-
Vulnerable Library - golang.org/x/crypto-v0.0.0-20220817201139-bc19a97f63c8
Library home page: https://proxy.golang.org/golang.org/x/crypto/@v/v0.0.0-20220817201139-bc19a97f63c8.zip
Path to depende…
-
## CVE-2023-48795 - Medium Severity Vulnerability
Vulnerable Library - sshd-core-1.6.0.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects.
…
-
## CVE-2023-48795 - Medium Severity Vulnerability
Vulnerable Library - net-ssh-7.2.0.gem
Net::SSH: a pure-Ruby implementation of the SSH2 client protocol. It allows you to write programs that invoke…
-
In the wiki, it mentions that ConnectBot can be used to store keys for git over SSH. Unfortunately, this requires that ConnectBot be installed prior to agit. I suspect there is rationale for not inclu…
jwir3 updated
9 years ago
-
I prefer to use a Tor hidden service for SSH since it's more secure in that I know for certain (almost) that the host is what it says it is. It also takes away the need for port forwarding etc.
Could …
-
## CVE-2023-48795 - Medium Severity Vulnerability
Vulnerable Library - ssh2-0.8.9.tgz
SSH2 client and server modules written in pure JavaScript for node.js
Library home page: https://registry.npmjs.…
-
Vulnerable Library - github.com/golang/crypto-v0.1.0
[mirror] Go supplementary cryptography libraries
Library home page: https://proxy.golang.org/github.com/golang/crypto/@v/v0.1.0.zip
Path to depen…
-
Please leave your comments for [Automate All The Things: Android and SSH](https://atextor.de/2016/06/20/automate-all-the-things-android-and-ssh.html) here.
-
## CVE-2023-48795 - Medium Severity Vulnerability
Vulnerable Libraries - sshd-common-2.9.2.jar, sshd-core-2.9.2.jar
sshd-common-2.9.2.jar
Library home page: https://www.apache.org/
Path to depend…
-
I'm assuming this is because RSA keys are now ignored entirely if an ECDSA key exists. I got the "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!" on all my hosts which have ECDSA keys after upgradin…