Show filters
146 Total Results
Displaying 61-70 of 146
Sort by:
Attacker Value
Unknown
CVE-2016-7406
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
0
Attacker Value
Unknown
CVE-2016-7409
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
0
Attacker Value
Unknown
CVE-2016-7408
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
0
Attacker Value
Unknown
CVE-2016-7407
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
0
Attacker Value
Unknown
CVE-2016-4422
Disclosure Date: May 06, 2016 (last updated November 25, 2024)
The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth might allow context-dependent attackers to bypass authentication or gain privileges via a system user account.
0
Attacker Value
Unknown
CVE-2016-0787
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
0
Attacker Value
Unknown
CVE-2015-3146
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
0
Attacker Value
Unknown
CVE-2016-0739
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
0
Attacker Value
Unknown
CVE-2016-3116
Disclosure Date: March 22, 2016 (last updated November 25, 2024)
CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
0
Attacker Value
Unknown
CVE-2015-1782
Disclosure Date: March 13, 2015 (last updated October 05, 2023)
The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
0