Show filters
106 Total Results
Displaying 21-30 of 106
Sort by:
Attacker Value
Unknown
CVE-2020-16135
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
0
Attacker Value
Unknown
CVE-2020-1730
Disclosure Date: April 13, 2020 (last updated February 21, 2025)
A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
0
Attacker Value
Unknown
CVE-2020-9355
Disclosure Date: February 23, 2020 (last updated November 27, 2024)
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.
0
Attacker Value
Unknown
CVE-2019-14889
Disclosure Date: December 10, 2019 (last updated November 08, 2023)
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
0
Attacker Value
Unknown
CVE-2017-2659
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
0
Attacker Value
Unknown
CVE-2019-7639
Disclosure Date: February 08, 2019 (last updated November 27, 2024)
An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.
0
Attacker Value
Unknown
CVE-2018-10933
Disclosure Date: October 17, 2018 (last updated November 27, 2024)
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
0
Attacker Value
Unknown
CVE-2018-15599
Disclosure Date: August 21, 2018 (last updated November 27, 2024)
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
0
Attacker Value
Unknown
CVE-2018-14441
Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. admin/admin/fileUploadAction_fileUpload.action allows arbitrary file upload, as demonstrated by a .jsp file with the image/jpeg content type.
0
Attacker Value
Unknown
CVE-2018-14440
Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. SQL injection exists via the admin/noticeManageAction_queryNotice.action noticeInfo parameter.
0