Vulnerabilities
Vulnerable Software
Ssh:  >> Ssh2  >> 2.0.13  Security Vulnerabilities
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-12-31
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-11-25


Contact Us

Shodan ® - All rights reserved