[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-7855":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":49,"name":50,"published":51,"updated":34},7855,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":43,"epss_score":44,"epss_percentile":45,"cve":46,"in_cisa_catalog":48,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"medium","The flaw exists in the process_open function in sftp-server.c script which does not properly prevent write operations in readonly mode. Successfully exploiting this issue allows local users to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks.","OpenSSH is prone to a security bypass vulnerability.","Update to version 7.6 or later.",[40,41,42],"https://www.openssh.com/txt/release-7.6","http://www.securityfocus.com/bid/101552","https://github.com/openbsd/src/commit/a6981567e8e",5.3,0.02659,0.85741,[47],"CVE-2017-15906",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.812050","OpenSSH \u003C 7.6 sftp-server Security Bypass Vulnerability - Windows","2018-01-02T00:00:00Z"]