Vulnerabilities > Freesshd > Freesshd > 1.2.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-12-04 | CVE-2012-6066 | Improper Authentication vulnerability in Freesshd 1.2.1/1.2.2/1.2.6 freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c. | 9.3 |
2009-08-05 | CVE-2008-6899 | Buffer Errors vulnerability in Freesshd 1.2.1 Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command. | 9.0 |
2008-10-28 | CVE-2008-4762 | Buffer Errors vulnerability in Freesshd 1.2.1 Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters. | 9.0 |
2008-06-06 | CVE-2008-2573 | Buffer Errors vulnerability in Freesshd 1.2.1 Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command. | 8.5 |