Lucene search

K
OpenbsdOpenssh

118 matches found

CVE
CVE
added 2004/08/18 4:0 a.m.70 views

CVE-2004-0175

Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.

4.3CVSS9.4AI score0.02826EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.69 views

CVE-2001-0816

OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.

7.5CVSS9.1AI score0.00233EPSS
CVE
CVE
added 2003/07/02 4:0 a.m.67 views

CVE-2003-0386

OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.

7.5CVSS7.9AI score0.14245EPSS
CVE
CVE
added 2003/11/17 5:0 a.m.65 views

CVE-2003-0787

The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.

7.5CVSS9.5AI score0.00471EPSS
CVE
CVE
added 2006/10/10 11:7 p.m.64 views

CVE-2006-5229

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. N...

2.6CVSS6.6AI score0.38373EPSS
CVE
CVE
added 2000/04/25 4:0 a.m.61 views

CVE-1999-1010

An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.

2.1CVSS6.8AI score0.00244EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.61 views

CVE-2001-1380

OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.

7.5CVSS9.3AI score0.04582EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.60 views

CVE-2001-1382

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

5CVSS9.5AI score0.00732EPSS
CVE
CVE
added 2000/04/10 4:0 a.m.59 views

CVE-2000-0217

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

5.1CVSS6.6AI score0.00636EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.59 views

CVE-2000-0992

Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.

5CVSS6.5AI score0.02826EPSS
CVE
CVE
added 2007/09/04 10:17 p.m.59 views

CVE-2007-4654

Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via a series of large packets designed to exploit th...

5CVSS7AI score0.63977EPSS
CVE
CVE
added 2005/09/06 5:3 p.m.58 views

CVE-2005-2797

OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.

5CVSS9.3AI score0.01284EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.57 views

CVE-2001-1029

libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.

2.1CVSS6.5AI score0.00129EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.57 views

CVE-2001-1459

OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.

7.5CVSS9AI score0.00559EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.55 views

CVE-2000-1169

OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.

7.5CVSS9.5AI score0.01841EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.54 views

CVE-2002-0765

sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.

7.5CVSS9.4AI score0.00602EPSS
CVE
CVE
added 2008/07/18 4:41 p.m.53 views

CVE-2008-3234

sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

6.5CVSS8.9AI score0.02789EPSS
CVE
CVE
added 2005/07/14 4:0 a.m.52 views

CVE-2001-1507

OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.

7.5CVSS9.5AI score0.00741EPSS
Total number of security vulnerabilities118