cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-6004,https://securityvulnerability.io/vulnerability/CVE-2023-6004,Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname,"A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.",Red Hat,"Libssh,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",4.8,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-01-03T17:15:00.000Z,0 CVE-2023-6918,https://securityvulnerability.io/vulnerability/CVE-2023-6918,Libssh: missing checks for return values for digests,"A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.",Red Hat,"libssh,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora,Extra Packages for Enterprise Linux",5.3,MEDIUM,0.0013000000035390258,false,false,false,false,,false,false,2023-12-19T00:15:00.000Z,0 CVE-2023-3603,https://securityvulnerability.io/vulnerability/CVE-2023-3603,Processing sftp server read may cause null dereference,"A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.",Red Hat,"Libssh,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages For Enterprise Linux 7,Fedora",3.1,LOW,0.0006200000061653554,false,false,false,false,,false,false,2023-07-21T20:15:00.000Z,0 CVE-2020-1730,https://securityvulnerability.io/vulnerability/CVE-2020-1730,,A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.,Red Hat,Libssh,5.3,MEDIUM,0.002839999971911311,false,false,false,false,,false,false,2020-04-13T00:00:00.000Z,0 CVE-2019-14889,https://securityvulnerability.io/vulnerability/CVE-2019-14889,,"A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.",Red Hat,Libssh,7.1,HIGH,0.010329999960958958,false,false,false,false,,false,false,2019-12-10T00:00:00.000Z,0