Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.31 vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh2 2.0.13
Ssh Ssh2 2.1
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh2 2.2
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.8
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
1 EDB exploit
356
VMScore
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote malicious user to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Openbsd Openssh 2.1.1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
Ssh Ssh
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2