|Max CVSS||7.8||Min CVSS||5.0||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack d
|17-10-2018 - 21:40||27-09-2006 - 01:07|
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
|17-10-2018 - 21:40||29-09-2006 - 00:07|