296,733
Total vulnerabilities in the database
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
| Software | From | Fixed in |
|---|---|---|
| fedoraproject / fedora | 22 | 22.x |
| debian / debian_linux | 7.0 | 7.0.x |
| fedoraproject / fedora | 20 | 20.x |
| opensuse / opensuse | 13.1 | 13.1.x |
| opensuse / opensuse | 13.2 | 13.2.x |
| putty / putty | 0.51 | 0.51.x |
| simon_tatham / putty | 0.53 | 0.53.x |
| putty / putty | 0.55 | 0.55.x |
| putty / putty | 0.53b | 0.53b.x |
| putty / putty | 0.52 | 0.52.x |
| putty / putty | 0.54 | 0.54.x |
| putty / putty | 0.56 | 0.56.x |
| putty / putty | 0.57 | 0.57.x |
| putty / putty | 0.58 | 0.58.x |
| putty / putty | 0.59 | 0.59.x |
| putty / putty | 0.60 | 0.60.x |
| putty / putty | 0.61 | 0.61.x |
| putty / putty | 0.62 | 0.62.x |
| putty / putty | 0.63 | 0.63.x |