{"api_version":"1","generated_at":"2026-04-22T15:31:59+00:00","cve":"CVE-2023-48795","urls":{"html":"https://cve.report/CVE-2023-48795","api":"https://cve.report/api/cve/CVE-2023-48795.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-48795","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-48795"},"summary":{"title":"CVE-2023-48795","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2023-12-18 16:15:00","updated_at":"2024-03-13 21:15:00"},"problem_types":["CWE-354"],"metrics":[],"references":[{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002","name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002","refsource":"","tags":[],"title":"Security Advisory","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mwiede/jsch/issues/457","name":"https://github.com/mwiede/jsch/issues/457","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/","name":"FEDORA-2024-d946b9ad25","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: putty-0.80-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1217950","name":"https://bugzilla.suse.com/show_bug.cgi?id=1217950","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42","name":"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/","name":"FEDORA-2024-ae653fb07b","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-x-mod-0.14.0-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://news.ycombinator.com/item?id=38684904","name":"https://news.ycombinator.com/item?id=38684904","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"403"},{"url":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/","name":"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"403","archivestatus":"200"},{"url":"https://www.terrapin-attack.com","name":"https://www.terrapin-attack.com","refsource":"","tags":["Exploit"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/libssh2/libssh2/pull/1291","name":"https://github.com/libssh2/libssh2/pull/1291","refsource":"","tags":["Mitigation"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/ronf/asyncssh/tags","name":"https://github.com/ronf/asyncssh/tags","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/paramiko/paramiko/issues/2337","name":"https://github.com/paramiko/paramiko/issues/2337","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/","name":"FEDORA-2023-20feb865d8","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/","name":"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rapier1/hpn-ssh/releases","name":"https://github.com/rapier1/hpn-ssh/releases","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://oryx-embedded.com/download/#changelog","name":"https://oryx-embedded.com/download/#changelog","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","name":"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://forum.netgate.com/topic/184941/terrapin-ssh-attack","name":"https://forum.netgate.com/topic/184941/terrapin-ssh-attack","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/cyd01/KiTTY/issues/520","name":"https://github.com/cyd01/KiTTY/issues/520","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/advisories/GHSA-45x7-px36-x8w8","name":"https://github.com/advisories/GHSA-45x7-px36-x8w8","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/","name":"FEDORA-2023-55800423a8","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: libssh-0.10.6-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/","name":"FEDORA-2023-e77300e4b5","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/","name":"FEDORA-2023-0733306be9","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://help.panic.com/releasenotes/transmit5/","name":"https://help.panic.com/releasenotes/transmit5/","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/","name":"FEDORA-2023-cb8c606fbb","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16","name":"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES","name":"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT214084","name":"https://support.apple.com/kb/HT214084","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/proftpd/proftpd/issues/456","name":"https://github.com/proftpd/proftpd/issues/456","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/security/cve/cve-2023-48795","name":"https://access.redhat.com/security/cve/cve-2023-48795","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/apache/mina-sshd/issues/445","name":"https://github.com/apache/mina-sshd/issues/445","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/hierynomus/sshj/issues/916","name":"https://github.com/hierynomus/sshj/issues/916","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg","name":"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/janmojzis/tinyssh/issues/81","name":"https://github.com/janmojzis/tinyssh/issues/81","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/","name":"FEDORA-2024-a53b24023d","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: prometheus-podman-exporter-1.7.0-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta","name":"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6","name":"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://matt.ucc.asn.au/dropbear/CHANGES","name":"https://matt.ucc.asn.au/dropbear/CHANGES","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/12/18/3","name":"[oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab","name":"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25","name":"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.theregister.com/2023/12/20/terrapin_attack_ssh","name":"https://www.theregister.com/2023/12/20/terrapin_attack_ssh","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.gentoo.org/920280","name":"https://bugs.gentoo.org/920280","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://crates.io/crates/thrussh/versions","name":"https://crates.io/crates/thrussh/versions","refsource":"","tags":["Release