Show filters
146 Total Results
Displaying 61-70 of 146
Sort by:
Attacker Value
Unknown

CVE-2016-7406

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
0
Attacker Value
Unknown

CVE-2016-7409

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
0
Attacker Value
Unknown

CVE-2016-7408

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
0
Attacker Value
Unknown

CVE-2016-7407

Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
0
Attacker Value
Unknown

CVE-2016-4422

Disclosure Date: May 06, 2016 (last updated November 25, 2024)
The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth might allow context-dependent attackers to bypass authentication or gain privileges via a system user account.
Attacker Value
Unknown

CVE-2016-0787

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
0
Attacker Value
Unknown

CVE-2015-3146

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
0
Attacker Value
Unknown

CVE-2016-0739

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
0
Attacker Value
Unknown

CVE-2016-3116

Disclosure Date: March 22, 2016 (last updated November 25, 2024)
CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
0
Attacker Value
Unknown

CVE-2015-1782

Disclosure Date: March 13, 2015 (last updated October 05, 2023)
The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
0