Multiple Vendor SSH2 Implementation...

- AV AC AU C I A
发布: 2002-12-16
修订: 2025-04-13

Several vulnerabilities have been reported for multiple products that use the SSH2 implementation for secure communications. The vulnerabilities have been reported to affect KEXINIT (key exchange initialization) phases of SSH communications. An attacker may exploit these vulnerabilities to perform denial of service attacks against vulnerable systems and possibly to execute malicious, attacker-supplied code. Further information about these vulnerabilities are currently unknown.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息