Show filters
146 Total Results
Displaying 51-60 of 146
Sort by:
Attacker Value
Unknown

CVE-2019-7639

Disclosure Date: February 08, 2019 (last updated November 27, 2024)
An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.
0
Attacker Value
Unknown

CVE-2018-10933

Disclosure Date: October 17, 2018 (last updated November 27, 2024)
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
0
Attacker Value
Unknown

CVE-2018-15599

Disclosure Date: August 21, 2018 (last updated November 27, 2024)
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
0
Attacker Value
Unknown

CVE-2018-14441

Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. admin/admin/fileUploadAction_fileUpload.action allows arbitrary file upload, as demonstrated by a .jsp file with the image/jpeg content type.
0
Attacker Value
Unknown

CVE-2018-14440

Disclosure Date: July 20, 2018 (last updated November 27, 2024)
An issue was discovered in cckevincyh SSH CompanyWebsite through 2018-05-03. SQL injection exists via the admin/noticeManageAction_queryNotice.action noticeInfo parameter.
0
Attacker Value
Unknown

CVE-2018-9853

Disclosure Date: July 10, 2018 (last updated November 08, 2023)
Insecure access control in freeSSHd version 1.3.1 allows attackers to obtain the privileges of the freesshd.exe process by leveraging the ability to login to an unprivileged account on the server.
0
Attacker Value
Unknown

CVE-2018-7749

Disclosure Date: March 12, 2018 (last updated November 08, 2023)
The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step.
0
Attacker Value
Unknown

CVE-2017-1000475

Disclosure Date: January 24, 2018 (last updated November 26, 2024)
FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges.
0
Attacker Value
Unknown

CVE-2017-9078

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
Attacker Value
Unknown

CVE-2017-9079

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
0