CVE-2001-1476
https://notcve.org/view.php?id=CVE-2001-1476
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not. • http://www.kb.cert.org/vuls/id/565052 https://exchange.xforce.ibmcloud.com/vulnerabilities/6490 •
CVE-2000-0992 – OpenSSH 1.2 - '.scp' File Create/Overwrite
https://notcve.org/view.php?id=CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20253 http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057 http://www.securityfocus.com/bid/1742 https://exchange.xforce.ibmcloud.com/vulnerabilities/5312 •
CVE-2000-0575
https://notcve.org/view.php?id=CVE-2000-0575
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS. • http://marc.info/?l=bugtraq&m=96256265914116&w=2 http://www.securityfocus.com/bid/1426 https://exchange.xforce.ibmcloud.com/vulnerabilities/4903 •
CVE-2000-0217
https://notcve.org/view.php?id=CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •
CVE-2000-0143
https://notcve.org/view.php?id=CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143 •