Page 9 of 48 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS. • http://marc.info/?l=bugtraq&m=96256265914116&w=2 http://www.securityfocus.com/bid/1426 https://exchange.xforce.ibmcloud.com/vulnerabilities/4903 •

CVSS: 5.1EPSS: 0%CPEs: 46EXPL: 0

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program. • http://www.securityfocus.com/bid/1006 •

CVSS: 4.6EPSS: 0%CPEs: 30EXPL: 0

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The SSH authentication agent follows symlinks via a UNIX domain socket. • https://www.exploit-db.com/exploits/19510 http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://marc.info/?l=bugtraq&m=93832856804415&w=2 http://www.securityfocus.com/bid/660 •

CVSS: 10.0EPSS: 11%CPEs: 1EXPL: 0

A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. • http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1 •