4 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. • https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html https://vuldb.com/?ctiid.251547 https://vuldb.com/?id.251547 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 9.3EPSS: 50%CPEs: 3EXPL: 4

freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c. freeSSHd.exe en freeSSHd hasta v1.2.6 permite a atacantes remotos evitar la autenticación a través de una sesión de SFTP manipulada, como lo demuestra un cliente OpenSSH con versiones modificadas de ssh.c y sshconnect2.c. • https://www.exploit-db.com/exploits/23079 https://www.exploit-db.com/exploits/24133 https://www.exploit-db.com/exploits/23080 https://github.com/bongbongco/CVE-2012-6066 http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0012.html https://seclists.org/fulldisclosure/2010/Aug/132 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 2

freeSSHd 1.2 and earlier allows remote attackers to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference. freeSSHd 1.2 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) a través de un paquete SSH2_MSG_NEWKEYS al puerto TCP 22, lo que dispara una referencia a un puntero NULL (nulo). • https://www.exploit-db.com/exploits/31218 http://aluigi.altervista.org/adv/freesshdnull-adv.txt http://secunia.com/advisories/29002 http://www.securityfocus.com/archive/1/488363/100/0/threaded http://www.securityfocus.com/bid/27845 http://www.vupen.com/english/advisories/2008/0591 •

CVSS: 7.5EPSS: 68%CPEs: 4EXPL: 4

Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string. Desbordamiento de búfer basado en pila en (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 y 1.3.3 DEMO, como se usa en otros productos incluyendo (2) FreeSSHd 1.0.9 y (3) freeFTPd 1.0.10, permite a atacantes remotos ejecutar código arbitrario a través de una cadena de algoritmo de intercambio de clave larga. • https://www.exploit-db.com/exploits/16462 https://www.exploit-db.com/exploits/16461 https://www.exploit-db.com/exploits/1787 http://marc.info/?l=full-disclosure&m=114764338702488&w=2 http://secunia.com/advisories/19845 http://secunia.com/advisories/19846 http://secunia.com/advisories/20136 http://securityreason.com/securityalert/901 http://www.kb.cert.org/vuls/id/477960 http://www.osvdb.org/25463 http://www.osvdb.org/25569 http://www.securityfocus.com/archive • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •