Vulnerabilities
Vulnerable Software
Ssh:  >> Ssh2  >> 2.4  Security Vulnerabilities
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-12-31
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-11-25
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
CVSS Score
5.0
EPSS Score
0.007
Published
2001-06-27


Contact Us

Shodan ® - All rights reserved