Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssh secure shell for servers 3.1.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1646
SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote malicious users to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g. password) than configured for the server.
Ssh Secure Shell For Servers 3.1.1
Ssh Secure Shell For Servers 3.1
Ssh Secure Shell For Servers 3.0
Ssh Secure Shell For Servers 3.0.1
7.2
CVSSv2
CVE-2002-1644
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 up to and including 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows malicious users to gain certain privileges.
Ssh Ssh2 2.0.13
Ssh Ssh2 2.1
Ssh Ssh2 3.0.1
Ssh Ssh2 2.2
Ssh Ssh2 3.2.1
Ssh Ssh2 3.1
Ssh Ssh2 3.0
Ssh Ssh2 3.1.2
Ssh Ssh2 3.1.3
Ssh Ssh2 3.1.4
Ssh Ssh2 2.4
Ssh Ssh2 3.1.1
Ssh Ssh2 3.2
Ssh Ssh2 2.3
Ssh Ssh2 2.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started