CVE-2000-0575
https://notcve.org/view.php?id=CVE-2000-0575
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS. • http://marc.info/?l=bugtraq&m=96256265914116&w=2 http://www.securityfocus.com/bid/1426 https://exchange.xforce.ibmcloud.com/vulnerabilities/4903 •
CVE-2000-0217
https://notcve.org/view.php?id=CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •
CVE-2000-0143
https://notcve.org/view.php?id=CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143 •
CVE-1999-0787 – SSH Communications Security SSH 1.2.27 - Authentication Socket File Creation
https://notcve.org/view.php?id=CVE-1999-0787
The SSH authentication agent follows symlinks via a UNIX domain socket. • https://www.exploit-db.com/exploits/19510 http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://marc.info/?l=bugtraq&m=93832856804415&w=2 http://www.securityfocus.com/bid/660 •
CVE-1999-0398
https://notcve.org/view.php?id=CVE-1999-0398
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398 •