Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown
CVE-2006-4924
Disclosure Date: September 27, 2006 (last updated October 04, 2023)
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
0
Attacker Value
Unknown
CVE-2003-1562
Disclosure Date: December 31, 2003 (last updated February 22, 2025)
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
0
Attacker Value
Unknown
CVE-2000-0992
Disclosure Date: December 19, 2000 (last updated February 22, 2025)
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
0
Attacker Value
Unknown
CVE-2000-0217
Disclosure Date: February 24, 2000 (last updated February 22, 2025)
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
0
Attacker Value
Unknown
CVE-2000-0143
Disclosure Date: February 11, 2000 (last updated February 22, 2025)
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
0