Search for vulnerabilities
Vulnerability details: VCID-md12-57e6-aaae
Vulnerability ID VCID-md12-57e6-aaae
Aliases CVE-2011-0766
Summary The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.00252 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.0251 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03371 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
epss 0.03648 https://api.first.org/data/v1/epss?cve=CVE-2011-0766
cvssv2 7.8 https://nvd.nist.gov/vuln/detail/CVE-2011-0766
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2011-0766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0766
http://secunia.com/advisories/44709
https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5
http://www.kb.cert.org/vuls/id/178990
http://www.securityfocus.com/bid/47980
628456 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628456
cpe:2.3:a:erlang:crypto:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:*:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.0:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.5.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.5.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.6:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:2.0:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:crypto:2.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:crypto:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r11b-5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r11b-5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r12b-5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r12b-5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r13b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r13b:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r13b02-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r13b02-1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r13b03:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r13b03:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r13b04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r13b04:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r14a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r14a:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r14b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r14b:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r14b01:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r14b01:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:r14b02:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:r14b02:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*
CVE-2011-0766 https://nvd.nist.gov/vuln/detail/CVE-2011-0766
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0766
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.63456
EPSS Score 0.00243
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.