Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2023-48795

Disclosure Date: December 18, 2023 (last updated February 25, 2025)
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0…
Attacker Value
Unknown

CVE-2022-27966

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
Xshell v7.0.0099 and below contains a binary hijack vulnerability which allows attackers to execute arbitrary code via a crafted .exe file.
Attacker Value
Unknown

CVE-2021-42095

Disclosure Date: October 07, 2021 (last updated November 28, 2024)
Xshell before 7.0.0.76 allows attackers to cause a crash by triggering rapid changes to the title bar.
Attacker Value
Unknown

CVE-2021-37326

Disclosure Date: August 15, 2021 (last updated February 23, 2025)
NetSarang Xshell 7 before Build 0077 includes unintended code strings in paste operations.