Логотип exploitDog
bind:"CVE-2020-1730" OR bind:"CVE-2019-14889"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-1730" OR bind:"CVE-2019-14889"

Количество 29

Количество 29

rocky логотип

RLSA-2020:4545

около 5 лет назад

Moderate: libssh security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4545

около 5 лет назад

ELSA-2020-4545: libssh security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0539-1

почти 2 года назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0525-1

почти 2 года назад

Security update for libssh

EPSS: Низкий
ubuntu логотип

CVE-2020-1730

больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2020-1730

больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-1730

больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2020-1730

больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in t ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in version ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0510-1

больше 5 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0968-1

больше 5 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0967-1

больше 5 лет назад

Security update for libssh

EPSS: Низкий
github логотип

GHSA-6rh3-m266-5m77

больше 3 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2020-02135

почти 6 лет назад

Уязвимость библиотеки libssh, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0102-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2689-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0139-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2020:4545

Moderate: libssh security, bug fix, and enhancement update

около 5 лет назад
oracle-oval логотип
ELSA-2020-4545

ELSA-2020-4545: libssh security, bug fix, and enhancement update (MODERATE)

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2024:0539-1

Security update for libssh

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0525-1

Security update for libssh

почти 2 года назад
ubuntu логотип
CVE-2020-1730

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-1730

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-1730

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-1730

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in t ...

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 7.1
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in version ...

CVSS3: 8.8
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0510-1

Security update for libssh

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0968-1

Security update for libssh

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0967-1

Security update for libssh

0%
Низкий
больше 5 лет назад
github логотип
GHSA-6rh3-m266-5m77

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02135

Уязвимость библиотеки libssh, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0102-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2689-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0139-1

Security update for libssh

1%
Низкий
почти 6 лет назад

Уязвимостей на страницу