Show filters
18 Total Results
Displaying 11-18 of 18
Sort by:
Attacker Value
Unknown

CVE-2006-4924

Disclosure Date: September 27, 2006 (last updated October 04, 2023)
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
0
Attacker Value
Unknown

CVE-2003-1562

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
0
Attacker Value
Unknown

CVE-2001-0572

Disclosure Date: August 22, 2001 (last updated February 22, 2025)
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
0
Attacker Value
Unknown

CVE-2001-0144

Disclosure Date: March 12, 2001 (last updated February 22, 2025)
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
0
Attacker Value
Unknown

CVE-2000-0992

Disclosure Date: December 19, 2000 (last updated February 22, 2025)
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
0
Attacker Value
Unknown

CVE-2000-0217

Disclosure Date: February 24, 2000 (last updated February 22, 2025)
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
0
Attacker Value
Unknown

CVE-2000-0143

Disclosure Date: February 11, 2000 (last updated February 22, 2025)
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
0
Attacker Value
Unknown

CVE-1999-1010

Disclosure Date: December 14, 1999 (last updated February 22, 2025)
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
0