11 results (0.034 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. • https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html https://vuldb.com/?ctiid.251547 https://vuldb.com/?id.251547 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

FreeFtpd version 1.0.13 and below contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges. FreeFtpd versión 1.0.13 y anteriores, contiene una vulnerabilidad de ruta de servicio no citada que permite a usuarios locales lanzar procesos con altos privilegios • https://github.com/ycdxsb/Vuln/tree/main/FreeFTPd-Unquoted-Service-Path • CWE-428: Unquoted Search Path or Element •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Insecure access control in freeSSHd version 1.3.1 allows attackers to obtain the privileges of the freesshd.exe process by leveraging the ability to login to an unprivileged account on the server. El control de acceso inseguro en freeSSHd 1.3.1 permite que los atacantes obtengan los privilegios del proceso freesshd.exe aprovechando la capacidad para iniciar sesión a una cuenta sin privilegios en el servidor. • https://medium.com/%40TheWindowsTwin/vulnerability-in-freesshd-5a0abc147d7a • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 3

FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges. FreeSSHd 1.3.1 es vulnerable a un servicio con ruta sin entrecomillar, lo que permite que usuarios locales lancen procesos con privilegios elevados. • https://github.com/lajarajorge/CVE-2017-1000475 https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md https://www.exploit-db.com/exploits/48044 • CWE-428: Unquoted Search Path or Element •

CVSS: 9.3EPSS: 50%CPEs: 3EXPL: 4

freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c. freeSSHd.exe en freeSSHd hasta v1.2.6 permite a atacantes remotos evitar la autenticación a través de una sesión de SFTP manipulada, como lo demuestra un cliente OpenSSH con versiones modificadas de ssh.c y sshconnect2.c. • https://www.exploit-db.com/exploits/23079 https://www.exploit-db.com/exploits/24133 https://www.exploit-db.com/exploits/23080 https://github.com/bongbongco/CVE-2012-6066 http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0012.html https://seclists.org/fulldisclosure/2010/Aug/132 • CWE-287: Improper Authentication •