Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.27 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1474
SSH prior to 2.0 disables host key checking when connecting to the localhost, which allows remote malicious users to silently redirect connections to the localhost by poisoning the client's DNS cache.
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.25
Ssh Ssh 1.2.30
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
7.5
CVSSv2
CVE-2001-0572
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote malicious user to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password gu...
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.25
Ssh Ssh 1.2.30
Openbsd Openssh 4.5
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
10
CVSSv2
CVE-2001-0144
CORE SDI SSH1 CRC-32 compensation attack detector allows remote malicious users to execute arbitrary commands on an SSH server or client via an integer overflow.
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
Ssh Ssh 1.2.25
Ssh Ssh 1.2.30
Openbsd Openssh 1.2.2
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
2 EDB exploits
5
CVSSv2
CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Openbsd Openssh 1.2.3
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.25
Ssh Ssh 1.2.17
Ssh Ssh 1.2.30
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.16
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.22
Ssh Ssh 1.2.23
1 EDB exploit
4.6
CVSSv2
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Openbsd Openssh
Ssh Ssh 1.2.8
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.3
Ssh Ssh 1.2.12
Ssh Ssh 1.2.25
Ssh Ssh 1.2.17
Ssh Ssh 1.2.1
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
5.1
CVSSv2
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.8
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
Ssh Ssh 1.2.20
Openbsd Openssh 1.2
Ssh Ssh 1.2.3
7.2
CVSSv2
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.6
Ssh Ssh 1.2.0
Ssh Ssh2 2.0.13
Ssh Ssh2 2.1
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.21
Ssh Ssh 1.2.15
Ssh Ssh2 2.0.11
Ssh Ssh2 2.0.9
Ssh Ssh2 2.2
Ssh Ssh 1.2.4
Ssh Ssh 1.2.14
Ssh Ssh 1.2.19
Ssh Ssh2 2.0
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.8
Ssh Ssh 1.2.31
Ssh Ssh 1.2.24
Ssh Ssh 1.2.18
Ssh Ssh 1.2.7
1 EDB exploit
4
CVSSv2
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote malicious user to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Openbsd Openssh 2.1.1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
Ssh Ssh
2.1
CVSSv2
CVE-1999-1010
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
Openbsd Openssh 1.2.27
1 Github repository
3.5
CVSSv2
CVE-2012-0814
The auth_parse_options function in auth-options.c in sshd in OpenSSH prior to 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by ...
Openbsd Openssh 5.4
Openbsd Openssh 2
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 4.3p2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 5.5
Openbsd Openssh 3.0.2p1
Openbsd Openssh 1.5.8
Openbsd Openssh 5.3
Openbsd Openssh 4.1
Openbsd Openssh 3.8.1
Openbsd Openssh 2.1.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 4.8
Openbsd Openssh 4.9
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »