8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.7 High
AI Score
Confidence
Low
0.963 High
EPSS
Percentile
99.5%
A vulnerability in the SSH protocol implementation is related to the ability to adjust packet sequence numbers during the connection negotiation process and remove an arbitrary number of SSH service messages.
during the connection negotiation process and cause an arbitrary number of SSH service messages to be deleted.
Exploitation of the vulnerability could allow a remote attacker to bypass integrity checks,
disable existing security features, and gain unauthorized access to protected information
Vulnerability in the Podman OCI container management and launching software tool is related to errors in privilege management.
privilege management. Exploitation of the vulnerability could allow an attacker acting remotely,
escalate privileges
8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.7 High
AI Score
Confidence
Low
0.963 High
EPSS
Percentile
99.5%