Notes"],"title":"","mime":"inode/x-empty","httpstatus":"404","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html","name":"[debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update","refsource":"","tags":[],"title":"[SECURITY] [DLA 3719-1] phpseclib security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.paramiko.org/changelog.html","name":"https://www.paramiko.org/changelog.html","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20240105-0004/","name":"https://security.netapp.com/advisory/ntap-20240105-0004/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/","name":"FEDORA-2023-153404713b","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","name":"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0","name":"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5","name":"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d","name":"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://news.ycombinator.com/item?id=38685286","name":"https://news.ycombinator.com/item?id=38685286","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"403"},{"url":"https://www.openwall.com/lists/oss-security/2023/12/18/2","name":"https://www.openwall.com/lists/oss-security/2023/12/18/2","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssh.com/txt/release-9.6","name":"https://www.openssh.com/txt/release-9.6","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/","name":"FEDORA-2024-06ebb70bdd","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: podman-4.8.3-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://twitter.com/TrueSkrillor/status/1736774389725565005","name":"https://twitter.com/TrueSkrillor/status/1736774389725565005","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"400","archivestatus":"200"},{"url":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/","name":"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2","name":"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update","name":"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/openssh/openssh-portable/commits/master","name":"https://github.com/openssh/openssh-portable/commits/master","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://nova.app/releases/#v11.8","name":"https://nova.app/releases/#v11.8","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202312-17","name":"GLSA-202312-17","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/","name":"FEDORA-2024-3bb23c77f3","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: podman-4.8.3-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security-tracker.debian.org/tracker/CVE-2023-48795","name":"https://security-tracker.debian.org/tracker/CVE-2023-48795","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://thorntech.com/cve-2023-48795-and-sftp-gateway/","name":"https://thorntech.com/cve-2023-48795-and-sftp-gateway/","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://news.ycombinator.com/item?id=38732005","name":"https://news.ycombinator.com/item?id=38732005","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"403"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/","name":"FEDORA-2024-fb32950d11","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: golang-x-mod-0.14.0-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://ubuntu.com/security/CVE-2023-48795","name":"https://ubuntu.com/security/CVE-2023-48795","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES","name":"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/","name":"FEDORA-2024-7b08207cdb","refsource":"","tags":[],"title":"[SECURITY] Fedora 39 Update: golang-x-crypto-0.18.0-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.bitvise.com/ssh-server-version-history","name":"https://www.bitvise.com/ssh-server-version-history","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/","name":"FEDORA-2023-b87ec6cf47","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254210","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2254210","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2023/dsa-5588","name":"DSA-5588","refsource":"","tags":["Issue Tracking"],"title":"Debian -- Security Information -- DSA-5588-1 putty","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html","name":"[debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update","refsource":"","tags":["Mailing List"],"title":"[SECURITY] [DLA 3694-1] openssh security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6","name":"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://winscp.net/eng/docs/history#6.2.2","name":"https://winscp.net/eng/docs/history#6.2.2","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3","name":"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/","name":"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/NixOS/nixpkgs/pull/275249","name":"https://github.com/NixOS/nixpkgs/pull/275249","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/PowerShell/Win32-OpenSSH/issues/2189","name":"https://github.com/PowerShell/Win32-OpenSSH/issues/2189","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/","name":"FEDORA-2024-3fd1bc9276","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: