Page 2 of 10 results (0.003 seconds)

CVSS: 5.1EPSS: 0%CPEs: 46EXPL: 0

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 1

ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server. • http://www.securityfocus.com/archive/1/14758 https://exchange.xforce.ibmcloud.com/vulnerabilities/2276 •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs. • http://marc.info/?l=bugtraq&m=92663402004280&w=2 http://www.securityfocus.com/bid/277 https://exchange.xforce.ibmcloud.com/vulnerabilities/2193 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root. • http://marc.info/?l=bugtraq&m=91495920911490&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/1471 •