Show filters
106 Total Results
Displaying 21-30 of 106
Sort by:
Attacker Value
Unknown

CVE-2020-16135

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
Attacker Value
Unknown

CVE-2020-1730

Disclosure Date: April 13, 2020 (last updated February 21, 2025)
A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
Attacker Value
Unknown

CVE-2020-9355

Disclosure Date: February 23, 2020 (last updated November 27, 2024)
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.
Attacker Value
Unknown

CVE-2019-14889

Disclosure Date: December 10, 2019 (last updated November 08, 2023)
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
Attacker Value
Unknown

CVE-2017-2659

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
0
Attacker Value
Unknown

CVE-2019-7639

Disclosure Date: February 08, 2019 (last updated November 27, 2024)
An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.
0
Attacker Value
Unknown

CVE-2018-10933

Disclosure Date: October 17, 2018 (last updated November 27, 2024)
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
0
Attacker Value
Unknown

CVE-2018-15599

Disclosure Date: August 21, 2018 (last updated November 27, 2024)
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
0
Attacker Value
Unknown

CVE-2018-14441

Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. admin/admin/fileUploadAction_fileUpload.action allows arbitrary file upload, as demonstrated by a .jsp file with the image/jpeg content type.
0
Attacker Value
Unknown

CVE-2018-14440

Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. SQL injection exists via the admin/noticeManageAction_queryNotice.action noticeInfo parameter.
0