Page 14 of 71 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398 •

CVSS: 10.0EPSS: 11%CPEs: 1EXPL: 0

A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. • http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root. • http://marc.info/?l=bugtraq&m=91495920911490&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/1471 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

SSH 1.2.25 on HP-UX allows access to new user accounts. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack." • http://marc.info/?l=bugtraq&m=90221103125884&w=2 http://marc.info/?l=bugtraq&m=90221104525878&w=2 http://www.iss.net/security_center/static/1126.php http://www.kb.cert.org/vuls/id/13877 •