An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
{ "versions": [ { "introduced": "0" }, { "fixed": "2.14.1" } ] }
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46446.json"