Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-libs/libssh2@0.7.3
Typeebuild
Namespacenet-libs
Namelibssh2
Version0.7.3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.7.0
Latest_non_vulnerable_version1.7.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cmy6-8sjv-n3h1
vulnerability_id VCID-cmy6-8sjv-n3h1
summary
Exposure of Sensitive Information to an Unauthorized Actor
The diffie_hellman_sha256 function in kex.c in libssh2 improperly truncates secrets to bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177980.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178573.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0787.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0787.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0787
reference_id
reference_type
scores
0
value 0.03147
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-21T12:55:00Z
1
value 0.03147
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-16T12:55:00Z
2
value 0.03147
scoring_system epss
scoring_elements 0.86836
published_at 2026-04-01T12:55:00Z
3
value 0.03147
scoring_system epss
scoring_elements 0.86846
published_at 2026-04-02T12:55:00Z
4
value 0.03147
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-04T12:55:00Z
5
value 0.03147
scoring_system epss
scoring_elements 0.86859
published_at 2026-04-07T12:55:00Z
6
value 0.03147
scoring_system epss
scoring_elements 0.86879
published_at 2026-04-08T12:55:00Z
7
value 0.03147
scoring_system epss
scoring_elements 0.86887
published_at 2026-04-09T12:55:00Z
8
value 0.03147
scoring_system epss
scoring_elements 0.869
published_at 2026-04-11T12:55:00Z
9
value 0.03147
scoring_system epss
scoring_elements 0.86895
published_at 2026-04-12T12:55:00Z
10
value 0.03147
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0787
5
reference_url https://bto.bluecoat.com/security-advisory/sa120
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa120
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
7
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10156
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10156
8
reference_url https://puppet.com/security/cve/CVE-2016-0787
reference_id
reference_type
scores
url https://puppet.com/security/cve/CVE-2016-0787
9
reference_url https://www.libssh2.org/adv_20160223.html
reference_id
reference_type
scores
url https://www.libssh2.org/adv_20160223.html
10
reference_url https://www.libssh2.org/CVE-2016-0787.patch
reference_id
reference_type
scores
url https://www.libssh2.org/CVE-2016-0787.patch
11
reference_url http://www.debian.org/security/2016/dsa-3487
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3487
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
13
reference_url http://www.securityfocus.com/bid/82514
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82514
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1306021
reference_id 1306021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1306021
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815662
reference_id 815662
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815662
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0787
reference_id CVE-2016-0787
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0787
23
reference_url https://security.gentoo.org/glsa/201606-12
reference_id GLSA-201606-12
reference_type
scores
url https://security.gentoo.org/glsa/201606-12
24
reference_url https://access.redhat.com/errata/RHSA-2016:0428
reference_id RHSA-2016:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0428
fixed_packages
0
url pkg:ebuild/net-libs/libssh2@0.7.3
purl pkg:ebuild/net-libs/libssh2@0.7.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@0.7.3
1
url pkg:ebuild/net-libs/libssh2@1.7.0
purl pkg:ebuild/net-libs/libssh2@1.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@1.7.0
aliases CVE-2016-0787
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmy6-8sjv-n3h1
1
url VCID-h9rm-4eet-vuhq
vulnerability_id VCID-h9rm-4eet-vuhq
summary
Multiple vulnerabilities have been found in libssh and libssh2, the
    worst of which allows remote attackers to cause Denial of Service.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0566.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0566.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0739.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0739
reference_id
reference_type
scores
0
value 0.04313
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-21T12:55:00Z
1
value 0.04313
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-16T12:55:00Z
2
value 0.04313
scoring_system epss
scoring_elements 0.88909
published_at 2026-04-18T12:55:00Z
3
value 0.04313
scoring_system epss
scoring_elements 0.88842
published_at 2026-04-01T12:55:00Z
4
value 0.04313
scoring_system epss
scoring_elements 0.88851
published_at 2026-04-02T12:55:00Z
5
value 0.04313
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-04T12:55:00Z
6
value 0.04313
scoring_system epss
scoring_elements 0.88869
published_at 2026-04-07T12:55:00Z
7
value 0.04313
scoring_system epss
scoring_elements 0.88886
published_at 2026-04-08T12:55:00Z
8
value 0.04313
scoring_system epss
scoring_elements 0.88891
published_at 2026-04-09T12:55:00Z
9
value 0.04313
scoring_system epss
scoring_elements 0.88903
published_at 2026-04-11T12:55:00Z
10
value 0.04313
scoring_system epss
scoring_elements 0.88898
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://puppet.com/security/cve/CVE-2016-0739
reference_id
reference_type
scores
url https://puppet.com/security/cve/CVE-2016-0739
9
reference_url https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
reference_id
reference_type
scores
url https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
10
reference_url https://www.libssh.org/security/advisories/CVE-2016-0739.txt
reference_id
reference_type
scores
url https://www.libssh.org/security/advisories/CVE-2016-0739.txt
11
reference_url http://www.debian.org/security/2016/dsa-3488
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3488
12
reference_url http://www.ubuntu.com/usn/USN-2912-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2912-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1305971
reference_id 1305971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1305971
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815663
reference_id 815663
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815663
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0739
reference_id CVE-2016-0739
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0739
25
reference_url https://security.gentoo.org/glsa/201606-12
reference_id GLSA-201606-12
reference_type
scores
url https://security.gentoo.org/glsa/201606-12
26
reference_url https://access.redhat.com/errata/RHSA-2016:0566
reference_id RHSA-2016:0566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0566
27
reference_url https://usn.ubuntu.com/2912-1/
reference_id USN-2912-1
reference_type
scores
url https://usn.ubuntu.com/2912-1/
fixed_packages
0
url pkg:ebuild/net-libs/libssh2@0.7.3
purl pkg:ebuild/net-libs/libssh2@0.7.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@0.7.3
1
url pkg:ebuild/net-libs/libssh2@1.7.0
purl pkg:ebuild/net-libs/libssh2@1.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@1.7.0
aliases CVE-2016-0739
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9rm-4eet-vuhq
2
url VCID-vytb-d923-nkan
vulnerability_id VCID-vytb-d923-nkan
summary
Multiple vulnerabilities have been found in libssh and libssh2, the
    worst of which allows remote attackers to cause Denial of Service.
references
0
reference_url http://advisories.mageia.org/MGASA-2015-0014.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2015-0014.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8132
reference_id
reference_type
scores
0
value 0.03289
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-21T12:55:00Z
1
value 0.03289
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-01T12:55:00Z
2
value 0.03289
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-02T12:55:00Z
3
value 0.03289
scoring_system epss
scoring_elements 0.87174
published_at 2026-04-04T12:55:00Z
4
value 0.03289
scoring_system epss
scoring_elements 0.87171
published_at 2026-04-07T12:55:00Z
5
value 0.03289
scoring_system epss
scoring_elements 0.87192
published_at 2026-04-08T12:55:00Z
6
value 0.03289
scoring_system epss
scoring_elements 0.87198
published_at 2026-04-09T12:55:00Z
7
value 0.03289
scoring_system epss
scoring_elements 0.8721
published_at 2026-04-11T12:55:00Z
8
value 0.03289
scoring_system epss
scoring_elements 0.87204
published_at 2026-04-12T12:55:00Z
9
value 0.03289
scoring_system epss
scoring_elements 0.872
published_at 2026-04-13T12:55:00Z
10
value 0.03289
scoring_system epss
scoring_elements 0.87215
published_at 2026-04-16T12:55:00Z
11
value 0.03289
scoring_system epss
scoring_elements 0.8722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8132
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1158089
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1158089
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
8
reference_url http://secunia.com/advisories/60838
reference_id
reference_type
scores
url http://secunia.com/advisories/60838
9
reference_url http://www.debian.org/security/2016/dsa-3488
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3488
10
reference_url http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
reference_id
reference_type
scores
url http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:020
12
reference_url http://www.ubuntu.com/usn/USN-2478-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2478-1
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773577
reference_id 773577
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773577
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.5.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libssh:libssh:0.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libssh:libssh:0.6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8132
reference_id CVE-2014-8132
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8132
35
reference_url https://security.gentoo.org/glsa/201606-12
reference_id GLSA-201606-12
reference_type
scores
url https://security.gentoo.org/glsa/201606-12
36
reference_url https://usn.ubuntu.com/2478-1/
reference_id USN-2478-1
reference_type
scores
url https://usn.ubuntu.com/2478-1/
fixed_packages
0
url pkg:ebuild/net-libs/libssh2@0.7.3
purl pkg:ebuild/net-libs/libssh2@0.7.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@0.7.3
1
url pkg:ebuild/net-libs/libssh2@1.7.0
purl pkg:ebuild/net-libs/libssh2@1.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@1.7.0
aliases CVE-2014-8132
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vytb-d923-nkan
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/libssh2@0.7.3