Vulnerabilities > Winscp > Winscp > 2.0.0

DATE CVE VULNERABILITY TITLE RISK
2007-09-17 CVE-2007-4909 Permissions, Privileges, and Access Controls vulnerability in Winscp
Interpretation conflict in WinSCP before 4.0.4 allows remote attackers to perform arbitrary file transfers with a remote server via file-transfer commands in the final portion of a (1) scp, and possibly a (2) sftp or (3) ftp, URL, as demonstrated by a URL specifying login to the remote server with a username of scp, which is interpreted as an HTTP scheme name by the protocol handler in a web browser, but is interpreted as a username by WinSCP.
network
winscp CWE-264
critical
9.3
2002-12-23 CVE-2002-1360 Improper Input Validation vulnerability in multiple products
Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.
10.0
2002-12-23 CVE-2002-1359 Improper Input Validation vulnerability in multiple products
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
10.0
2002-12-23 CVE-2002-1358 Improper Input Validation vulnerability in multiple products
Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
10.0
2002-12-23 CVE-2002-1357 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
10.0