prometheus-podman-exporter-1.7.0-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC","name":"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC","refsource":"","tags":["Patch"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst","name":"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/","name":"FEDORA-2024-2705241461","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-x-crypto-0.18.0-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2023/dsa-5586","name":"DSA-5586","refsource":"","tags":["Issue Tracking"],"title":"Debian -- Security Information -- DSA-5586-1 openssh","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://gitlab.com/libssh/libssh-mirror/-/tags","name":"https://gitlab.com/libssh/libssh-mirror/-/tags","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mwiede/jsch/pull/461","name":"https://github.com/mwiede/jsch/pull/461","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://filezilla-project.org/versions.php","name":"https://filezilla-project.org/versions.php","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"403","archivestatus":"200"},{"url":"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15","name":"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15","refsource":"","tags":["Product"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.netsarang.com/en/xshell-update-history/","name":"https://www.netsarang.com/en/xshell-update-history/","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssh.com/openbsd.html","name":"https://www.openssh.com/openbsd.html","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22","name":"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/12/19/5","name":"[oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc","name":"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.bitvise.com/ssh-client-version-history#933","name":"https://www.bitvise.com/ssh-client-version-history#933","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/erlang/otp/releases/tag/OTP-26.2.1","name":"https://github.com/erlang/otp/releases/tag/OTP-26.2.1","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html","name":"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html","refsource":"","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openwall.com/lists/oss-security/2023/12/20/3","name":"https://www.openwall.com/lists/oss-security/2023/12/20/3","refsource":"","tags":["Mailing List","Mitigation"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/21","name":"20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/","name":"FEDORA-2024-39a8c72ea9","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: python-paramiko-3.4.0-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/ssh-mitm/ssh-mitm/issues/165","name":"https://github.com/ssh-mitm/ssh-mitm/issues/165","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html","name":"[debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update","refsource":"","tags":[],"title":"[SECURITY] [DLA 3718-1] php-phpseclib security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/12/20/3","name":"[oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)","refsource":"","tags":["Mailing List","Mitigation"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://roumenpetrov.info/secsh/#news20231220","name":"https://roumenpetrov.info/secsh/#news20231220","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.vandyke.com/products/securecrt/history.txt","name":"https://www.vandyke.com/products/securecrt/history.txt","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ","name":"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508","name":"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202312-16","name":"GLSA-202312-16","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1","name":"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://security-tracker.debian.org/tracker/source-package/libssh2","name":"https://security-tracker.debian.org/tracker/source-package/libssh2","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg","name":"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/warp-tech/russh/releases/tag/v0.40.2","name":"https://github.com/warp-tech/russh/releases/tag/v0.40.2","refsource":"","tags":["Release Notes"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/","name":"FEDORA-2024-71c2c6526c","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: putty-0.80-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-48795","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48795","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"2.11.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"sshd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"0.37.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"sshj","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"asyncssh_project","cpe5":"asyncssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bitvise","cpe5":"ssh_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bitvise","cpe5":"ssh_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"connectbot","cpe5":"sshlib","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"crates","cpe5":"thrussh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"crushftp","cpe5":"crushftp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"10.6.