CVE-2001-0529
- EPSS 0.14%
- Published 14.08.2001 04:00:00
- Last modified 03.04.2025 01:03:51
OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack.
- EPSS 1.31%
- Published 27.06.2001 04:00:00
- Last modified 03.04.2025 01:03:51
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1...
CVE-2001-1459
- EPSS 0.48%
- Published 19.06.2001 04:00:00
- Last modified 03.04.2025 01:03:51
OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
- EPSS 72.54%
- Published 12.03.2001 05:00:00
- Last modified 03.04.2025 01:03:51
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
CVE-2000-1169
- EPSS 1.84%
- Published 09.01.2001 05:00:00
- Last modified 03.04.2025 01:03:51
OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.
- EPSS 2.83%
- Published 19.12.2000 05:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
- EPSS 0.42%
- Published 11.12.2000 05:00:00
- Last modified 03.04.2025 01:03:51
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.
- EPSS 0.9%
- Published 08.06.2000 04:00:00
- Last modified 03.04.2025 01:03:51
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
CVE-2000-0217
- EPSS 0.64%
- Published 24.02.2000 05:00:00
- Last modified 03.04.2025 01:03:51
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
CVE-2000-0143
- EPSS 0.07%
- Published 11.02.2000 05:00:00
- Last modified 03.04.2025 01:03:51
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.