[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89003332
This update for openssh fixes the following issues: Security issue fixed: - CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions - CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate te ...

oval:org.secpod.oval:def:89003346
This update for openssh fixes the following issues: Security issue fixed: - CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions - CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate te ...

oval:org.secpod.oval:def:2103513
In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.

oval:org.secpod.oval:def:60353
The host is missing a patch containing security fixes, which affects the following package(s):openssh.base.server and openssh.base.client

oval:org.secpod.oval:def:92149
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algor ...

oval:org.secpod.oval:def:50193
The host is installed with OpenSSH through 7.9p1 or putty through 0.70 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue in the scp client utility. Successful exploitation could allow a malicious server to manipulate the cl ...

oval:org.secpod.oval:def:50198
CVE-2019-6110 openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output

oval:org.secpod.oval:def:50202
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename.

oval:org.secpod.oval:def:50269
scp client spoofing via stderr

CWE    1
CWE-284
*CVE
CVE-2019-6110

© SecPod Technologies