Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh ssh 1.2.15 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Openbsd Openssh 1.2
Openbsd Openssh 1.2.3
Ssh Ssh 1.2.14
Ssh Ssh 1.2.15
Ssh Ssh 1.2.16
Ssh Ssh 1.2.17
Ssh Ssh 1.2.18
Ssh Ssh 1.2.19
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.22
Ssh Ssh 1.2.23
1 EDB exploit
4.6
CVSSv2
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Openbsd Openssh
Openbsd Openssh 1.2
Ssh Ssh 1.2.0
Ssh Ssh 1.2.1
Ssh Ssh 1.2.2
Ssh Ssh 1.2.3
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh 1.2.6
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
5.1
CVSSv2
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Openbsd Openssh 1.2
Ssh Ssh 1.2.0
Ssh Ssh 1.2.1
Ssh Ssh 1.2.2
Ssh Ssh 1.2.3
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh 1.2.6
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.10
7.2
CVSSv2
CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Ssh Ssh 1.2.0
Ssh Ssh 1.2.1
Ssh Ssh 1.2.2
Ssh Ssh 1.2.3
Ssh Ssh 1.2.4
Ssh Ssh 1.2.5
Ssh Ssh 1.2.6
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh 1.2.10
Ssh Ssh 1.2.11
1 EDB exploit
Preferred Score:
CVSSv2
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
realteo
file inclusion
CVE-2025-27363
fortinet
CVE-2025-2263
CVE-2025-29782
CVE-2025-1266
CVE-2025-24985
command injection
CVE-2025-2304
camaleon-cms
*
insecure direct object reference
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started