Show filters
33 Total Results
Displaying 11-20 of 33
Sort by:
Attacker Value
Unknown

CVE-2019-9897

Disclosure Date: March 21, 2019 (last updated November 08, 2023)
Multiple denial-of-service attacks that can be triggered by writing to the terminal exist in PuTTY versions before 0.71.
0
Attacker Value
Unknown

CVE-2019-9896

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
Attacker Value
Unknown

CVE-2019-9894

Disclosure Date: March 21, 2019 (last updated November 08, 2023)
A remotely triggerable memory overwrite in RSA key exchange in PuTTY before 0.71 can occur before host key verification.
0
Attacker Value
Unknown

CVE-2017-7183

Disclosure Date: March 27, 2017 (last updated November 26, 2024)
The TFTP server in ExtraPuTTY 0.30 and earlier allows remote attackers to cause a denial of service (crash) via a large (1) read or (2) write TFTP protocol message.
0
Attacker Value
Unknown

CVE-2017-6542

Disclosure Date: March 27, 2017 (last updated November 08, 2023)
The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
0
Attacker Value
Unknown

CVE-2016-6167

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
Attacker Value
Unknown

CVE-2015-2157

Disclosure Date: March 27, 2015 (last updated October 05, 2023)
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
0
Attacker Value
Unknown

CVE-2011-4607

Disclosure Date: August 23, 2013 (last updated October 05, 2023)
PuTTY 0.59 through 0.61 does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication, which might allow local users to read login passwords by obtaining access to the process' memory.
0
Attacker Value
Unknown

CVE-2013-4852

Disclosure Date: August 19, 2013 (last updated October 05, 2023)
Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2013-4206

Disclosure Date: August 19, 2013 (last updated October 05, 2023)
Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
0