-
Multiple vulnerabilities reported in zlib, openSSH, and GNULibc can be exploited to e.g. execute arbitrary code.
Can you please update the base image ?
- CVE-2023-45853 | Zlib MiniZip Heap Overf…
-
`python3 CVE-2024-6387_Check.py 192.168.102.10`
```
⚠️ [!] Server at 192.168.102.10:22 is Failed to retrieve SSH banner: 'utf-8' codec can't decode byte 0x84 in position 21: invalid start byte
🛡️…
-
```
pete@ardbeg ~ % dig +short cerberus2.xxxx.com A
pete@ardbeg ~ % dig +short cerberus2.xxxx.com AAAA
xxxx:xxxx:xxxx:xxxx::1400:0
pete@ardbeg ~ % ./CVE-2024-6387_Check.py cerberus2.xxxx.com
…
-
I get this error:
```
└─$ python3 CVE-2024-6387_Check.py
File "/home/user/CVE-2024-6387_Check/CVE-2024-6387_Check.py", line 40
'SSH-2.0-OpenSSH_8.5',
^
SyntaxError: invalid …
-
From central IT:
Onderzoekers hebben een ernstige kwetsbaarheid in OpenSSH ontdekt, genaamd 'RegreSSHion', die meer dan veertien miljoen serverprogramma's beïnvloedt. Deze kwetsbaarheid, die een on…
-
Thanks for the job.
When I used this script with a text file, I had as a result a first pass with the "true" result and a second pass with the error "WE COULDN'T CONNECT OR RETRIEVE BANNER"
![ssh](…
-
Hello!
OpenSSH has been updated to 9.8p1 and fixes a particularly nasty vulnerability (https://www.qualys.com/regresshion-cve-2024-6387/) - would you be able to push out an updated package ASAP?
-
# Short Description of the issue
Report on the following when looping over VMs:
* VM image (e.g. are there VMs running CentOS 7 and CentOS 8?)
* SSH version. xref: https://www.cve.org/CVEReco…
-
We are building the worker node AI using this repo. After running the scan we are getting vulnerabilities in OpenSSH - openssh-8.7p1-8.amzn2023.0.11.aarch64.
Vulnerability Description:
```
$ rp…
-
See:
- https://lwn.net/Articles/980211/
- https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
> We discovered a vulnerability (a signal handler race condition) in OpenSSH's server (ss…