CVE-2003-1119
https://notcve.org/view.php?id=CVE-2003-1119
SSH Secure Shell before 3.2.9 allows remote attackers to cause a denial of service via malformed BER/DER packets. • http://www.kb.cert.org/vuls/id/333980 http://www.ssh.com/company/newsroom/article/476 •
CVE-2002-1715 – SSH2 3.0 - Restricted Shell Escape (Command Execution)
https://notcve.org/view.php?id=CVE-2002-1715
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access. • https://www.exploit-db.com/exploits/21398 http://online.securityfocus.com/archive/1/268446 http://www.securityfocus.com/bid/4547 https://exchange.xforce.ibmcloud.com/vulnerabilities/8908 •
CVE-2002-1646
https://notcve.org/view.php?id=CVE-2002-1646
SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote attackers to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g. password) than configured for the server. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0204.html http://www.ciac.org/ciac/bulletins/m-081.shtml http://www.kb.cert.org/vuls/id/341187 http://www.securityfocus.com/bid/4810 http://www.ssh.com/company/newsroom/article/201 http://www.ssh.com/products/ssh/advisories/authentication.cfm https://exchange.xforce.ibmcloud.com/vulnerabilities/9163 •
CVE-2002-1645
https://notcve.org/view.php?id=CVE-2002-1645
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL. • http://www.kb.cert.org/vuls/id/140977 http://www.securityfocus.com/bid/6263 http://www.ssh.com/company/newsroom/article/287 https://exchange.xforce.ibmcloud.com/vulnerabilities/10723 •
CVE-2002-1644
https://notcve.org/view.php?id=CVE-2002-1644
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges. • http://www.kb.cert.org/vuls/id/740619 http://www.securityfocus.com/bid/6247 http://www.ssh.com/company/newsroom/article/286 https://exchange.xforce.ibmcloud.com/vulnerabilities/10710 •