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"crushftp","cpe5":"crushftp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dropbear_ssh_project","cpe5":"dropbear_ssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"erlang","cpe5":"erlang\\/otp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"filezilla-project","cpe5":"filezilla_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"12.4","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gentoo","cpe5":"security","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"crypto","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jadaptive","cpe5":"maverick_synergy_java_ssh_api","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"0.76.1.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kitty_project","cpe5":"kitty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lanconfig","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"3.66.4","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lcos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lcos_fx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lcos_lx","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lcos_sx","cpe6":"4.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"lancom-systems","cpe5":"lcos_sx","cpe6":"5.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libssh","cpe5":"libssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libssh2","cpe5":"libssh2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"matez","cpe5":"jsch","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"11.1.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"powershell","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"net-ssh","cpe5":"net-ssh","cpe6":"7.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"ruby","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"2.7.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netgate","cpe5":"pfsense_ce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"23.09.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netgate","cpe5":"pfsense_plus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netsarang","cpe5":"xshell_7","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openbsd","cpe5":"openssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oryx-embedded","cpe5":"cyclone_ssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"panic","cpe5":"nova","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"panic","cpe5":"transmit_5","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"paramiko","cpe5":"paramiko","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"1.3.8b","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"proftpd","cpe5":"proftpd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"putty","cpe5":"putty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"advanced_cluster_security","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"advanced_cluster_security","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ceph_storage","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"cert-manager_operator_for_red_hat_openshift","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"discovery","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"keycloak","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_api_for_data_protection","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_container_platform","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_data_foundation","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_developer_tools_and_services","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_dev_spaces","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_gitops","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_pipelines","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_serverless","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_virtualization","cpe6":"4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"16.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"16.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack_platform","cpe6":"17.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"single_sign-on","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"storage","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"roumenpetrov","cpe5":"pkixssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"russh_project","cpe5":"russh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"rust","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sftpgo_project","cpe5":"sftpgo","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ssh","cpe5":"ssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"1.11.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ssh2_project","cpe5":"ssh2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"5.