Page 6 of 30 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The SSH authentication agent follows symlinks via a UNIX domain socket. • https://www.exploit-db.com/exploits/19510 http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://marc.info/?l=bugtraq&m=93832856804415&w=2 http://www.securityfocus.com/bid/660 •

CVSS: 10.0EPSS: 11%CPEs: 1EXPL: 0

A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. • http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

SSH 1.2.25 on HP-UX allows access to new user accounts. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310 •

CVSS: 8.4EPSS: 0%CPEs: 15EXPL: 0

Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013 • CWE-522: Insufficiently Protected Credentials •