Vulnerabilities > Freesshd > Freesshd > 1.2.1

DATE CVE VULNERABILITY TITLE RISK
2012-12-04 CVE-2012-6066 Improper Authentication vulnerability in Freesshd 1.2.1/1.2.2/1.2.6
freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
network
freesshd CWE-287
critical
9.3
2009-08-05 CVE-2008-6899 Buffer Errors vulnerability in Freesshd 1.2.1
Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command.
network
low complexity
freesshd CWE-119
critical
9.0
2008-10-28 CVE-2008-4762 Buffer Errors vulnerability in Freesshd 1.2.1
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters.
network
low complexity
freesshd CWE-119
critical
9.0
2008-06-06 CVE-2008-2573 Buffer Errors vulnerability in Freesshd 1.2.1
Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
network
freesshd CWE-119
8.5