Lucene search

K
SshSsh22.0.11

6 matches found

CVE
CVE
added 2000/04/10 4:0 a.m.55 views

CVE-2000-0217

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

5.1CVSS6.6AI score0.00636EPSS
CVE
CVE
added 2005/06/21 4:0 a.m.51 views

CVE-2002-1715

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

7.2CVSS6.7AI score0.00108EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.42 views

CVE-1999-0398

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.

4.6CVSS7AI score0.00082EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.40 views

CVE-1999-1029

SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.

7.5CVSS7.1AI score0.00717EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.33 views

CVE-1999-1159

SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.

4.6CVSS7.2AI score0.00064EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.29 views

CVE-1999-1231

ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.

5CVSS7.2AI score0.00961EPSS