"https://security.archlinux.org/ASA-201612-20","reference_id":"ASA-201612-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-20"},{"reference_url":"https://security.archlinux.org/AVG-110","reference_id":"AVG-110","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-110"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1009","reference_id":"CVE-2016-10009","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1009"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40963.txt","reference_id":"CVE-2016-10009","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40963.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2029","reference_id":"RHSA-2017:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2029"},{"reference_url":"https://usn.ubuntu.com/3538-1/","reference_id":"USN-3538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933916?format=json","purl":"pkg:deb/debian/openssh@1:7.4p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.4p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10009"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1vq-wecd-1ud9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41455?format=json","vulnerability_id":"VCID-v27n-4vt2-rffw","summary":"A flaw has been discovered in OpenSSH which could allow a remote\n    attacker to create zero-length files.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15906.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15906","reference_id":"","reference_type":"","scores":[{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02659","scoring_system":"epss","scoring_elements":"0.85741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86993","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86985","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86991","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.8695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86965","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03174","scoring_system":"epss","scoring_elements":"0.86967","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1506630","reference_id":"1506630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1506630"},{"reference_url":"https://security.gentoo.org/glsa/201801-05","reference_id":"GLSA-201801-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0980","reference_id":"RHSA-2018:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0980"},{"reference_url":"https://usn.ubuntu.com/3538-1/","reference_id":"USN-3538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3538-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933922?format=json","purl":"pkg:deb/debian/openssh@1:7.6p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.6p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2017-15906"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v27n-4vt2-rffw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50011?format=json","vulnerability_id":"VCID-v3yv-r42f-skdr","summary":"Multiple vulnerbilities have been discovered in OpenSSH, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28531.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28531","reference_id":"","reference_type":"","scores":[{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.5833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59902","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.5993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.6066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62034","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033166","reference_id":"1033166","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179334","reference_id":"2179334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179334"},{"reference_url":"https://security.gentoo.org/glsa/202307-01","reference_id":"GLSA-202307-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202307-01"},{"reference_url":"https://usn.ubuntu.com/6560-1/","reference_id":"USN-6560-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6560-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933933?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933934?format=json","purl":"pkg:deb/debian/openssh@1:9.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.3p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-28531"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3yv-r42f-skdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60628?format=json","vulnerability_id":"VCID-vj3u-a1c3-6qe5","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which allows remote attackers to cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8858.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8858","reference_id":"","reference_type":"","scores":[{"value":"0.26866","scoring_system":"epss","scoring_elements":"0.96374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26866","scoring_system":"epss","scoring_elements":"0.96371","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26866","scoring_system":"epss","scoring_elements":"0.96372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26866","scoring_system":"epss","scoring_elements":"0.96373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96393","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27135","scoring_system":"epss","scoring_elements":"0.96355","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384860","reference_id":"1384860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384860"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841884","reference_id":"841884","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841884"},{"reference_url":"https://security.gentoo.org/glsa/201612-18","reference_id":"GLSA-201612-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933921?format=json","purl":"pkg:deb/debian/openssh@1:7.3p1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.3p1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8858"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vj3u-a1c3-6qe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47326?format=json","vulnerability_id":"VCID-vrgz-eguk-k3dy","summary":"Multiple vulnerabilities have been found in Dropbear, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20685.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20685.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20685","reference_id":"","reference_type":"","scores":[{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87336","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.8741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.8739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03377","scoring_system":"epss","scoring_elements":"0.87381","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/106531","reference_id":"106531","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"http://www.securityfocus.com/bid/106531"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665785","reference_id":"1665785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665785"},{"reference_url":"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2","reference_id":"6010c0303a422a9c5fa8860c061bf7105eb7f8b2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919101","reference_id":"919101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919101"},{"reference_url":"https://security.archlinux.org/ASA-201904-11","reference_id":"ASA-201904-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201904-11"},{"reference_url":"https://security.archlinux.org/AVG-951","reference_id":"AVG-951","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-951"},{"reference_url":"https://www.debian.org/security/2019/dsa-4387","reference_id":"dsa-4387","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://www.debian.org/security/2019/dsa-4387"},{"reference_url":"https://security.gentoo.org/glsa/201903-16","reference_id":"GLSA-201903-16","