Vulnerabilities
Vulnerable Software
Ssh:  >> Ssh2  >> 2.0.2  Security Vulnerabilities
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
CVSS Score
7.2
EPSS Score
0.001
Published
2002-12-31
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
CVSS Score
5.1
EPSS Score
0.006
Published
2000-02-24
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
CVSS Score
5.0
EPSS Score
0.01
Published
1999-06-09
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
CVSS Score
7.5
EPSS Score
0.007
Published
1999-05-13


Contact Us

Shodan ® - All rights reserved