News

Regardless of potential mitigations, Qualys urges all users to upgrade to OpenSSH 9.9p2, since this version addresses both vulnerabilities. “To ensure continued security, we strongly advise ...
The vulnerability affects the following: OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler race condition unless they are patched for CVE-2006-5051 and CVE-2008-4109.
The vulnerability, tracked as CVE-2024-6387 and dubbed “regreSSHion,” is a remote unauthenticated code execution vulnerability in OpenSSH’s server in glibc-based server systems.
How to mitigate OpenSSH regreSSHion vulnerability. Upgrading OpenSSH to a patched version is highly recommended as soon as it becomes available in the package repositories of Linux distributions.
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote ...
Hold onto your SSH keys, folks! A critical vulnerability has just rocked OpenSSH, Linux's secure remote access foundation, causing seasoned sysadmins to break out in a cold sweat. Dubbed ...
OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for two vulnerabilities. One of the flaws could allow attackers to perform a man-in-the-middle ...
A critical vulnerability (CVE-2025-20309) in Cisco's Unified CM and Unified CM SME communication management software could ...
OpenSSH carried two vulnerabilities that were enabling machine-in-the-middle (MitM) attacks and denial-of-service (DoS) attacks, experts have warned.