Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.30 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1474
SSH prior to 2.0 disables host key checking when connecting to the localhost, which allows remote malicious users to silently redirect connections to the localhost by poisoning the client's DNS cache.
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.30
Ssh Ssh 1.2.31
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.24
Ssh Ssh 1.2.25
5
CVSSv2
CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Ssh Ssh 1.2.14
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Openbsd Openssh 1.2
Openbsd Openssh 1.2.3
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.15
Ssh Ssh 1.2.22
Ssh Ssh 1.2.23
Ssh Ssh 1.2.30
Ssh Ssh 1.2.31
Ssh Ssh 1.2.16
Ssh Ssh 1.2.17
Ssh Ssh 1.2.24
Ssh Ssh 1.2.25
1 EDB exploit
3.6
CVSSv2
CVE-2001-0259
ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local malicious users to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.27
Ssh Ssh 1.2.30
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2