Логотип exploitDog
bind:"CVE-2019-6109" OR bind:"CVE-2019-6111" OR bind:"CVE-2018-20685"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-6109" OR bind:"CVE-2019-6111" OR bind:"CVE-2018-20685"

Количество 35

Количество 35

fstec логотип

BDU:2019-03791

больше 6 лет назад

Уязвимость функции refresh_progress_meter() (progressmeter.c) средства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию или выполнить произвольный код

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2019-00832

больше 6 лет назад

Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла

CVSS3: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2018-20685

больше 6 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-20685

почти 7 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-20685

больше 6 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-20685

больше 6 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to b ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2019-6111

больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2019-6111

почти 7 лет назад

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2019-6111

больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2019-6111

больше 6 лет назад

An issue was discovered in OpenSSH 7.9. Due to the scp implementation ...

CVSS3: 5.9
EPSS: Средний
github логотип

GHSA-28hp-2gv6-gjp8

больше 3 лет назад

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2019-00773

почти 7 лет назад

Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-jr78-hfw4-xp7g

больше 3 лет назад

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
EPSS: Средний
fstec логотип

BDU:2019-03788

больше 6 лет назад

Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

CVSS3: 5.9
EPSS: Средний
fstec логотип

BDU:2019-00830

больше 6 лет назад

Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента

CVSS3: 5.9
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-03791

Уязвимость функции refresh_progress_meter() (progressmeter.c) средства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию или выполнить произвольный код

CVSS3: 6.8
8%
Низкий
больше 6 лет назад
fstec логотип
BDU:2019-00832

Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла

CVSS3: 6.8
8%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-20685

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
3%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-20685

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
3%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-20685

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
3%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-20685

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to b ...

CVSS3: 5.3
3%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-6111

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
66%
Средний
больше 6 лет назад
redhat логотип
CVE-2019-6111

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.3
66%
Средний
почти 7 лет назад
nvd логотип
CVE-2019-6111

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
66%
Средний
больше 6 лет назад
debian логотип
CVE-2019-6111

An issue was discovered in OpenSSH 7.9. Due to the scp implementation ...

CVSS3: 5.9
66%
Средний
больше 6 лет назад
github логотип
GHSA-28hp-2gv6-gjp8

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVSS3: 5.3
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00773

Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

CVSS3: 5.3
3%
Низкий
почти 7 лет назад
github логотип
GHSA-jr78-hfw4-xp7g

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVSS3: 5.9
66%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-03788

Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу

CVSS3: 5.9
66%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-00830

Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента

CVSS3: 5.9
66%
Средний
больше 6 лет назад

Уязвимостей на страницу