6 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

15 Mar 2021 — SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected. SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, permiten una escalada de privilegios locales. ConnectSecure en Windows está afectado • https://info.ssh.com/tectia-vulnerability-cve-2021-27892 •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

15 Mar 2021 — SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected. SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, presentan una generación de claves débil. ConnectSecure en Windows está afectado • https://info.ssh.com/tectia-vulnerability-cve-2021-27891 •

CVSS: 7.0EPSS: 0%CPEs: 4EXPL: 0

15 Mar 2021 — SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected. SSH Tectia Client and Server versiones anteriores a 6.4.19 en Windows, permiten una escalada de privilegios locales en condiciones no estándar. ConnectSecure en Windows está afectado • https://info.ssh.com/tectia-vulnerability-cve-2021-27893 •

CVSS: 10.0EPSS: 60%CPEs: 167EXPL: 0

19 Nov 2008 — Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote a... • http://isc.sans.org/diary.html?storyid=5366 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 0

24 Oct 2006 — SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339. SSH Tectia Client/Server/Connector 5.1.0 y anteriores, Manager 2.2.0 y anteriores, y otros productos, ... • http://secunia.com/advisories/22350 •

CVSS: 7.8EPSS: 0%CPEs: 50EXPL: 0

23 Aug 2006 — Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories. Vulnerabilidad de ruta no confiable en la búsqueda no literal de Windows en múltiples productos SSH de Tectia, incluyendo el Client/Server/Connector 5.0.0 y 5.0.1 y Client/Server ant... • http://securitytracker.com/id?1016743 •