Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-1999-0013
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.8
Ssh Ssh 1.2.7
Ssh Ssh 1.2.3
Ssh Ssh 1.2.12
Ssh Ssh 1.2.1
Ssh Ssh 1.2.11
Ssh Ssh 1.2.5
Ssh Ssh 1.2.13
Ssh Ssh 1.2.2
Ssh Ssh 1.2.10
409
VMScore
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Openbsd Openssh
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.18
Ssh Ssh 1.2.24
Ssh Ssh 1.2.8
Ssh Ssh 1.2.12
Ssh Ssh 1.2.3
Ssh Ssh 1.2.25
Ssh Ssh 1.2.7
Ssh Ssh 1.2.22
Ssh Ssh 1.2.1
Ssh Ssh 1.2.16
Ssh Ssh 1.2.26
454
VMScore
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.13
Ssh Ssh 1.2.14
Ssh Ssh 1.2.15
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.3
Ssh Ssh2 2.0.2
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.22
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh2 2.0
Ssh Ssh 1.2.0
725
VMScore
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.0
Ssh Ssh 1.2.16
Ssh Ssh 1.2.1
Ssh Ssh 1.2.10
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.12
Ssh Ssh2 2.0.7
Ssh Ssh2 2.0.8
Ssh Ssh2 3.0
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.6
1 EDB exploit
828
VMScore
CVE-2007-1654
Buffer overflow in the Ne7sshSftp::addOpenHandle function in ne7ssh_sftp.cpp in NetSieben SSH Library (ne7ssh) prior to 1.2.1 allows user-assisted remote SFTP servers to cause a denial of service (crash) or possibly execute arbitrary code via multiple file transfers, related to m...
Netsieben Netsieben Ssh Library 1.1
Netsieben Netsieben Ssh Library 1.2.0
Netsieben Netsieben Ssh Library 1.03
Netsieben Netsieben Ssh Library 1.1.6
Netsieben Netsieben Ssh Library 1.1.5
890
VMScore
CVE-2011-1623
Cisco Media Processing Software prior to 1.2 on Media Experience Engine (MXE) 5600 devices has a default root password, which makes it easier for context-dependent malicious users to obtain access via (1) the local console, (2) an SSH session, or (3) a TELNET session, aka Bug ID ...
Cisco Media Processing Software
Cisco Media Processing Software 1.0.0
Cisco Media Processing Software 1.0.1
Cisco Media Processing Software 1.1.0
Cisco Media Processing Software 1.1.1
Cisco Media Experience Engine 5600
505
VMScore
CVE-2011-1137
Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and previous versions allows remote malicious users to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.2.1
Proftpd Proftpd
Proftpd Proftpd 1.2.3
1 EDB exploit
655
VMScore
CVE-2013-4490
The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell prior to 1.7.3, as used in GitLab 5.0 prior to 5.4.1 and 6.x prior to 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.
Gitlab Gitlab 6.0.0
Gitlab Gitlab 6.2.0
Gitlab Gitlab 5.2.0
Gitlab Gitlab 5.0.1
Gitlab Gitlab-shell
Gitlab Gitlab-shell 1.4.0
Gitlab Gitlab-shell 1.2.0
Gitlab Gitlab-shell 1.7.1
Gitlab Gitlab-shell 1.7.0
Gitlab Gitlab-shell 1.6.0
Gitlab Gitlab-shell 1.5.0
Gitlab Gitlab 6.2.1
Gitlab Gitlab 6.2.2
Gitlab Gitlab 5.4.0
Gitlab Gitlab 5.3.0
Gitlab Gitlab-shell 1.0.4
Gitlab Gitlab 6.1.0
Gitlab Gitlab 5.1.0
Gitlab Gitlab 5.0.0
Gitlab Gitlab-shell 1.3.0
Gitlab Gitlab-shell 1.1.0
1 EDB exploit
605
VMScore
CVE-2013-4581
GitLab 5.0 prior to 5.4.2, Community Edition prior to 6.2.4, Enterprise Edition prior to 6.2.1 and gitlab-shell prior to 1.7.8 allows remote malicious users to execute arbitrary code via a crafted change using SSH.
Gitlab Gitlab 3.1.0
Gitlab Gitlab 3.0.3
Gitlab Gitlab 3.0.2
Gitlab Gitlab 3.0.1
Gitlab Gitlab 2.1.0
Gitlab Gitlab 2.0.0
Gitlab Gitlab 1.2.2
Gitlab Gitlab 1.2.1
Gitlab Gitlab 1.2.0
Gitlab Gitlab 6.1.0
Gitlab Gitlab 6.0.0
Gitlab Gitlab 5.4.1
Gitlab Gitlab 5.0.1
Gitlab Gitlab 4.2.0
Gitlab Gitlab 4.0.0
Gitlab Gitlab 3.0.0
Gitlab Gitlab 2.9.0
Gitlab Gitlab 2.3.1
Gitlab Gitlab 2.2.0
Gitlab Gitlab 1.0.2
Gitlab Gitlab 1.0.0
Gitlab Gitlab
383
VMScore
CVE-2014-4749
IBM PowerVC 1.2.0 before FixPack3 does not properly use the known_hosts file, which allows man-in-the-middle malicious users to spoof SSH servers via an arbitrary server key.
Ibm Powervc 1.2.0.2
Ibm Powervc 1.2.0.0
Ibm Powervc 1.2.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »