cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-6109,https://securityvulnerability.io/vulnerability/CVE-2019-6109,,"An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",OpenBSD,"Openssh,Winscp",6.8,MEDIUM,0.002259999979287386,false,false,false,false,,false,false,2019-01-31T00:00:00.000Z,0 CVE-2019-6110,https://securityvulnerability.io/vulnerability/CVE-2019-6110,,"In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",OpenBSD,"Openssh,Winscp",6.8,MEDIUM,0.004019999876618385,false,false,false,false,,false,false,2019-01-31T00:00:00.000Z,0 CVE-2019-6111,https://securityvulnerability.io/vulnerability/CVE-2019-6111,,"An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",OpenBSD,"Openssh,Winscp",5.9,MEDIUM,0.0022899999748915434,false,false,false,true,true,false,false,2019-01-31T00:00:00.000Z,0 CVE-2018-20685,https://securityvulnerability.io/vulnerability/CVE-2018-20685,,"In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",OpenBSD,"Openssh,Winscp",5.3,MEDIUM,0.003220000071451068,false,false,false,false,,false,false,2019-01-10T00:00:00.000Z,0