CVE-2000-0217
https://notcve.org/view.php?id=CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •
CVE-2000-0143
https://notcve.org/view.php?id=CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143 •
CVE-1999-0787 – SSH Communications Security SSH 1.2.27 - Authentication Socket File Creation
https://notcve.org/view.php?id=CVE-1999-0787
The SSH authentication agent follows symlinks via a UNIX domain socket. • https://www.exploit-db.com/exploits/19510 http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://marc.info/?l=bugtraq&m=93832856804415&w=2 http://www.securityfocus.com/bid/660 •
CVE-1999-1231
https://notcve.org/view.php?id=CVE-1999-1231
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server. • http://www.securityfocus.com/archive/1/14758 https://exchange.xforce.ibmcloud.com/vulnerabilities/2276 •
CVE-1999-1029
https://notcve.org/view.php?id=CVE-1999-1029
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs. • http://marc.info/?l=bugtraq&m=92663402004280&w=2 http://www.securityfocus.com/bid/277 https://exchange.xforce.ibmcloud.com/vulnerabilities/2193 •