Количество 22
Количество 22
RLSA-2024:3233
Low: libssh security update
RLSA-2024:2504
Low: libssh security update
ELSA-2024-3233
ELSA-2024-3233: libssh security update (LOW)
ELSA-2024-2504
ELSA-2024-2504: libssh security update (LOW)
ROS-20240328-06
Множественные уязвимости libssh
SUSE-SU-2024:0140-1
Security update for libssh
SUSE-SU-2024:0539-1
Security update for libssh
SUSE-SU-2024:0525-1
Security update for libssh
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message d ...
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ...
GHSA-gpcj-wh2f-rr23
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
GHSA-f35j-mfvw-p857
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:3233 Low: libssh security update | больше 1 года назад | |||
RLSA-2024:2504 Low: libssh security update | 8 месяцев назад | |||
ELSA-2024-3233 ELSA-2024-3233: libssh security update (LOW) | больше 1 года назад | |||
ELSA-2024-2504 ELSA-2024-2504: libssh security update (LOW) | больше 1 года назад | |||
ROS-20240328-06 Множественные уязвимости libssh | CVSS3: 5.3 | почти 2 года назад | ||
SUSE-SU-2024:0140-1 Security update for libssh | почти 2 года назад | |||
SUSE-SU-2024:0539-1 Security update for libssh | почти 2 года назад | |||
SUSE-SU-2024:0525-1 Security update for libssh | почти 2 года назад | |||
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | около 2 лет назад | |
CVSS3: 5.3 | 0% Низкий | около 2 лет назад | ||
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message d ... | CVSS3: 3.7 | 0% Низкий | около 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
CVSS3: 4.8 | 0% Низкий | 10 месяцев назад | ||
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ... | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
GHSA-gpcj-wh2f-rr23 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | около 2 лет назад | |
GHSA-f35j-mfvw-p857 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 3.9 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу