Search for packages
purl | pkg:alpm/archlinux/putty@0.76-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-1cuj-1bzv-aaad | PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user). |
CVE-2021-36367
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:03.561862+00:00 | Arch Linux Importer | Fixing | VCID-1cuj-1bzv-aaad | https://security.archlinux.org/AVG-2143 | 36.0.0 |
2024-11-28T14:52:42.743772+00:00 | Arch Linux Importer | Fixing | VCID-1cuj-1bzv-aaad | https://security.archlinux.org/AVG-2143 | 35.0.0 |
2024-09-18T02:02:26.550041+00:00 | Arch Linux Importer | Fixing | VCID-1cuj-1bzv-aaad | https://security.archlinux.org/AVG-2143 | 34.0.1 |
2024-01-03T22:28:27.639875+00:00 | Arch Linux Importer | Fixing | VCID-1cuj-1bzv-aaad | https://security.archlinux.org/AVG-2143 | 34.0.0rc1 |