A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.
SSH or Secure Shell is a protocol used for establishing secure encrypted connections over an insecure network such as the internet. Although any application can utilize the SSH protocol to secure its ...