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tera_term_project","cpe5":"tera_term","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"thorntech","cpe5":"sftp_gateway_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"20230101","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tinyssh","cpe5":"tinyssh","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trilead","cpe5":"ssh2","cpe6":"6401","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vandyke","cpe5":"securecrt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"48795","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"winscp","cpe5":"winscp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-48795","qid":"161329","title":"Oracle Enterprise Linux Security Update for libssh (ELSA-2024-0628)"},{"cve":"CVE-2023-48795","qid":"161330","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-0606)"},{"cve":"CVE-2023-48795","qid":"161350","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12158)"},{"cve":"CVE-2023-48795","qid":"161351","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12157)"},{"cve":"CVE-2023-48795","qid":"161357","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12164)"},{"cve":"CVE-2023-48795","qid":"161396","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-1130)"},{"cve":"CVE-2023-48795","qid":"161405","title":"Oracle Enterprise Linux Security Update for buildah (ELSA-2024-1150)"},{"cve":"CVE-2023-48795","qid":"161419","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12233)"},{"cve":"CVE-2023-48795","qid":"161420","title":"Oracle Enterprise Linux Security Update for openssh (ELSA-2024-12232)"},{"cve":"CVE-2023-48795","qid":"200017","title":"Ubuntu Security Notification for libssh Vulnerability (USN-6561-1)"},{"cve":"CVE-2023-48795","qid":"200018","title":"Ubuntu Security Notification for OpenSSH Vulnerabilities (USN-6560-1)"},{"cve":"CVE-2023-48795","qid":"200041","title":"Ubuntu Security Notification for OpenSSH Vulnerabilities (USN-6560-2)"},{"cve":"CVE-2023-48795","qid":"200046","title":"Ubuntu Security Notification for libssh2 Vulnerability (USN-6585-1)"},{"cve":"CVE-2023-48795","qid":"200057","title":"Ubuntu Security Notification for FileZilla Vulnerability (USN-6589-1)"},{"cve":"CVE-2023-48795","qid":"200069","title":"Ubuntu Security Notification for Paramiko Vulnerability (USN-6598-1)"},{"cve":"CVE-2023-48795","qid":"242764","title":"Red Hat Update for libssh (RHSA-2024:0499)"},{"cve":"CVE-2023-48795","qid":"242766","title":"Red Hat Update for libssh (RHSA-2024:0538)"},{"cve":"CVE-2023-48795","qid":"242805","title":"Red Hat Update for openssh (RHSA-2024:0606)"},{"cve":"CVE-2023-48795","qid":"242811","title":"Red Hat Update for libssh (RHSA-2024:0625)"},{"cve":"CVE-2023-48795","qid":"242814","title":"Red Hat Update for libssh (RHSA-2024:0628)"},{"cve":"CVE-2023-48795","qid":"242828","title":"Red Hat Update for openssh (RHSA-2024:0594)"},{"cve":"CVE-2023-48795","qid":"242841","title":"Red Hat Update for openssh (RHSA-2024:0455)"},{"cve":"CVE-2023-48795","qid":"242848","title":"Red Hat Update for openssh (RHSA-2024:0429)"},{"cve":"CVE-2023-48795","qid":"242989","title":"Red Hat OpenShift Container Platform 4.15 Security Update (RHSA-2023:7201)"},{"cve":"CVE-2023-48795","qid":"243017","title":"Red Hat Update for openssh (RHSA-2024:1130)"},{"cve":"CVE-2023-48795","qid":"243033","title":"Red Hat Update for buildah (RHSA-2024:1150)"},{"cve":"CVE-2023-48795","qid":"243042","title":"Red Hat Update for JBoss Enterprise Application Platform 8.0.1 (RHSA-2024:1193)"},{"cve":"CVE-2023-48795","qid":"243043","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4 (RHSA-2024:1196)"},{"cve":"CVE-2023-48795","qid":"243044","title":"Red Hat Update for JBoss Enterprise Application Platform 8.0.1 (RHSA-2024:1192)"},{"cve":"CVE-2023-48795","qid":"243173","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:1676)"},{"cve":"CVE-2023-48795","qid":"243174","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:1675)"},{"cve":"CVE-2023-48795","qid":"243175","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:1674)"},{"cve":"CVE-2023-48795","qid":"284839","title":"Fedora Security Update for podman (FEDORA-2023-cb8c606fbb)"},{"cve":"CVE-2023-48795","qid":"284840","title":"Fedora Security Update for proftpd (FEDORA-2023-b87ec6cf47)"},{"cve":"CVE-2023-48795","qid":"284849","title":"Fedora Security Update for putty (FEDORA-2024-71c2c6526c)"},{"cve":"CVE-2023-48795","qid":"284850","title":"Fedora Security Update for python (FEDORA-2024-39a8c72ea9)"},{"cve":"CVE-2023-48795","qid":"284862","title":"Fedora Security Update for golang (FEDORA-2024-ae653fb07b)"},{"cve":"CVE-2023-48795","qid":"284864","title":"Fedora Security Update for golang (FEDORA-2024-2705241461)"},{"cve":"CVE-2023-48795","qid":"284870","title":"Fedora Security Update for podman (FEDORA-2024-06ebb70bdd)"},{"cve":"CVE-2023-48795","qid":"284889","title":"Fedora Security Update for prometheus (FEDORA-2024-3fd1bc9276)"},{"cve":"CVE-2023-48795","qid":"285023","title":"Fedora Security Update for prometheus (FEDORA-2024-a53b24023d)"},{"cve":"CVE-2023-48795","qid":"285053","title":"Fedora Security Update for golang (FEDORA-2024-fb32950d11)"},{"cve":"CVE-2023-48795","qid":"285055","title":"Fedora Security Update for golang (FEDORA-2024-7b08207cdb)"},{"cve":"CVE-2023-48795","qid":"285066","title":"Fedora Security Update for podman (FEDORA-2024-3bb23c77f3)"},{"cve":"CVE-2023-48795","qid":"285068","title":"Fedora Security Update for putty (FEDORA-2024-d946b9ad25)"},{"cve":"CVE-2023-48795","qid":"285075","title":"Fedora Security Update for python (FEDORA-2023-e77300e4b5)"},{"cve":"CVE-2023-48795","qid":"285076","title":"Fedora Security Update for proftpd (FEDORA-2023-153404713b)"},{"cve":"CVE-2023-48795","qid":"285080","title":"Fedora Security Update for podman (FEDORA-2023-20feb865d8)"},{"cve":"CVE-2023-48795","qid":"285088","title":"Fedora Security Update for libssh (FEDORA-2023-0733306be9)"},{"cve":"CVE-2023-48795","qid":"296108","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 66.164.1 Missing (CPUJAN2024)"},{"cve":"CVE-2023-48795","qid":"330166","title":"IBM Advanced Interactive eXecutive (AIX) Multiple Vulnerabilities (openssh_advisory16)"},{"cve":"CVE-2023-48795","qid":"356793","title":"Amazon Linux Security Advisory for openssh : ALAS2-2023-2376"},{"cve":"CVE-2023-48795","qid":"356794","title":"Amazon Linux Security Advisory for openssh : ALAS2023-2023-462"},{"cve":"CVE-2023-48795","qid":"356795","title":"Amazon Linux Security Advisory for openssh : ALAS-2023-1898"},{"cve":"CVE-2023-48795","qid":"356999","title":"Amazon Linux Security Advisory for openssh : AL2012-2023-483"},{"cve":"CVE-2023-48795","qid":"379295","title":"Putty Terrapin Attack SSH Connection Weakening Vulnerability"},{"cve":"CVE-2023-48795","qid":"379302","title":"Windows Secure Copy (WinSCP) Security Update"},{"cve":"CVE-2023-48795","qid":"379344","title":"Alibaba Cloud Linux Security Update for libssh (ALINUX3-SA-2024:0014)"},{"cve":"CVE-2023-48795","qid":"379366","title":"Fortinet FortiAnalyzer and FortiManager - Improper Access Control Vulnerability (FG-IR-23-490)"},{"cve":"CVE-2023-48795","qid":"379473","title":"Jenkins Plugins Multiple Security Vulnerabilities (Jenkins Security Advisory 2024-03-06)"},{"cve":"CVE-2023-48795","qid":"379478","title":"Apple macOS Sonoma 14.4 Not Installed (HT214084)"},{"cve":"CVE-2023-48795","qid":"38913","title":"SSH Prefix Truncation Vulnerability (Terrapin)"},{"cve":"CVE-2023-48795","qid":"44169","title":"Juniper Network Operating System (Junos OS) Terrapin Attack SSH Connection Weakening Vulnerability (JSA76462)"},{"cve":"CVE-2023-48795","qid":"503807","title":"Alpine Linux Security Update for dropbear"},{"cve":"CVE-2023-48795","qid":"503809","title":"Alpine Linux Security Update for libssh2"},{"cve":"CVE-2023-48795","qid":"503855","title":"Alpine Linux Security Update for proftpd"},{"cve":"CVE-2023-48795","qid":"503904","title":"Alpine Linux Security Update for dropbear"},{"cve":"CVE-2023-48795","qid":"504326","title":"Alpine Linux Security Update for putty"},{"cve":"CVE-2023-48795","qid":"505868","title":"Alpine Linux Security Update for dropbear"},{"cve":"CVE-2023-48795","qid":"505888","title":"Alpine Linux Security Update for libssh2"},{"cve":"CVE-2023-48795","qid":"505902","title":"Alpine Linux Security Update for openssh"},{"cve":"CVE-2023-48795","qid":"505986","title":"Alpine Linux Security Update for buildah"},{"cve":"CVE-2023-48795","qid":"506001","title":"Alpine Linux Security Update for doctl"},{"cve":"CVE-2023-48795","qid":"506043","title":"Alpine Linux Security Update for erlang"},{"cve":"CVE-2023-48795","qid":"506053","title":"Alpine Linux Security Update for filezilla"},{"cve":"CVE-2023-48795","qid":"506076","title":"Alpine Linux Security Update for gitea"},{"cve":"CVE-2023-48795","qid":"506112","title":"Alpine Linux Security Update for libssh"},{"cve":"CVE-2023-48795","qid":"506157","title":"Alpine Linux Security Update for pijul"},{"cve":"CVE-2023-48795","qid":"506158","title":"Alpine Linux Security Update for podman-tui"},{"cve":"CVE-2023-48795","qid":"506161","title":"Alpine Linux Security Update for podman"},{"cve":"CVE-2023-48795","qid":"506169","title":"Alpine Linux Security Update for py3-asyncssh"},{"cve":"CVE-2023-48795","qid":"506178","title":"Alpine Linux Security Update for py3-paramiko"},{"cve":"CVE-2023-48795","qid":"506261","title":"Alpine Linux Security Update for tinyssh"},{"cve":"CVE-2023-48795","qid":"510674","title":"Alpine Linux Security Update for nebula"},{"cve":"CVE-2023-48795","qid":"510681","title":"Alpine Linux Security Update for openssh"},{"cve":"CVE-2023-48795","qid":"510754","title":"Alpine Linux Security Update for openssh"},{"cve":"CVE-2023-48795","qid":"510755","title":"Alpine Linux Security Update for putty"},{"cve":"CVE-2023-48795","qid":"6000398","title":"Debian Security Update for openssh (DSA 5586-1)"},{"cve":"CVE-2023-48795","qid":"6000402","title":"Debian Security Update for putty (DSA 5588-1)"},{"cve":"CVE-2023-48795","qid":"6000403","title":"Debian Security Update for openssh (DLA 3694-1)"},{"cve":"CVE-2023-48795","qid":"6000408","title":"Debian Security Update for libssh (DSA 5591-1)"},{"cve":"CVE-2023-48795","qid":"6000430","title":"Debian Security Update for php-phpseclib3 (DSA 5601-1)"},{"cve":"CVE-2023-48795","qid":"6000431","title":"Debian Security Update for phpseclib (DSA 5599-1)"},{"cve":"CVE-2023-48795","qid":"6000432","title":"Debian Security Update for php-phpseclib (DSA 5600-1)"},{"cve":"CVE-2023-48795","qid":"6000445","title":"Debian Security Update for php-phpseclib (DLA 3718-1)"},{"cve":"CVE-2023-48795","qid":"6000446","title":"Debian Security Update for phpseclib (DLA 3719-1)"},{"cve":"CVE-2023-48795","qid":"6000460","title":"Debian Security Update for python-asyncssh (DLA 3730-1)"},{"cve":"CVE-2023-48795","qid":"673335","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1316)"},{"cve":"CVE-2023-48795","qid":"673339","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1217)"},{"cve":"CVE-2023-48795","qid":"673381","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1338)"},{"cve":"CVE-2023-48795","qid":"673413","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1183)"},{"cve":"CVE-2023-48795","qid":"673430","title":"EulerOS Security Update for proftpd (EulerOS-SA-2024-1323)"},{"cve":"CVE-2023-48795","qid":"673454","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1239)"},{"cve":"CVE-2023-48795","qid":"673471","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1339)"},{"cve":"CVE-2023-48795","qid":"673472","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1197)"},{"cve":"CVE-2023-48795","qid":"673543","title":"EulerOS Security Update for proftpd (EulerOS-SA-2024-1222)"},{"cve":"CVE-2023-48795","qid":"673551","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1317)"},{"cve":"CVE-2023-48795","qid":"673621","title":"EulerOS Security Update for proftpd (EulerOS-SA-2024-1244)"},{"cve":"CVE-2023-48795","qid":"673655","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1203)"},{"cve":"CVE-2023-48795","qid":"673667","title":"EulerOS Security Update for python-paramiko (EulerOS-SA-2024-1224)"},{"cve":"CVE-2023-48795","qid":"673686","title":"EulerOS Security Update for proftpd (EulerOS-SA-2024-1345)"},{"cve":"CVE-2023-48795","qid":"673750","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1216)"},{"cve":"CVE-2023-48795","qid":"673780","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1178)"},{"cve":"CVE-2023-48795","qid":"673785","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1177)"},{"cve":"CVE-2023-48795","qid":"673788","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1321)"},{"cve":"CVE-2023-48795","qid":"673811","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1286)"},{"cve":"CVE-2023-48795","qid":"673872","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1343)"},{"cve":"CVE-2023-48795","qid":"673894","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1241)"},{"cve":"CVE-2023-48795","qid":"673897","title":"EulerOS Security Update for libssh2 (EulerOS-SA-2024-1198)"},{"cve":"CVE-2023-48795","qid":"673937","title":"EulerOS Security Update for openssh (EulerOS-SA-2024-1219)"},{"cve":"CVE-2023-48795","qid":"673955","title":"EulerOS Security Update for python-paramiko (EulerOS-SA-2024-1246)"},{"cve":"CVE-2023-48795","qid":"674082","title":"EulerOS Security Update for libssh (EulerOS-SA-2024-1238)"},{"cve":"CVE-2023-48795","qid":"691379","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for putty (91955195-9ebb-11ee-bc14-a703705db3a6)"},{"cve":"CVE-2023-48795","qid":"691381","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for nebula (0f7598cc-9fe2-11ee-b47f-901b0e9408dc)"},{"cve":"CVE-2023-48795","qid":"691386","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for Free Berkeley Software Distribution (FreeBSD) (13d83980-9f18-11ee-8e38-002590c1f29c)"},{"cve":"CVE-2023-48795","qid":"691404","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for rclone (b5e22ec5-bc4b-11ee-b0b5-b42e991fc52e)"},{"cve":"CVE-2023-48795","qid":"710817","title":"Gentoo Linux libssh Multiple Vulnerabilities (GLSA 202312-16)"},{"cve":"CVE-2023-48795","qid":"710818","title":"Gentoo Linux OpenSSH Multiple Vulnerabilities (GLSA 202312-17)"},{"cve":"CVE-2023-48795","qid":"731307","title":"Palo Alto Networks (PAN-OS)Impact of Terrapin SSH Attack Vulnerability (PAN-241547, CGSDW-19542)"},{"cve":"CVE-2023-48795","qid":"755496","title":"SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2023:4905-1)"},{"cve":"CVE-2023-48795","qid":"755497","title":"SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2023:4904-1)"},{"cve":"CVE-2023-48795","qid":"755498","title":"SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2023:4903-1)"},{"cve":"CVE-2023-48795","qid":"755499","title":"SUSE Enterprise Linux Security Update for openssh (SUSE-SU-2023:4902-1)"},{"cve":"CVE-2023-48795","qid":"755517","title":"SUSE Enterprise Linux Security Update for libssh2_org (SUSE-SU-2023:4946-1)"},{"cve":"CVE-2023-48795","qid":"755553","title":"SUSE Enterprise Linux Security Update for libssh2_org (SUSE-SU-2024:0006-1)"},{"cve":"CVE-2023-48795","qid":"755579","title":"SUSE Enterprise Linux Security Update for python-paramiko (SUSE-SU-2024:0035-1)"},{"cve":"CVE-2023-48795","qid":"755645","title":"SUSE Enterprise Linux Security Update for erlang (SUSE-SU-2024:0210-1)"},{"cve":"CVE-2023-48795","qid":"755655","title":"SUSE Enterprise Linux Security Update for apache-parent, apache-sshd (SUSE-SU-2024:0224-1)"},{"cve":"CVE-2023-48795","qid":"755708","title":"SUSE Enterprise Linux Security Update for bouncycastle, jsch (SUSE-SU-2024:0327-1)"},{"cve":"CVE-2023-48795","qid":"755732","title":"SUSE Enterprise Linux Security Update for cosign (SUSE-SU-2024:0430-1)"},{"cve":"CVE-2023-48795","qid":"755745","title":"SUSE Enterprise Linux Security Update for rekor (SUSE-SU-2024:0460-1)"},{"cve":"CVE-2023-48795","qid":"755791","title":"SUSE Enterprise Linux Security Update for libssh2_org (SUSE-SU-2024:0543-1)"},{"cve":"CVE-2023-48795","qid":"755792","title":"SUSE Enterprise Linux Security Update for libssh2_org (SUSE-SU-2024:0558-1)"},{"cve":"CVE-2023-48795","qid":"755806","title":"SUSE Enterprise Linux Security Update for libssh (SUSE-SU-2024:0539-1)"},{"cve":"CVE-2023-48795","qid":"755989","title":"SUSE Enterprise Linux Security Update for jsch-agent-proxy (SUSE-SU-2024:0974-1)"},{"cve":"CVE-2023-48795","qid":"755991","title":"SUSE Enterprise Linux Security Update for jbcrypt, trilead-ssh2 (SUSE-SU-2024:0972-1)"},{"cve":"CVE-2023-48795","qid":"770234","title":"Red Hat OpenShift Container Platform 4.15 Security Update (RHSA-2023:7201)"},{"cve":"CVE-2023-48795","qid":"907717","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libssh (32200-1)"},{"cve":"CVE-2023-48795","qid":"907796","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for jsch (32259-2)"},{"cve":"CVE-2023-48795","qid":"907806","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for openssh (32204-1)"},{"cve":"CVE-2023-48795","qid":"907822","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-engine (32280-2)"},{"cve":"CVE-2023-48795","qid":"907868","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-cli (32223-1)"},{"cve":"CVE-2023-48795","qid":"907970","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for erlang (32196-1)"},{"cve":"CVE-2023-48795","qid":"907979","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libssh2 (32201-1)"},{"cve":"CVE-2023-48795","qid":"907980","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cert-manager (32195-1)"},{"cve":"CVE-2023-48795","qid":"907991","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nmap (32202-1)"},{"cve":"CVE-2023-48795","qid":"941560","title":"AlmaLinux Security Update for openssh (ALSA-2024:0606)"},{"cve":"CVE-2023-48795","qid":"941563","title":"AlmaLinux Security Update for libssh (ALSA-2024:0628)"},{"cve":"CVE-2023-48795","qid":"941611","title":"AlmaLinux Security Update for buildah (ALSA-2024:1150)"},{"cve":"CVE-2023-48795","qid":"941612","title":"AlmaLinux Security Update for openssh (ALSA-2024:1130)"},{"cve":"CVE-2023-48795","qid":"961110","title":"Rocky Linux Security Update for openssh (RLSA-2024:0606)"},{"cve":"CVE-2023-48795","qid":"961112","title":"Rocky Linux Security Update for libssh (RLSA-2024:0628)"},{"cve":"CVE-2023-48795","qid":"996349","title":"GO (Go) Security Update for golang.org/x/crypto (GHSA-45x7-px36-x8w8)"},{"cve":"CVE-2023-48795","qid":"996375","title":"Rust (Rust) Security Update for golang.org/x/crypto (GHSA-45x7-px36-x8w8)"},{"cve":"CVE-2023-48795","qid":"996391","title":"Python (Pip) Security Update for golang.org/x/crypto (GHSA-45x7-px36-x8w8)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2023-12-18 16:15:00","lastModifiedDate":"2024-03-13 21:15:00","problem_types":["CWE-354"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","versionEndExcluding":"9.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*","versionEndExcluding":"0.80","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*","versionEndExcluding":"3.66.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*","versionEndIncluding":"11.1.0","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*","versionEndExcluding":"11.8","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*","versionEndExcluding":"14.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*","versionEndExcluding":"9.33","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*","versionEndExcluding":"9.32","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*","versionEndIncluding":"3.66.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*","versionEndExcluding":"0.10.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*","versionEndIncluding":"1.11.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.8b","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"12.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*","versionEndExcluding":"0.35.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*","versionEndIncluding":"5.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*","versionEndIncluding":"10.6.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*","versionEndExcluding":"build__0144","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*","versionEndExcluding":"0.17.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*","versionEndExcluding":"0.40.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*","versionEndExcluding":"26.2.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:matez:jsch:*:*:*:*:*:*:*:*","versionEndExcluding":"0.2.15","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*","versionEndExcluding":"1.11.10","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*","versionEndExcluding":"2.14.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*","versionEndExcluding":"2022.83","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jadaptive:maverick_synergy_java_ssh_api:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1.0-snapshot","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*","versionEndExcluding":"5.11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:thorntech:sftp_gateway_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*","versionEndIncluding":"23.09.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*","versionEndIncluding":"2.7.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*","versionEndExcluding":"10.6.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:connectbot:sshlib:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.22","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:sshd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.11.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:sshj:*:*:*:*:*:*:*:*","versionEndIncluding":"0.37.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tinyssh:tinyssh:*:*:*:*:*:*:*:*","versionEndIncluding":"20230101","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trilead:ssh2:6401:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kitty_project:kitty:*:*:*:*:*:*:*:*","versionEndIncluding":"0.76.1.13","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gentoo:security:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}