freeSSHd 1.0.9

CPE Details

freeSSHd 1.0.9
1.0.9
2024-02-03
00h39 +00:00
2024-02-03
00h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:freesshd:freesshd:1.0.9:*:*:*:*:*:*:*

Informations

Vendor

freesshd

Product

freesshd

Version

1.0.9

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-0723 2024-01-19 16h31 +00:00 A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251547.
7.5
Haute
CVE-2012-6066 2012-12-04 23h00 +00:00 freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
9.3
CVE-2008-0852 2008-02-20 23h00 +00:00 freeSSHd 1.2 and earlier allows remote attackers to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference.
5
CVE-2006-2407 2006-05-16 08h00 +00:00 Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
7.5