Show filters
106 Total Results
Displaying 11-20 of 106
Sort by:
Attacker Value
Unknown
CVE-2021-36369
Disclosure Date: October 12, 2022 (last updated December 22, 2024)
An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.
0
Attacker Value
Unknown
CVE-2022-32073
Disclosure Date: July 13, 2022 (last updated October 07, 2023)
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.
0
Attacker Value
Unknown
CVE-2022-31124
Disclosure Date: July 06, 2022 (last updated October 07, 2023)
openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6, which no longer includes the raw field value in the error message. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2021-45099
Disclosure Date: December 16, 2021 (last updated November 08, 2023)
The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) before 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-in-depth measure against complex social engineering situations
0
Attacker Value
Unknown
CVE-2021-3634
Disclosure Date: August 31, 2021 (last updated November 08, 2023)
A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.
0
Attacker Value
Unknown
CVE-2021-27892
Disclosure Date: March 15, 2021 (last updated November 28, 2024)
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
0
Attacker Value
Unknown
CVE-2021-27893
Disclosure Date: March 15, 2021 (last updated November 28, 2024)
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
0
Attacker Value
Unknown
CVE-2021-27891
Disclosure Date: March 15, 2021 (last updated November 28, 2024)
SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
0
Attacker Value
Unknown
CVE-2020-36254
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
0
Attacker Value
Unknown
CVE-2019-12953
Disclosure Date: December 30, 2020 (last updated November 28, 2024)
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
0