CVE-2025-22869

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

  • T

    Tim Bastin detected CVE-2025-22869 with a risk of 2.12

  • logo

    System updated the risk assessment from 2.12 to 1.41

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.41 to 4.25

    System recalculated raw risk assessment

  • T

    Tim Bastin detected CVE-2025-22869 with scanner: container-scanning

  • logo

    System updated the risk assessment from 4.25 to 0.86

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 0.86 to 1.41

    System recalculated raw risk assessment

  • logo

    System created a ticket for CVE-2025-22869

    Everything after this entry will be synced with the external system. The ticket can be found at https://gitlab.opencode.de/open-code/badgebackend/badge-api/-/issues/14

Add a comment

Mark as False Positive
Comment will be synced with https://gitlab.opencode.de/open-code/badgebackend/badge-api/-/issues/14
Last calculated at:

Affected component

Logo von golang golang.org/x/crypto

Installed version:
0.32.0
Fixed in:
v0.35.0

Quick Fix

Update all Dependencies
Update only golang.org/x/crypto
Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 667098114b5ef45c7830e7aa599604fa65eb818f