Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh2 2.0.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh2 2.0.13
Ssh Ssh2 2.1
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh2 2.2
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.8
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
1 EDB exploit
NA
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.8
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.3
NA
CVE-1999-1231
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote malicious users to determine user account names on the server.
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh2 2.0.6
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.1
Ssh Ssh2 2.0.10
Ssh Ssh2 2.0.12
Ssh Ssh2 2.0.7
Ssh Ssh2 2.0.2
NA
CVE-1999-1029
SSH server (sshd2) prior to 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote malicious user to guess the password without showing up in the audit logs.
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh2 2.0.6
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.1
Ssh Ssh2 2.0.10
Ssh Ssh2 2.0.7
Ssh Ssh2 2.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started