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://security.gentoo.org/glsa/201903-16"},{"reference_url":"https://security.gentoo.org/glsa/202007-53","reference_id":"GLSA-202007-53","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://security.gentoo.org/glsa/202007-53"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190215-0001/","reference_id":"ntap-20190215-0001","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190215-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3702","reference_id":"RHSA-2019:3702","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3702"},{"reference_url":"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h","reference_id":"scp.c.diff?r1=1.197&r2=1.198&f=h","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h"},{"reference_url":"https://usn.ubuntu.com/3885-1/","reference_id":"USN-3885-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:53:24Z/"}],"url":"https://usn.ubuntu.com/3885-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933924?format=json","purl":"pkg:deb/debian/openssh@1:7.9p1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.9p1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2018-20685"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrgz-eguk-k3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61831?format=json","vulnerability_id":"VCID-wkpy-uwex-93db","summary":"Multiple vulnerabilities have been found in OpenSSH, allowing\n    attackers to leak client memory to a server, including private keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0777.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0777","reference_id":"","reference_type":"","scores":[{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.9857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.9856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.67203","scoring_system":"epss","scoring_elements":"0.98566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.7041","scoring_system":"epss","scoring_elements":"0.98679","published_at":"2026-04-04T12:55:00Z"},{"value":"0.7041","scoring_system":"epss","scoring_elements":"0.98682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.7041","scoring_system":"epss","scoring_elements":"0.98684","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298032","reference_id":"1298032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1298032"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810984","reference_id":"810984","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810984"},{"reference_url":"https://security.gentoo.org/glsa/201601-01","reference_id":"GLSA-201601-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201601-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0043","reference_id":"RHSA-2016:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0043"},{"reference_url":"https://usn.ubuntu.com/2869-1/","reference_id":"USN-2869-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2869-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933915?format=json","purl":"pkg:deb/debian/openssh@1:7.1p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.1p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0777"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkpy-uwex-93db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103803?format=json","vulnerability_id":"VCID-wskn-7rs4-xyh6","summary":"Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1358","reference_id":"","reference_type":"","scores":[{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1358"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1358"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wskn-7rs4-xyh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/104160?format=json","vulnerability_id":"VCID-wvmb-brge-13cq","summary":"SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1715","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28115","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28036","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1715"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21398.txt","reference_id":"CVE-2002-1715;OSVDB-23589","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21398.txt"},{"reference_url":"https://www.securityfocus.com/bid/4547/info","reference_id":"CVE-2002-1715;OSVDB-23589","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/4547/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1715"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmb-brge-13cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89677?format=json","vulnerability_id":"VCID-wx7h-g53d-67eh","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0386.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0386","reference_id":"","reference_type":"","scores":[{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92869","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92891","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09637","scoring_system":"epss","scoring_elements":"0.92914","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617024","reference_id":"1617024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0298","reference_id":"RHSA-2006:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0698","reference_id":"RHSA-2006:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0698"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933887?format=json","purl":"pkg:deb/debian/openssh@1:3.8p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.8p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0386"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7h-g53d-67eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62405?format=json","vulnerability_id":"VCID-xewq-4k2z-vqgg","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6565.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6565","reference_id":"","reference_type":"","scores":[{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56995","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57022","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57065","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57041","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57043","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56977","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6565"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252861","reference_id":"1252861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252861"},{"reference_url":"http://seclists.org/oss-sec/2017/q1/203","reference_id":"CVE-2015-6565","reference_type":"exploit","scores":[],"url":"http://seclists.org/oss-sec/2017/q1/203"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41173.c","reference_id":"CVE-2015-6565","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41173.c"},{"reference_url":"https://security.gentoo.org/glsa/201512-04","reference_id":"GLSA-201512-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6565"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xewq-4k2z-vqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89893?format=json","vulnerability_id":"VCID-xktv-65qs-byam","summary":"security flaw","references":[{"reference_url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"},{"reference_url":"http://marc.info/?l=bugtraq&m=102514371522793&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102514371522793&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102514631524575&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102514631524575&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102521542826833&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102521542826833&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102532054613894&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102532054613894&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0640.