Vulnerabilities > Freesshd
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-19 | CVE-2024-0723 | Improper Resource Shutdown or Release vulnerability in Freesshd 1.0.9 A vulnerability was found in freeSSHd 1.0.9 on Windows. | 7.5 |
2022-03-31 | CVE-2022-27052 | Unquoted Search Path or Element vulnerability in Freesshd Freeftpd FreeFtpd version 1.0.13 and below contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges. | 7.2 |
2018-07-10 | CVE-2018-9853 | Improper Privilege Management vulnerability in Freesshd 1.3.1 Insecure access control in freeSSHd version 1.3.1 allows attackers to obtain the privileges of the freesshd.exe process by leveraging the ability to login to an unprivileged account on the server. | 9.8 |
2018-01-24 | CVE-2017-1000475 | Unquoted Search Path or Element vulnerability in Freesshd 1.3.1 FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges. | 4.6 |
2012-12-04 | CVE-2012-6066 | Improper Authentication vulnerability in Freesshd 1.2.1/1.2.2/1.2.6 freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c. | 9.3 |
2009-09-24 | CVE-2009-3340 | Denial-Of-Service vulnerability in Freesshd 1.2.4 Unspecified vulnerability in FreeSSHD 1.2.4 allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. | 5.0 |
2009-08-05 | CVE-2008-6899 | Buffer Errors vulnerability in Freesshd 1.2.1 Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command. | 9.0 |
2008-10-28 | CVE-2008-4762 | Buffer Errors vulnerability in Freesshd 1.2.1 Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters. | 9.0 |
2008-06-06 | CVE-2008-2573 | Buffer Errors vulnerability in Freesshd 1.2.1 Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command. | 8.5 |
2008-02-21 | CVE-2008-0852 | Remote Denial of Service vulnerability in freeSSHd 'SSH2_MSG_NEWKEYS' Packet freeSSHd 1.2 and earlier allows remote attackers to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference. | 5.0 |