Show filters
464 Total Results
Displaying 161-170 of 464
Sort by:
Attacker Value
Unknown

CVE-2017-15906

Disclosure Date: October 26, 2017 (last updated November 26, 2024)
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Attacker Value
Unknown

CVE-2017-3735

Disclosure Date: August 28, 2017 (last updated November 26, 2024)
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
0
Attacker Value
Unknown

CVE-2015-3277

Disclosure Date: August 09, 2017 (last updated November 26, 2024)
The mod_nss module before 1.0.11 in Fedora allows remote attackers to obtain cipher lists due to incorrect parsing of multi-keyword cipherstring.
0
Attacker Value
Unknown

CVE-2015-5244

Disclosure Date: August 07, 2017 (last updated November 26, 2024)
The NSSCipherSuite option with ciphersuites enabled in mod_nss before 1.0.12 allows remote attackers to bypass application restrictions.
0
Attacker Value
Unknown

CVE-2015-3278

Disclosure Date: July 25, 2017 (last updated November 26, 2024)
The cipherstring parsing code in nss_compat_ossl while in multi-keyword mode does not match the expected set of ciphers for a given cipher combination, which allows attackers to have unspecified impact via unknown vectors.
0
Attacker Value
Unknown

CVE-2017-1000038

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
WordPress plugin Relevanssi version 3.5.7.1 is vulnerable to stored XSS resulting in attacker being able to execute JavaScript on the affected site
0
Attacker Value
Unknown

CVE-2016-7055

Disclosure Date: May 04, 2017 (last updated November 26, 2024)
There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients…
Attacker Value
Unknown

CVE-2016-1908

Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Attacker Value
Unknown

CVE-2017-3733

Disclosure Date: February 16, 2017 (last updated November 26, 2024)
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected.
0
Attacker Value
Unknown

CVE-2016-6210

Disclosure Date: February 13, 2017 (last updated November 26, 2024)
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
0