Ssh

Ssh

23 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report Exploit
  • EPSS 64.06%
  • Published 18.12.2023 16:15:10
  • Last modified 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 3.37%
  • Published 31.05.2011 20:55:01
  • Last modified 11.04.2025 00:51:21

The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA...

Exploit
  • EPSS 0.11%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

Exploit
  • EPSS 24.51%
  • Published 22.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies...

Exploit
  • EPSS 2.94%
  • Published 27.06.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.

  • EPSS 1.31%
  • Published 27.06.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1...

Exploit
  • EPSS 0.27%
  • Published 02.06.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.

Exploit
  • EPSS 72.54%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.

  • EPSS 4.88%
  • Published 18.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weake...

Exploit
  • EPSS 0.36%
  • Published 18.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages dep...