Page 8 of 71 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials. • http://secunia.com/advisories/18001 http://securitytracker.com/id?1015368 http://www.securityfocus.com/bid/15903 http://www.ssh.com/company/newsroom/article/694 http://www.vupen.com/english/advisories/2005/2929 •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations. • http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2005q4/000312.html http://matt.ucc.asn.au/dropbear/dropbear.html http://secunia.com/advisories/18108 http://secunia.com/advisories/18109 http://secunia.com/advisories/18142 http://www.debian.org/security/2005/dsa-923 http://www.gentoo.org/security/en/glsa/glsa-200512-13.xml http://www.securityfocus.com/bid/15923 http://www.vupen.com/english/advisories/2005/2962 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

SSH Tectia Server 4.3.1 and earlier, and SSH Secure Shell for Windows Servers, uses insecure permissions when generating the Secure Shell host identification key, which allows local users to access the key and spoof the server. • http://secunia.com/advisories/15894 http://www.ssh.com/company/newsroom/article/653 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variables, which might allow remote attackers to gain access. • http://matt.ucc.asn.au/dropbear/CHANGES http://secunia.com/advisories/12153 http://secunia.com/advisories/28935 http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml http://www.osvdb.org/8137 http://www.securityfocus.com/bid/10803 http://www.vupen.com/english/advisories/2008/0543 https://exchange.xforce.ibmcloud.com/vulnerabilities/16810 https://exchange.xforce.ibmcloud.com/vulnerabilities/40490 •

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 0

Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled, allows local users to obtain the server's private key. • http://secunia.com/advisories/11193 http://securitytracker.com/alerts/2004/Mar/1009532.html http://www.kb.cert.org/vuls/id/814198 http://www.osvdb.org/displayvuln.php?osvdb_id=4491 http://www.securityfocus.com/bid/9956 http://www.ssh.com/company/newsroom/article/520 https://exchange.xforce.ibmcloud.com/vulnerabilities/15585 •