Lucene search

K

23 matches found

CVE
CVE
added 2023/12/18 4:15 p.m.3807 views

CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connecti...

5.9CVSS6.7AI score0.67991EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.283 views

CVE-2001-1473

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the ...

7.5CVSS6.3AI score0.04652EPSS
CVE
CVE
added 2001/08/22 4:0 a.m.197 views

CVE-2001-0572

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA o...

7.5CVSS9.4AI score0.12382EPSS
CVE
CVE
added 2001/09/18 4:0 a.m.186 views

CVE-2001-0361

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.

4CVSS9.2AI score0.01308EPSS
CVE
CVE
added 2011/05/31 8:55 p.m.109 views

CVE-2011-0766

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.

7.8CVSS6.4AI score0.03371EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.87 views

CVE-2001-0144

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.

10CVSS7.4AI score0.34512EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.75 views

CVE-1999-0013

Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.

8.4CVSS7.3AI score0.00518EPSS
CVE
CVE
added 2000/02/16 5:0 a.m.65 views

CVE-2000-0143

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.

4.6CVSS6.6AI score0.00076EPSS
CVE
CVE
added 2000/04/10 4:0 a.m.55 views

CVE-2000-0217

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

5.1CVSS6.6AI score0.00636EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.55 views

CVE-2000-0575

SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS.

7.2CVSS6.8AI score0.00361EPSS
CVE
CVE
added 2001/06/27 4:0 a.m.55 views

CVE-2001-0471

SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.

7.5CVSS6.7AI score0.02942EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.53 views

CVE-2000-0992

Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.

5CVSS6.5AI score0.02826EPSS
CVE
CVE
added 2005/06/21 4:0 a.m.51 views

CVE-2002-1715

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

7.2CVSS6.7AI score0.00108EPSS
CVE
CVE
added 2000/10/13 4:0 a.m.44 views

CVE-1999-0787

The SSH authentication agent follows symlinks via a UNIX domain socket.

2.1CVSS6.8AI score0.00614EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.42 views

CVE-1999-0398

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.

4.6CVSS7AI score0.00082EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.42 views

CVE-2001-1475

SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated.

7.5CVSS7.3AI score0.00891EPSS
CVE
CVE
added 2001/06/02 4:0 a.m.41 views

CVE-2001-0259

ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.

3.6CVSS6.2AI score0.00273EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.40 views

CVE-2001-1469

The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.

5CVSS7.1AI score0.00483EPSS
CVE
CVE
added 2000/10/13 4:0 a.m.39 views

CVE-1999-0248

A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.

10CVSS7AI score0.00407EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.39 views

CVE-1999-0310

SSH 1.2.25 on HP-UX allows access to new user accounts.

7.5CVSS7.3AI score0.00489EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.39 views

CVE-2001-1470

The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message.

5CVSS7AI score0.00523EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.39 views

CVE-2001-1474

SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache.

5CVSS7.1AI score0.00824EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.37 views

CVE-2001-1476

SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.

7.5CVSS7.1AI score0.00356EPSS