Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freesshd freesshd vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-6066
freeSSHd.exe in freeSSHd up to and including 1.2.6 allows remote malicious users to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
Freesshd Freesshd 1.2.1
Freesshd Freesshd
Freesshd Freesshd 1.2.2
3 EDB exploits
1 Github repository
NA
CVE-2008-0852
freeSSHd 1.2 and previous versions allows remote malicious users to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference.
Freesshd Freesshd
1 EDB exploit
NA
CVE-2009-3340
Unspecified vulnerability in FreeSSHD 1.2.4 allows remote malicious users to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, becau...
Freesshd Freesshd 1.2.4
7.5
CVSSv3
CVE-2024-0723
A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ...
Freesshd Freesshd 1.0.9
NA
CVE-2008-4762
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters.
Freesshd Freesshd 1.2.1
2 EDB exploits
7.8
CVSSv3
CVE-2017-1000475
FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges.
Freesshd Freesshd 1.3.1
1 Github repository
9.8
CVSSv3
CVE-2018-9853
Insecure access control in freeSSHd version 1.3.1 allows malicious users to obtain the privileges of the freesshd.exe process by leveraging the ability to login to an unprivileged account on the server.
Freesshd Freesshd 1.3.1
NA
CVE-2008-6899
Multiple buffer overflows in freeSSHd 1.2.1 allow remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a long (1) open, (2) unlink, (3) mkdir, (4) rmdir, or (5) stat SFTP command.
Freesshd Freesshd 1.2.1
1 EDB exploit
NA
CVE-2008-2573
Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
Freesshd Freesshd 1.2.1
2 EDB exploits
NA
CVE-2006-2407
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote malicious users to execute arbitrary code via a long key exchange algorithm string.
Freesshd Freesshd 1.0.9
Weonlydo Wodsshserver 1.3.3 Demo
Weonlydo Wodsshserver 1.2.7
Freeftpd Freeftpd 1.0.10
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »