Show filters
309 Total Results
Displaying 111-120 of 309
Sort by:
Attacker Value
Unknown
CVE-2019-7639
Disclosure Date: February 08, 2019 (last updated November 27, 2024)
An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.
0
Attacker Value
Unknown
CVE-2019-3463
Disclosure Date: February 06, 2019 (last updated November 08, 2023)
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
0
Attacker Value
Unknown
CVE-2019-3464
Disclosure Date: February 06, 2019 (last updated November 08, 2023)
Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
0
Attacker Value
Unknown
CVE-2019-1000018
Disclosure Date: February 04, 2019 (last updated November 08, 2023)
rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission.
0
Attacker Value
Unknown
CVE-2019-6110
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
0
Attacker Value
Unknown
CVE-2019-6109
Disclosure Date: January 31, 2019 (last updated November 08, 2023)
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
0
Attacker Value
Unknown
CVE-2018-10933
Disclosure Date: October 17, 2018 (last updated November 27, 2024)
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
0
Attacker Value
Unknown
CVE-2018-16059
Disclosure Date: September 07, 2018 (last updated November 27, 2024)
Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow Directory Traversal via the fcgi-bin/wgsetcgi filename parameter.
0
Attacker Value
Unknown
CVE-2018-15599
Disclosure Date: August 21, 2018 (last updated November 27, 2024)
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
0
Attacker Value
Unknown
CVE-2018-15473
Disclosure Date: August 17, 2018 (last updated November 27, 2024)
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
0