Show filters
321 Total Results
Displaying 31-40 of 321
Sort by:
Attacker Value
Unknown
CVE-2023-25136
Disclosure Date: February 03, 2023 (last updated February 28, 2024)
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
0
Attacker Value
Unknown
CVE-2022-27882
Disclosure Date: March 25, 2022 (last updated October 07, 2023)
slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.
0
Attacker Value
Unknown
CVE-2022-27881
Disclosure Date: March 25, 2022 (last updated October 07, 2023)
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
0
Attacker Value
Unknown
CVE-2021-36368
Disclosure Date: March 13, 2022 (last updated November 08, 2023)
An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
0
Attacker Value
Unknown
CVE-2021-41617
Disclosure Date: September 26, 2021 (last updated November 08, 2023)
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
0
Attacker Value
Unknown
CVE-2021-41581
Disclosure Date: September 24, 2021 (last updated November 28, 2024)
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
0
Attacker Value
Unknown
CVE-2016-20012
Disclosure Date: September 15, 2021 (last updated November 08, 2023)
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
0
Attacker Value
Unknown
CVE-2019-25048
Disclosure Date: July 01, 2021 (last updated November 28, 2024)
LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).
0
Attacker Value
Unknown
CVE-2019-25049
Disclosure Date: July 01, 2021 (last updated November 28, 2024)
LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx).
0
Attacker Value
Unknown
CVE-2010-4816
Disclosure Date: June 22, 2021 (last updated November 29, 2024)
It was found in FreeBSD 8.0, 6.3 and 4.9, and OpenBSD 4.6 that a null pointer dereference in ftpd/popen.c may lead to remote denial of service of the ftpd service.
0