Show filters
146 Total Results
Displaying 71-80 of 146
Sort by:
Attacker Value
Unknown
CVE-2014-8132
Disclosure Date: December 29, 2014 (last updated October 05, 2023)
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
0
Attacker Value
Unknown
CVE-2014-6751
Disclosure Date: September 28, 2014 (last updated October 05, 2023)
The Grasshopper Beta (aka com.grasshopper.dialer) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-0017
Disclosure Date: March 14, 2014 (last updated October 05, 2023)
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
0
Attacker Value
Unknown
CVE-2013-4421
Disclosure Date: October 25, 2013 (last updated October 05, 2023)
The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
0
Attacker Value
Unknown
CVE-2013-4434
Disclosure Date: October 25, 2013 (last updated October 05, 2023)
Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.
0
Attacker Value
Unknown
CVE-2013-0176
Disclosure Date: February 05, 2013 (last updated October 05, 2023)
The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
0
Attacker Value
Unknown
CVE-2012-6066
Disclosure Date: December 04, 2012 (last updated October 05, 2023)
freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
0
Attacker Value
Unknown
CVE-2012-5975
Disclosure Date: December 04, 2012 (last updated October 05, 2023)
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
0
Attacker Value
Unknown
CVE-2012-4561
Disclosure Date: November 30, 2012 (last updated October 05, 2023)
The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4560
Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
0