Page 2 of 8 results (0.006 seconds)

CVSS: 8.5EPSS: 8%CPEs: 1EXPL: 3

Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command. Desbordamiento de búfer basado en pila en SFTP en freeSSHd 1.2.1 permite a usuarios remotos autenticados ejecutar código de su elección a través a un nombre de directorio largo en un comando SSH_FXP_OPENDIR (aka opendir). • https://www.exploit-db.com/exploits/5709 https://www.exploit-db.com/exploits/5751 http://secunia.com/advisories/30498 http://www.securityfocus.com/archive/1/493180/100/0/threaded http://www.securityfocus.com/bid/29453 http://www.securitytracker.com/id?1020212 http://www.vupen.com/english/advisories/2008/1711/references • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 2

freeSSHd 1.2 and earlier allows remote attackers to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference. freeSSHd 1.2 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) a través de un paquete SSH2_MSG_NEWKEYS al puerto TCP 22, lo que dispara una referencia a un puntero NULL (nulo). • https://www.exploit-db.com/exploits/31218 http://aluigi.altervista.org/adv/freesshdnull-adv.txt http://secunia.com/advisories/29002 http://www.securityfocus.com/archive/1/488363/100/0/threaded http://www.securityfocus.com/bid/27845 http://www.vupen.com/english/advisories/2008/0591 •

CVSS: 7.5EPSS: 68%CPEs: 4EXPL: 4

Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string. Desbordamiento de búfer basado en pila en (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 y 1.3.3 DEMO, como se usa en otros productos incluyendo (2) FreeSSHd 1.0.9 y (3) freeFTPd 1.0.10, permite a atacantes remotos ejecutar código arbitrario a través de una cadena de algoritmo de intercambio de clave larga. • https://www.exploit-db.com/exploits/16462 https://www.exploit-db.com/exploits/16461 https://www.exploit-db.com/exploits/1787 http://marc.info/?l=full-disclosure&m=114764338702488&w=2 http://secunia.com/advisories/19845 http://secunia.com/advisories/19846 http://secunia.com/advisories/20136 http://securityreason.com/securityalert/901 http://www.kb.cert.org/vuls/id/477960 http://www.osvdb.org/25463 http://www.osvdb.org/25569 http://www.securityfocus.com/archive • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •