Количество 19
Количество 19

CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.

CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.

CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.

CVE-2019-17498
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic i ...

openSUSE-SU-2019:2483-1
Security update for libssh2_org

SUSE-SU-2019:2936-1
Security update for libssh2_org

SUSE-SU-2019:2900-2
Security update for libssh2_org

SUSE-SU-2019:2900-1
Security update for libssh2_org

SUSE-SU-2019:14226-1
Security update for libssh2_org

SUSE-SU-2019:14206-1
Security update for libssh2_org

SUSE-RU-2023:4192-1
Recommended update for libssh2_org
GHSA-h2hf-mx7w-fhwm
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
ELSA-2020-3915
ELSA-2020-3915: libssh2 security update (MODERATE)

BDU:2022-05961
Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

SUSE-RU-2023:4066-1
Recommended update for libssh2_org

openSUSE-SU-2020:2129-1
Security update for libssh2_org

openSUSE-SU-2020:2126-1
Security update for libssh2_org

SUSE-SU-2020:3551-1
Security update for libssh2_org
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | почти 6 лет назад |
![]() | CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 6.5 | 2% Низкий | почти 6 лет назад |
![]() | CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | почти 6 лет назад |
![]() | CVSS3: 8.1 | 2% Низкий | около 5 лет назад | |
CVE-2019-17498 In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic i ... | CVSS3: 8.1 | 2% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2019:2483-1 Security update for libssh2_org | 2% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:2936-1 Security update for libssh2_org | 2% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:2900-2 Security update for libssh2_org | 2% Низкий | около 5 лет назад | |
![]() | SUSE-SU-2019:2900-1 Security update for libssh2_org | 2% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:14226-1 Security update for libssh2_org | 2% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:14206-1 Security update for libssh2_org | 2% Низкий | почти 6 лет назад | |
![]() | SUSE-RU-2023:4192-1 Recommended update for libssh2_org | 2% Низкий | почти 2 года назад | |
GHSA-h2hf-mx7w-fhwm In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | CVSS3: 8.1 | 2% Низкий | больше 3 лет назад | |
ELSA-2020-3915 ELSA-2020-3915: libssh2 security update (MODERATE) | почти 5 лет назад | |||
![]() | BDU:2022-05961 Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании | CVSS3: 8.1 | 2% Низкий | около 6 лет назад |
![]() | SUSE-RU-2023:4066-1 Recommended update for libssh2_org | почти 2 года назад | ||
![]() | openSUSE-SU-2020:2129-1 Security update for libssh2_org | почти 5 лет назад | ||
![]() | openSUSE-SU-2020:2126-1 Security update for libssh2_org | почти 5 лет назад | ||
![]() | SUSE-SU-2020:3551-1 Security update for libssh2_org | почти 5 лет назад |
Уязвимостей на страницу