WinSCP

WinSCP

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.75%
  • Veröffentlicht 19.08.2013 23:55:09
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negativ...

  • EPSS 14.07%
  • Veröffentlicht 17.09.2007 17:17:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Interpretation conflict in WinSCP before 4.0.4 allows remote attackers to perform arbitrary file transfers with a remote server via file-transfer commands in the final portion of a (1) scp, and possibly a (2) sftp or (3) ftp, URL, as demonstrated by ...

Exploit
  • EPSS 17.57%
  • Veröffentlicht 14.06.2006 15:06:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote attackers to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.

  • EPSS 21.35%
  • Veröffentlicht 23.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH...

  • EPSS 4.13%
  • Veröffentlicht 23.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code du...

  • EPSS 87%
  • Veröffentlicht 23.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH...

  • EPSS 4.13%
  • Veröffentlicht 23.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.