Page 7 of 32 results (0.002 seconds)

CVSS: 10.0EPSS: 97%CPEs: 16EXPL: 2

Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite. • https://www.exploit-db.com/exploits/16463 https://www.exploit-db.com/exploits/1788 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html http://securitytracker.com/id?1005812 http://securitytracker.com/id?1005813 http://www.cert.org/advisories/CA-2002-36.html http://www.securityfocus.com/bid/6407 https://exchange.xforce.ibmcloud.com/vulnerabilities/10870 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5848 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 2

xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized. • https://www.exploit-db.com/exploits/19984 http://archives.neohapsis.com/archives/bugtraq/2000-05/0409.html http://archives.neohapsis.com/archives/bugtraq/2000-05/0420.html http://www.openwall.com/lists/oss-security/2024/06/09/1 http://www.openwall.com/lists/oss-security/2024/06/09/2 http://www.securityfocus.com/bid/1298 •