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0640","reference_id":"","reference_type":"","scores":[{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98544","published_at":"2026-04-04T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.9855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.66963","scoring_system":"epss","scoring_elements":"0.98552","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195","reference_id":"","reference_type":"","scores":[],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"},{"reference_url":"http://www.cert.org/advisories/CA-2002-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.cert.org/advisories/CA-2002-18.html"},{"reference_url":"http://www.debian.org/security/2002/dsa-134","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2002/dsa-134"},{"reference_url":"http://www.kb.cert.org/vuls/id/369347","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/369347"},{"reference_url":"http://www.linuxsecurity.com/advisories/other_advisory-2177.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.linuxsecurity.com/advisories/other_advisory-2177.html"},{"reference_url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/01/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/3"},{"reference_url":"http://www.osvdb.org/839","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/839"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-127.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2002-127.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-131.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2002-131.html"},{"reference_url":"http://www.securityfocus.com/bid/5093","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/5093"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616784","reference_id":"1616784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616784"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0640","reference_id":"CVE-2002-0640","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0640"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21578.txt","reference_id":"CVE-2002-0640;OSVDB-839","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21578.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21579.txt","reference_id":"CVE-2002-0640;OSVDB-839","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21579.txt"},{"reference_url":"https://www.securityfocus.com/bid/5093/info","reference_id":"CVE-2002-0640;OSVDB-839","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/5093/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:127","reference_id":"RHSA-2002:127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:131","reference_id":"RHSA-2002:131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:131"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933884?format=json","purl":"pkg:deb/debian/openssh@1:3.4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-0640"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xktv-65qs-byam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90274?format=json","vulnerability_id":"VCID-yqzk-72z7-kfep","summary":"OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.","references":[{"reference_url":"http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/114.html","reference_id":"","reference_type":"","scores":[],"url":"http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/114.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-1507.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-1507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1507","reference_id":"","reference_type":"","scores":[{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77464","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.7747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.7754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01048","scoring_system":"epss","scoring_elements":"0.77592","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1507"},{"reference_url":"http://www.iss.net/security_center/static/7598.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.iss.net/security_center/static/7598.php"},{"reference_url":"http://www.openbsd.org/errata30.html#sshd","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata30.html#sshd"},{"reference_url":"http://www.securityfocus.com/bid/3560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/3560"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1507","reference_id":"CVE-2001-1507","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1507"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933882?format=json","purl":"pkg:deb/debian/openssh@1:3.0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.0.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2001-1507"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqzk-72z7-kfep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39170?format=json","vulnerability_id":"VCID-yrvb-stza-yfdp","summary":"A flaw has been discovered in OpenSSH which could allow a local attacker to\n    bypass security restrictions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4752.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4752","reference_id":"","reference_type":"","scores":[{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.8432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84347","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02181","scoring_system":"epss","scoring_elements":"0.84419","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=280361","reference_id":"280361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=280361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444738","reference_id":"444738","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444738"},{"reference_url":"https://security.gentoo.org/glsa/200711-02","reference_id":"GLSA-200711-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0855","reference_id":"RHSA-2008:0855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0855"},{"reference_url":"https://usn.ubuntu.com/566-1/","reference_id":"USN-566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933902?format=json","purl":"pkg:deb/debian/openssh@1:4.7p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:4.7p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-4752"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrvb-stza-yfdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62404?format=json","vulnerability_id":"VCID-yrzy-er8x-c3ad","summary":"Multiple vulnerabilities have been found in OpenSSH, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6564.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6564","reference_id":"","reference_type":"","scores":[{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83736","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.8379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02063","scoring_system":"epss","scoring_elements":"0.83945","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02063","scoring_system":"epss","scoring_elements":"0.83971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02063","scoring_system":"epss","scoring_elements":"0.83979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02063","scoring_system":"epss","scoring_elements":"0.83984","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252852","reference_id":"1252852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252852"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795711","reference_id":"795711","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795711"},{"reference_url":"https://security.gentoo.org/glsa/201512-04","reference_id":"GLSA-201512-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2088","reference_id":"RHSA-2015:2088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0741","reference_id":"RHSA-2016:0741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0741"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933913?format=json","purl":"pkg:deb/debian/openssh@1:6.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:6.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6564"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrzy-er8x-c3ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87517?format=json","vulnerability_id":"VCID-ytkr-ev34-buhd","summary":"OpenSSH: legacy certificate generation information leak","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0539.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0539","reference_id":"","reference_type":"","scores":[{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79482","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79601","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0539"},{"reference_url":"http://secunia.com/advisories/43181","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43181"},{"reference_url":"http://secunia.com/advisories/44269","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44269"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65163","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65163"},{"reference_url":"http://www.openssh.com/txt/legacy-cert.adv","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssh.com/txt/legacy-cert.adv"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/02/04/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/02/04/2"},{"reference_url":"http://www.securityfocus.com/bid/46155","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46155"},{"reference_url":"http://www.securitytracker.com/id?1025028","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025028"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0284","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0284"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=675254","reference_id":"675254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=675254"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0539","reference_id":"CVE-2011-0539","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0539"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933908?format=json","purl":"pkg:deb/debian/openssh@1:5.8p1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:5.8p1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2011-0539"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytkr-ev34-buhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91011?format=json","vulnerability_id":"VCID-z21r-z4zr-p3ex","summary":"Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"},{"reference_url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057","reference_id":"","reference_type":"","scores":[],"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2000-0992","reference_id":"","reference_type":"","scores":[{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.8623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0285","scoring_system":"epss","scoring_elements":"0.86262","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2000-0992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0992"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5312","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"},{"reference_url":"http://www.securityfocus.com/bid/1742","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/1742"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=270770","reference_id":"270770","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=270770"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2000-0992","reference_id":"CVE-2000-0992","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2000-0992"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20253.sh","reference_id":"CVE-2000-0992;OSVDB-1586","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20253.sh"},{"reference_url":"https://www.securityfocus.com/bid/1742/info","reference_id":"CVE-2000-0992;OSVDB-1586","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/1742/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933877?format=json","purl":"pkg:deb/debian/openssh@1:3.9p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:3.9p1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2000-0992"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z21r-z4zr-p3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50012?format=json","vulnerability_id":"VCID-zncv-645p-f3gn","summary":"Multiple vulnerbilities have been discovered in OpenSSH, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38408.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38408","reference_id":"","reference_type":"","scores":[{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.64352","scoring_system":"epss","scoring_elements":"0.98443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.66852","scoring_system":"epss","scoring_elements":"0.98543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67693","scoring_system":"epss","scoring_elements":"0.98586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.69995","scoring_system":"epss","scoring_elements":"0.98662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.69995","scoring_system":"epss","scoring_elements":"0.98659","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042460","reference_id":"1042460","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042460"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/11","reference_id":"11","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/20/2","reference_id":"2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/07/20/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224173","reference_id":"2224173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224173"},{"reference_url":"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8","reference_id":"7bc29a9d5cd697290aa056e94ecee6253d3425f8","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/9","reference_id":"9","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/","reference_id":"CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/"},{"reference_url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent","reference_id":"cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent"},{"reference_url":"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408","reference_id":"exploring-opensshs-agent-forwarding-rce-cve-2023-38408","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"},{"reference_url":"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d","reference_id":"f03a4faa55c4ce0818324701dadbf91988d7351d","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d"},{"reference_url":"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca","reference_id":"f8f5a6b003981bb824329dc987d101977beda7ca","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca"},{"reference_url":"https://security.gentoo.org/glsa/202307-01","reference_id":"GLSA-202307-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://security.gentoo.org/glsa/202307-01"},{"reference_url":"https://support.apple.com/kb/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://support.apple.com/kb/HT213940"},{"reference_url":"https://news.ycombinator.com/item?id=36790196","reference_id":"item?id=36790196","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://news.ycombinator.com/item?id=36790196"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230803-0010/","reference_id":"ntap-20230803-0010","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230803-0010/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/","reference_id":"RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/"},{"reference_url":"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt","reference_id":"rce-openssh-forwarded-ssh-agent.txt","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt"},{"reference_url":"https://www.openssh.com/txt/release-9.3p2","reference_id":"release-9.3p2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://www.openssh.com/txt/release-9.3p2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4329","reference_id":"RHSA-2023:4329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4381","reference_id":"RHSA-2023:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4382","reference_id":"RHSA-2023:4382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4383","reference_id":"RHSA-2023:4383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4384","reference_id":"RHSA-2023:4384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4412","reference_id":"RHSA-2023:4412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4413","reference_id":"RHSA-2023:4413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4419","reference_id":"RHSA-2023:4419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4428","reference_id":"RHSA-2023:4428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4889","reference_id":"RHSA-2023:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4889"},{"reference_url":"https://www.openssh.com/security.html","reference_id":"security.