Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2002-1715 | 1 Ssh | 2 Ssh, Ssh2 | 2024-11-20 | 7.2 HIGH | N/A |
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access. | |||||
CVE-2002-1645 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 10.0 HIGH | N/A |
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL. | |||||
CVE-2002-1644 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 7.2 HIGH | N/A |
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges. | |||||
CVE-2001-0364 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 5.0 MEDIUM | N/A |
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections. | |||||
CVE-2000-0217 | 2 Openbsd, Ssh | 3 Openssh, Ssh, Ssh2 | 2024-11-20 | 5.1 MEDIUM | N/A |
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. | |||||
CVE-1999-1231 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 5.0 MEDIUM | N/A |
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server. | |||||
CVE-1999-1159 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 4.6 MEDIUM | N/A |
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root. | |||||
CVE-1999-1029 | 1 Ssh | 1 Ssh2 | 2024-11-20 | 7.5 HIGH | N/A |
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs. | |||||
CVE-1999-0398 | 1 Ssh | 2 Ssh, Ssh2 | 2024-11-20 | 4.6 MEDIUM | N/A |
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. |