CVE-2024-31497
- EPSS 14.7%
- Published 15.04.2024 20:15:11
- Last modified 27.03.2025 15:15:51
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is abl...
CVE-2023-48795
- EPSS 64.06%
- Published 18.12.2023 16:15:10
- Last modified 29.09.2025 21:56:10
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
- EPSS 5.58%
- Published 27.01.2021 21:15:16
- Last modified 21.11.2024 06:21:18
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp...
CVE-2020-28864
- EPSS 0.38%
- Published 23.11.2020 19:15:11
- Last modified 21.11.2024 05:23:12
Buffer overflow in WinSCP 5.17.8 allows a malicious FTP server to cause a denial of service or possibly have other unspecified impact via a long file name.
CVE-2019-6111
- EPSS 57.89%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...
CVE-2019-6110
- EPSS 45.17%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transfe...
CVE-2019-6109
- EPSS 8.06%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...
CVE-2018-20684
- EPSS 0.6%
- Published 10.01.2019 21:29:00
- Last modified 21.11.2024 04:01:59
In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.
CVE-2018-20685
- EPSS 3.74%
- Published 10.01.2019 21:29:00
- Last modified 21.11.2024 04:01:59
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2014-2735
- EPSS 0.15%
- Published 22.04.2014 13:06:29
- Last modified 12.04.2025 10:46:40
WinSCP before 5.5.3, when FTP with TLS is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL s...