Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown
CVE-2001-0361
Disclosure Date: June 27, 2001 (last updated February 22, 2025)
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
0
Attacker Value
Unknown
CVE-2001-1459
Disclosure Date: June 19, 2001 (last updated February 22, 2025)
OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
0
Attacker Value
Unknown
CVE-2001-0144
Disclosure Date: March 12, 2001 (last updated February 22, 2025)
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
0
Attacker Value
Unknown
CVE-2000-1169
Disclosure Date: January 09, 2001 (last updated February 22, 2025)
OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.
0
Attacker Value
Unknown
CVE-2000-0525
Disclosure Date: June 08, 2000 (last updated February 22, 2025)
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
0
Attacker Value
Unknown
CVE-2000-0217
Disclosure Date: February 24, 2000 (last updated February 22, 2025)
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
0