CVE-2019-13933
- EPSS 0.54%
- Published 16.01.2020 16:15:16
- Last modified 21.11.2024 04:25:43
A vulnerability has been identified in SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), SCALANCE X204RNA EEC (HSR), SCALANCE X204RNA EEC (PRP), SCALANCE X204RNA EEC (PRP/HSR), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X3...
CVE-2019-16905
- EPSS 0.2%
- Published 09.10.2019 20:15:23
- Last modified 23.04.2025 16:15:20
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution...
CVE-2019-6109
- EPSS 8.06%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...
CVE-2019-6110
- EPSS 45.17%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transfe...
CVE-2019-6111
- EPSS 57.89%
- Published 31.01.2019 18:29:00
- Last modified 21.11.2024 04:45:57
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...
CVE-2018-20685
- EPSS 3.74%
- Published 10.01.2019 21:29:00
- Last modified 21.11.2024 04:01:59
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15473
- EPSS 90.29%
- Published 17.08.2018 19:29:00
- Last modified 21.11.2024 03:50:53
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-...
CVE-2018-4833
- EPSS 1.01%
- Published 14.06.2018 16:29:00
- Last modified 21.11.2024 04:07:32
A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variant...
- EPSS 13.61%
- Published 12.05.2003 04:00:00
- Last modified 03.04.2025 01:03:51
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.