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:21Z/"}],"url":"https://www.openssh.com/security.html"},{"reference_url":"https://usn.ubuntu.com/6242-1/","reference_id":"USN-6242-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6242-1/"},{"reference_url":"https://usn.ubuntu.com/6242-2/","reference_id":"USN-6242-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6242-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933936?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933935?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933937?format=json","purl":"pkg:deb/debian/openssh@1:9.3p2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.3p2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2023-38408"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zncv-645p-f3gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/103805?format=json","vulnerability_id":"VCID-zw1g-y15j-fuhf","summary":"Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1360","reference_id":"","reference_type":"","scores":[{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1360"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933883?format=json","purl":"pkg:deb/debian/openssh@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2002-1360"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw1g-y15j-fuhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34932?format=json","vulnerability_id":"VCID-zxw6-2um9-23e7","summary":"A vulnerability in OpenSSH might allow remote attackers to\n    determine valid usernames.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15473.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15473","reference_id":"","reference_type":"","scores":[{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99605","published_at":"2026-04-24T12:55:00Z"},{"value":"0.90356","scoring_system":"epss","scoring_elements":"0.99604","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1041487","reference_id":"1041487","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"http://www.securitytracker.com/id/1041487"},{"reference_url":"http://www.securityfocus.com/bid/105140","reference_id":"105140","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"http://www.securityfocus.com/bid/105140"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619063","reference_id":"1619063","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619063"},{"reference_url":"https://www.exploit-db.com/exploits/45210/","reference_id":"45210","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://www.exploit-db.com/exploits/45210/"},{"reference_url":"https://www.exploit-db.com/exploits/45233/","reference_id":"45233","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://www.exploit-db.com/exploits/45233/"},{"reference_url":"https://www.exploit-db.com/exploits/45939/","reference_id":"45939","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://www.exploit-db.com/exploits/45939/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/08/15/5","reference_id":"5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2018/08/15/5"},{"reference_url":"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0","reference_id":"779974d35b4859c07bc3cb8a12c74b43b0a7d1e0","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0"},{"reference_url":"https://bugs.debian.org/906236","reference_id":"906236","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://bugs.debian.org/906236"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906236","reference_id":"906236","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906236"},{"reference_url":"https://security.archlinux.org/AVG-763","reference_id":"AVG-763","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-763"},{"reference_url":"https://bugfuzz.com/stuff/ssh-check-username.py","reference_id":"CVE-2018-15473","reference_type":"exploit","scores":[],"url":"https://bugfuzz.com/stuff/ssh-check-username.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45210.py","reference_id":"CVE-2018-15473","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45210.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45233.py","reference_id":"CVE-2018-15473","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45233.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45939.py","reference_id":"CVE-2018-15473","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45939.py"},{"reference_url":"https://www.debian.org/security/2018/dsa-4280","reference_id":"dsa-4280","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://www.debian.org/security/2018/dsa-4280"},{"reference_url":"https://security.gentoo.org/glsa/201810-03","reference_id":"GLSA-201810-03","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://security.gentoo.org/glsa/201810-03"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20181101-0001/","reference_id":"ntap-20181101-0001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20181101-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0711","reference_id":"RHSA-2019:0711","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2143","reference_id":"RHSA-2019:2143","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2143"},{"reference_url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011","reference_id":"SNWLID-2018-0011","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011"},{"reference_url":"https://usn.ubuntu.com/3809-1/","reference_id":"USN-3809-1","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:22:43Z/"}],"url":"https://usn.ubuntu.com/3809-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933923?format=json","purl":"pkg:deb/debian/openssh@1:7.7p1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:7.7p1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933878?format=json","purl":"pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-b4uc-yh56-muej"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933876?format=json","purl":"pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-a7m6-uqbt-nqd9"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"},{"vulnerability":"VCID-wga4-sqwk-4bfj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933880?format=json","purl":"pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-ajmg-5kgx-k7h5"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933879?format=json","purl":"pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-792n-jkzj-qqhd"},{"vulnerability":"VCID-8efr-budq-6bb6"},{"vulnerability":"VCID-a4eq-r71a-buhm"},{"vulnerability":"VCID-bnrq-2fsr-mfgd"},{"vulnerability":"VCID-kgn5-p8kx-qucj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062514?format=json","purl":"pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie"}],"aliases":["CVE-2018-15473"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxw6-2um9-23e7"}],"risk_score":"3.7","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie"}