{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T18:23:54.478","vulnerabilities":[{"cve":{"id":"CVE-2020-36617","sourceIdentifier":"cna@vuldb.com","published":"2022-12-18T15:15:09.950","lastModified":"2024-11-21T05:29:54.057","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"cna@vuldb.com","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models."},{"lang":"es","value":"** EN DISPUTA** Se encontró una vulnerabilidad en ewxrjk sftpserver. Ha sido declarada problemática. La función sftp_parse_path del archivo parse.c es afectada por esta vulnerabilidad. La manipulación conduce a un puntero no inicializado. Por el momento todavía se duda de la existencia real de esta vulnerabilidad. El nombre del parche es bf4032f34832ee11d79aa60a226cc018e7ec5eed. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asignó el identificador VDB-216205. NOTA: En algunos modelos de implementación, esto sería una vulnerabilidad. README advierte específicamente sobre evitar tales modelos de implementación."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-908"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:greenend:sftpserver:*:*:*:*:*:*:*:*","versionEndExcluding":"2","matchCriteriaId":"5AD03389-1F21-4D17-A83B-8F1019364E21"}]}]}],"references":[{"url":"https://github.com/ewxrjk/sftpserver/commit/bf4032f34832ee11d79aa60a226cc018e7ec5eed","source":"cna@vuldb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?id.216205","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/ewxrjk/sftpserver/commit/bf4032f34832ee11d79aa60a226cc018e7ec5eed","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?id.216205","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}