Show filters
309 Total Results
Displaying 81-90 of 309
Sort by:
Attacker Value
Unknown

CVE-2020-36254

Disclosure Date: February 25, 2021 (last updated November 28, 2024)
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
Attacker Value
Unknown

CVE-2021-21278

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
RSSHub is an open source, easy to use, and extensible RSS feed generator. In RSSHub before version 7f1c430 (non-semantic versioning) there is a risk of code injection. Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues The fix in version 7f1c430 is to temporarily remove the problematic route and added a `no-new-func` rule to eslint.
Attacker Value
Unknown

CVE-2019-12953

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
Attacker Value
Unknown

CVE-2020-29652

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.
Attacker Value
Unknown

CVE-2020-22723

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.
Attacker Value
Unknown

CVE-2020-24359

Disclosure Date: August 20, 2020 (last updated February 22, 2025)
HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.
Attacker Value
Unknown

CVE-2020-16135

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
Attacker Value
Unknown

CVE-2020-15778

Disclosure Date: July 24, 2020 (last updated February 21, 2025)
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
Attacker Value
Unknown

CVE-2020-12062

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.
Attacker Value
Unknown

CVE-2020-10654

Disclosure Date: May 13, 2020 (last updated February 21, 2025)
Ping Identity PingID SSH before 4.0.14 contains a heap buffer overflow in PingID-enrolled servers. This condition can be potentially exploited into a Remote Code Execution vector on the authenticating endpoint.