CVE-2008-5124
18.11.2008, 00:30
JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks.Enginsight
Vendor | Product | Version |
---|---|---|
jscape | secure_ftp_applet | 𝑥 ≤ 4.8.0 |
jscape | secure_ftp_applet | 1.1 |
jscape | secure_ftp_applet | 1.2 |
jscape | secure_ftp_applet | 1.3 |
jscape | secure_ftp_applet | 1.4 |
jscape | secure_ftp_applet | 1.5 |
jscape | secure_ftp_applet | 1.6 |
jscape | secure_ftp_applet | 2.0 |
jscape | secure_ftp_applet | 2.1 |
jscape | secure_ftp_applet | 2.5 |
jscape | secure_ftp_applet | 2.6 |
jscape | secure_ftp_applet | 3.0 |
jscape | secure_ftp_applet | 3.0.1 |
jscape | secure_ftp_applet | 3.0.2 |
jscape | secure_ftp_applet | 3.0.3 |
jscape | secure_ftp_applet | 3.0.4 |
jscape | secure_ftp_applet | 4.0 |
jscape | secure_ftp_applet | 4.2.0 |
jscape | secure_ftp_applet | 4.3.0 |
jscape | secure_ftp_applet | 4.4.0 |
jscape | secure_ftp_applet | 4.5.0 |
jscape | secure_ftp_applet | 4.6.0 |
jscape | secure_ftp_applet | 4.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References