Show filters
240 Total Results
Displaying 51-60 of 240
Sort by:
Attacker Value
Unknown

CVE-2021-44513

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Insecure creation of temporary directories in tmate-ssh-server 2.3.0 allows a local attacker to compromise the integrity of session handling.
Attacker Value
Unknown

CVE-2021-44512

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory.
Attacker Value
Unknown

CVE-2021-41617

Disclosure Date: September 26, 2021 (last updated February 23, 2025)
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
Attacker Value
Unknown

CVE-2016-20012

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
Attacker Value
Unknown

CVE-2021-3634

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.
Attacker Value
Unknown

CVE-2021-28041

Disclosure Date: March 05, 2021 (last updated February 22, 2025)
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
Attacker Value
Unknown

CVE-2020-36254

Disclosure Date: February 25, 2021 (last updated November 28, 2024)
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
Attacker Value
Unknown

CVE-2019-12953

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
Attacker Value
Unknown

CVE-2020-29652

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.
Attacker Value
Unknown

CVE-2020-24359

Disclosure Date: August 20, 2020 (last updated February 22, 2025)
HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.