Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.3 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-0013
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.8
Ssh Ssh 1.2.7
Ssh Ssh 1.2.3
Ssh Ssh 1.2.12
Ssh Ssh 1.2.1
Ssh Ssh 1.2.11
Ssh Ssh 1.2.5
Ssh Ssh 1.2.13
Ssh Ssh 1.2.2
Ssh Ssh 1.2.10
10
CVSSv2
CVE-2001-0144
CORE SDI SSH1 CRC-32 compensation attack detector allows remote malicious users to execute arbitrary commands on an SSH server or client via an integer overflow.
Openbsd Openssh 1.2.2
Openbsd Openssh 1.2.3
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Openbsd Openssh 2.2
Ssh Ssh 1.2.24
Ssh Ssh 1.2.31
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Ssh Ssh 1.2.29
Ssh Ssh 1.2.30
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
2 EDB exploits
5
CVSSv2
CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Ssh Ssh 1.2.14
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Openbsd Openssh 1.2
Openbsd Openssh 1.2.3
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.15
Ssh Ssh 1.2.22
Ssh Ssh 1.2.23
Ssh Ssh 1.2.30
Ssh Ssh 1.2.31
Ssh Ssh 1.2.16
Ssh Ssh 1.2.17
Ssh Ssh 1.2.24
Ssh Ssh 1.2.25
1 EDB exploit
4.6
CVSSv2
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Openbsd Openssh
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.18
Ssh Ssh 1.2.24
Ssh Ssh 1.2.8
Ssh Ssh 1.2.12
Ssh Ssh 1.2.3
Ssh Ssh 1.2.25
Ssh Ssh 1.2.7
Ssh Ssh 1.2.22
Ssh Ssh 1.2.1
Ssh Ssh 1.2.16
Ssh Ssh 1.2.26
5.1
CVSSv2
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.13
Ssh Ssh 1.2.14
Ssh Ssh 1.2.15
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.3
Ssh Ssh2 2.0.2
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.22
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh2 2.0
Ssh Ssh 1.2.0
7.2
CVSSv2
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.0
Ssh Ssh 1.2.16
Ssh Ssh 1.2.1
Ssh Ssh 1.2.10
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.12
Ssh Ssh2 2.0.7
Ssh Ssh2 2.0.8
Ssh Ssh2 3.0
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.6
1 EDB exploit
4
CVSSv2
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote malicious user to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Openbsd Openssh 1.2.3
Ssh Ssh
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
10
CVSSv2
CVE-2000-0525
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
Openbsd Openssh 1.2
7.2
CVSSv2
CVE-2001-0872
OpenSSH 3.0.1 and previous versions with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
Openbsd Openssh
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 7.2
Redhat Linux 7.0
Suse Suse Linux 7.3
Redhat Linux 7.1
Redhat Linux 7.2
10
CVSSv2
CVE-2002-0640
Buffer overflow in sshd in OpenSSH 2.3.1 up to and including 3.3 may allow remote malicious users to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuth...
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 1.2.2
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.3
Openbsd Openssh 3.3p1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »