Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.4 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-1999-0013
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.8
Ssh Ssh 1.2.7
Ssh Ssh 1.2.3
Ssh Ssh 1.2.12
Ssh Ssh 1.2.1
Ssh Ssh 1.2.11
Ssh Ssh 1.2.5
Ssh Ssh 1.2.13
Ssh Ssh 1.2.2
Ssh Ssh 1.2.10
409
VMScore
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Openbsd Openssh
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.18
Ssh Ssh 1.2.24
Ssh Ssh 1.2.8
Ssh Ssh 1.2.12
Ssh Ssh 1.2.3
Ssh Ssh 1.2.25
Ssh Ssh 1.2.7
Ssh Ssh 1.2.22
Ssh Ssh 1.2.1
Ssh Ssh 1.2.16
Ssh Ssh 1.2.26
454
VMScore
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.13
Ssh Ssh 1.2.14
Ssh Ssh 1.2.15
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.3
Ssh Ssh2 2.0.2
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.22
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh2 2.0
Ssh Ssh 1.2.0
725
VMScore
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.0
Ssh Ssh 1.2.16
Ssh Ssh 1.2.1
Ssh Ssh 1.2.10
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.12
Ssh Ssh2 2.0.7
Ssh Ssh2 2.0.8
Ssh Ssh2 3.0
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.6
1 EDB exploit
505
VMScore
CVE-2011-1137
Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and previous versions allows remote malicious users to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.2.1
Proftpd Proftpd
Proftpd Proftpd 1.2.3
1 EDB exploit
756
VMScore
CVE-2020-9473
The S. Siedle & Soehne SG 150-0 Smart Gateway prior to 1.2.4 has a passwordless ftp ssh user. By using an exploit chain, an attacker with access to the network can get root access on the gateway.
Siedle Sg 150-0 Firmware
445
VMScore
CVE-2013-0220
The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) prior to 1.9.4 allow remote malicious users...
Fedoraproject Sssd 0.5.0
Fedoraproject Sssd 1.8.0
Fedoraproject Sssd 1.5.8
Fedoraproject Sssd 1.7.0
Fedoraproject Sssd 0.3.1
Fedoraproject Sssd 1.2.3
Fedoraproject Sssd 1.9.1
Fedoraproject Sssd 1.5.2
Fedoraproject Sssd 1.0.4
Fedoraproject Sssd 1.6.4
Fedoraproject Sssd 1.8.2
Fedoraproject Sssd 1.5.13
Fedoraproject Sssd 0.7.1
Fedoraproject Sssd 1.4.0
Fedoraproject Sssd 1.2.2
Fedoraproject Sssd 1.1.92
Fedoraproject Sssd 1.2.4
Fedoraproject Sssd 1.9.2
Fedoraproject Sssd 1.8.5
Fedoraproject Sssd 1.5.0
Fedoraproject Sssd 1.5.5
Fedoraproject Sssd 1.8.6
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started