Ssh Tectia Server 6.3.0

CPE Details

Ssh Tectia Server 6.3.0
6.3.0
2012-12-05
14h08 +00:00
2012-12-18
20h36 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ssh:tectia_server:6.3.0:*:*:*:*:*:*:*

Informations

Vendor

ssh

Product

tectia_server

Version

6.3.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-27892 2021-03-15 13h08 +00:00 SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
7.8
Haute
CVE-2021-27891 2021-03-15 13h07 +00:00 SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
8.8
Haute
CVE-2021-27893 2021-03-15 13h05 +00:00 SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
7
Haute
CVE-2012-5975 2012-12-04 23h00 +00:00 The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
9.3