The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Access Restriction Bypass vulnerabilities in an interactive lesson.
Start learningUpgrade libssh
to version 0.9.7, 0.10.5 or higher.
Affected versions of this package are vulnerable to Access Restriction Bypass via the function pki_verify_data_signature
in circumstances of memory allocation problems.
This vulnerability is caused by the return value rc
, which is initialized to SSH_ERROR and later rewritten to save the return value of the function call pki_key_check_hash_compatible
. The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls goto error
returning SSH_OK.
Note: Ed25519 key support is not affected in versions 0.9.x as it uses a different code path, but versions 0.10.x are affected. Only OpenSSL cryptographic backend is affected.