CVE-2000-0525
https://notcve.org/view.php?id=CVE-2000-0525
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0065.html http://www.openbsd.org/errata.html#uselogin http://www.osvdb.org/341 http://www.securityfocus.com/bid/1334 https://exchange.xforce.ibmcloud.com/vulnerabilities/4646 •
CVE-2000-0217
https://notcve.org/view.php?id=CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •
CVE-2000-0143
https://notcve.org/view.php?id=CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143 •
CVE-1999-1010
https://notcve.org/view.php?id=CVE-1999-1010
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy. • http://marc.info/?l=bugtraq&m=94519142415338&w=2 •