Количество 19
Количество 19
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
CVE-2019-17498
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic i ...
openSUSE-SU-2019:2483-1
Security update for libssh2_org
SUSE-SU-2019:2936-1
Security update for libssh2_org
SUSE-SU-2019:2900-2
Security update for libssh2_org
SUSE-SU-2019:2900-1
Security update for libssh2_org
SUSE-SU-2019:14226-1
Security update for libssh2_org
SUSE-SU-2019:14206-1
Security update for libssh2_org
SUSE-RU-2023:4192-1
Recommended update for libssh2_org
GHSA-h2hf-mx7w-fhwm
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
ELSA-2020-3915
ELSA-2020-3915: libssh2 security update (MODERATE)
BDU:2022-05961
Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
SUSE-RU-2023:4066-1
Recommended update for libssh2_org
openSUSE-SU-2020:2129-1
Security update for libssh2_org
openSUSE-SU-2020:2126-1
Security update for libssh2_org
SUSE-SU-2020:3551-1
Security update for libssh2_org
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 6.5 | 2% Низкий | больше 6 лет назад | |
CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
CVSS3: 8.1 | 2% Низкий | больше 5 лет назад | ||
CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic i ... | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:2483-1 Security update for libssh2_org | 2% Низкий | около 6 лет назад | ||
SUSE-SU-2019:2936-1 Security update for libssh2_org | 2% Низкий | около 6 лет назад | ||
SUSE-SU-2019:2900-2 Security update for libssh2_org | 2% Низкий | больше 5 лет назад | ||
SUSE-SU-2019:2900-1 Security update for libssh2_org | 2% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:14226-1 Security update for libssh2_org | 2% Низкий | около 6 лет назад | ||
SUSE-SU-2019:14206-1 Security update for libssh2_org | 2% Низкий | больше 6 лет назад | ||
SUSE-RU-2023:4192-1 Recommended update for libssh2_org | 2% Низкий | больше 2 лет назад | ||
GHSA-h2hf-mx7w-fhwm In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | больше 3 лет назад | |
ELSA-2020-3915 ELSA-2020-3915: libssh2 security update (MODERATE) | больше 5 лет назад | |||
BDU:2022-05961 Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
SUSE-RU-2023:4066-1 Recommended update for libssh2_org | больше 2 лет назад | |||
openSUSE-SU-2020:2129-1 Security update for libssh2_org | около 5 лет назад | |||
openSUSE-SU-2020:2126-1 Security update for libssh2_org | около 5 лет назад | |||
SUSE-SU-2020:3551-1 Security update for libssh2_org | около 5 лет назад |
Уязвимостей на страницу