In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.ģ Oncommand Unified Manager Core Package, Leap, Putty ![]() Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.Ĥ Windows, Backports Sle, Leap and 1 more This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. ![]() 3 Fedora, Oncommand Unified Manager Core Package, Putty
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |