8 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. • https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html https://vuldb.com/?ctiid.251547 https://vuldb.com/?id.251547 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 9.3EPSS: 50%CPEs: 3EXPL: 4

freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c. freeSSHd.exe en freeSSHd hasta v1.2.6 permite a atacantes remotos evitar la autenticación a través de una sesión de SFTP manipulada, como lo demuestra un cliente OpenSSH con versiones modificadas de ssh.c y sshconnect2.c. • https://www.exploit-db.com/exploits/23079 https://www.exploit-db.com/exploits/24133 https://www.exploit-db.com/exploits/23080 https://github.com/bongbongco/CVE-2012-6066 http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0012.html https://seclists.org/fulldisclosure/2010/Aug/132 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in FreeSSHD 1.2.4 allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. Vulnerabilidad no especificada en FreeSSHD v1.2.4 permite a los atacantes remotos causar una denegación de servicio através de vectores desconocidos, como se demostró en cierto módulo en VulnDisco Pack Professional v8.11. NOTA como en 20090917, esta información no tiene información de la acción. • http://intevydis.com/vd-list.shtml http://secunia.com/advisories/36506 http://www.securitytracker.com/id?1022811 •

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 3

Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command. Múltiple desbordamiento de búfer en freeSSHd v1.2.1 permite a usuarios autenticados remotamente causar una denegación de servicio (caída) y ejecutar código a su elección a través de (1) open, (2) unlink, (3) mkdir, (4) rmdir, o(5) comando stat SFTP. • https://www.exploit-db.com/exploits/8295 http://www.bmgsec.com.au/advisories/freeSSHd-bof.txt http://www.securityfocus.com/archive/1/499486/100/0/threaded http://www.securityfocus.com/bid/32972 https://exchange.xforce.ibmcloud.com/vulnerabilities/52434 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 7%CPEs: 1EXPL: 2

Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters. Desbordamiento de búfer basado en pila en freeSSHd 1.2.1, permite a usuarios autenticados remotamente provocar una denegación de servicio (caída de servicio) y seguramente la ejecución de código de su elección a través de un argumento largo a los parámetros (1) rename y (2) realpath. • https://www.exploit-db.com/exploits/6812 https://www.exploit-db.com/exploits/6800 http://secunia.com/advisories/32366 http://securityreason.com/securityalert/4515 http://www.securityfocus.com/archive/1/497746/100/0/threaded http://www.securityfocus.com/bid/31872 http://www.securitytracker.com/id?1021096 http://www.vupen.com/english/advisories/2008/2897 https://exchange.xforce.ibmcloud.com/vulnerabilities/46046 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •