Known Host Cracker (khc) is a small tool designed to recover hashed known_host files back to their plain-text equivalents.
a72983ee744d25dfc04d40a965a434d2113971925229e2050b24ca9d099830b0
PF in OpenBSD, NetBSD, and various other Unix variants suffer from a null pointer dereference vulnerability.
ea97857d82a2cb2bbd3b45b74c0233c3578d157ebfaccdebe90b3f664c1bca03
OpenBSD version 4.5 and below suffers from a remote denial of service vulnerability in relation to handling IP datagrams.
b86daf70a93aba34e9521f1f85a6a18282429fbe86a0914bf39c75eb3c2379f7
Netgear embedded Linux for the SSL312 router suffers from a remote denial of service vulnerability.
c3e60be356b391967fdc9548e0abe4b3a004387eaaa4a3ae004260d54ca97171
Debian GNU/Linux suffers from a XTERM DECRQSS weakness that allows for remote code execution as the user id viewing the content.
2cf126cfa15a92ef06cfb3ec5e1789cbdc1db4514c80b724ea3ff5178539d03d
screen versions 4.0.3 and below are vulnerable to an authentication bypass vulnerability that allows local attackers to gain system access in the case where screen was locked with a password. Tested on OpenBSD.
5a6a888bcf05d77216b3849e8465eb8daa06ba3c92c524e8aee2d252bc558b41
Screen versions 4.0.3 and below suffer from an authentication bypass vulnerability when it is locked.
b967318756ba3a99cd10614a3f1df67c080af7881ed47503fbff5decaf6edf5a
System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).
1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
OpenSSH, when configured to use S/KEY authentication, is prone to a remoteinformation disclosure weakness.
827bc6c037cf63160a94b7ff9a14a24cb084daaa8c20cf1bd442f18e90af8314