Show filters
106 Total Results
Displaying 31-40 of 106
Sort by:
Attacker Value
Unknown

CVE-2018-7749

Disclosure Date: March 12, 2018 (last updated November 08, 2023)
The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step.
0
Attacker Value
Unknown

CVE-2017-9078

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
Attacker Value
Unknown

CVE-2017-9079

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
0
Attacker Value
Unknown

CVE-2016-7406

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
0
Attacker Value
Unknown

CVE-2016-7409

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
0
Attacker Value
Unknown

CVE-2016-7408

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
0
Attacker Value
Unknown

CVE-2016-7407

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
0
Attacker Value
Unknown

CVE-2015-3146

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
0
Attacker Value
Unknown

CVE-2016-0739

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
0
Attacker Value
Unknown

CVE-2016-3116

Disclosure Date: March 22, 2016 (last updated November 25, 2024)
CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
0