Логотип exploitDog
bind:CVE-2019-14889
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-14889

Количество 20

Количество 20

ubuntu логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-14889

около 6 лет назад

A flaw was found with the libssh API function ssh_scp_new() in version ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0102-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2689-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0139-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0131-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0130-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0129-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3308-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3307-1

почти 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3293-1

около 6 лет назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3267-1

около 6 лет назад

Security update for libssh

EPSS: Низкий
github логотип

GHSA-mrxf-x73j-79wm

больше 3 лет назад

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2020-02642

больше 5 лет назад

Уязвимость функции ssh_scp_new() библиотеки libssh, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
EPSS: Низкий
rocky логотип

RLSA-2020:4545

около 5 лет назад

Moderate: libssh security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4545

около 5 лет назад

ELSA-2020-4545: libssh security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0539-1

почти 2 года назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0525-1

почти 2 года назад

Security update for libssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 7.1
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-14889

A flaw was found with the libssh API function ssh_scp_new() in version ...

CVSS3: 8.8
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0102-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2689-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0139-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0131-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0130-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0129-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3308-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3307-1

Security update for libssh

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3293-1

Security update for libssh

1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3267-1

Security update for libssh

1%
Низкий
около 6 лет назад
github логотип
GHSA-mrxf-x73j-79wm

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02642

Уязвимость функции ssh_scp_new() библиотеки libssh, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
1%
Низкий
больше 5 лет назад
rocky логотип
RLSA-2020:4545

Moderate: libssh security, bug fix, and enhancement update

около 5 лет назад
oracle-oval логотип
ELSA-2020-4545

ELSA-2020-4545: libssh security, bug fix, and enhancement update (MODERATE)

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2024:0539-1

Security update for libssh

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0525-1

Security update for libssh

почти 2 года назад

Уязвимостей на страницу