All the vulnerabilites related to ssh - ssh2
Vulnerability from fkie_nvd
Published
1999-05-13 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs." } ], "id": "CVE-1999-1029", "lastModified": "2024-11-20T23:30:06.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-05-13T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/277" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-11-25 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL." } ], "evaluatorSolution": "SSH Secure Shell Windows client versions 3.1.5 and 3.2.2 the URL handling mechanism has been fixed so that the maximum URL length is checked and enforced.", "id": "CVE-2002-1645", "lastModified": "2024-11-20T23:41:47.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-11-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/140977" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6263" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.ssh.com/company/newsroom/article/287/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/140977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.ssh.com/company/newsroom/article/287/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ssh | ssh | 1.2.0 | |
ssh | ssh | 1.2.1 | |
ssh | ssh | 1.2.2 | |
ssh | ssh | 1.2.3 | |
ssh | ssh | 1.2.4 | |
ssh | ssh | 1.2.5 | |
ssh | ssh | 1.2.6 | |
ssh | ssh | 1.2.7 | |
ssh | ssh | 1.2.8 | |
ssh | ssh | 1.2.9 | |
ssh | ssh | 1.2.10 | |
ssh | ssh | 1.2.11 | |
ssh | ssh | 1.2.12 | |
ssh | ssh | 1.2.13 | |
ssh | ssh | 1.2.14 | |
ssh | ssh | 1.2.15 | |
ssh | ssh | 1.2.16 | |
ssh | ssh | 1.2.17 | |
ssh | ssh | 1.2.18 | |
ssh | ssh | 1.2.19 | |
ssh | ssh | 1.2.20 | |
ssh | ssh | 1.2.21 | |
ssh | ssh | 1.2.22 | |
ssh | ssh | 1.2.23 | |
ssh | ssh | 1.2.24 | |
ssh | ssh | 1.2.25 | |
ssh | ssh | 1.2.26 | |
ssh | ssh | 1.2.27 | |
ssh | ssh | 1.2.28 | |
ssh | ssh | 1.2.29 | |
ssh | ssh | 1.2.30 | |
ssh | ssh | 1.2.31 | |
ssh | ssh2 | 2.0 | |
ssh | ssh2 | 2.0.1 | |
ssh | ssh2 | 2.0.2 | |
ssh | ssh2 | 2.0.3 | |
ssh | ssh2 | 2.0.4 | |
ssh | ssh2 | 2.0.5 | |
ssh | ssh2 | 2.0.6 | |
ssh | ssh2 | 2.0.7 | |
ssh | ssh2 | 2.0.8 | |
ssh | ssh2 | 2.0.9 | |
ssh | ssh2 | 2.0.10 | |
ssh | ssh2 | 2.0.11 | |
ssh | ssh2 | 2.0.12 | |
ssh | ssh2 | 2.0.13 | |
ssh | ssh2 | 2.1 | |
ssh | ssh2 | 2.2 | |
ssh | ssh2 | 2.3 | |
ssh | ssh2 | 2.4 | |
ssh | ssh2 | 2.5 | |
ssh | ssh2 | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access." } ], "id": "CVE-2002-1715", "lastModified": "2024-11-20T23:41:56.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/268446" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/4547" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/268446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/4547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-02-24 05:00
Modified
2024-11-20 23:31
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openbsd | openssh | 1.2 | |
ssh | ssh | 1.2.0 | |
ssh | ssh | 1.2.1 | |
ssh | ssh | 1.2.2 | |
ssh | ssh | 1.2.3 | |
ssh | ssh | 1.2.4 | |
ssh | ssh | 1.2.5 | |
ssh | ssh | 1.2.6 | |
ssh | ssh | 1.2.7 | |
ssh | ssh | 1.2.8 | |
ssh | ssh | 1.2.9 | |
ssh | ssh | 1.2.10 | |
ssh | ssh | 1.2.11 | |
ssh | ssh | 1.2.12 | |
ssh | ssh | 1.2.13 | |
ssh | ssh | 1.2.14 | |
ssh | ssh | 1.2.15 | |
ssh | ssh | 1.2.16 | |
ssh | ssh | 1.2.17 | |
ssh | ssh | 1.2.18 | |
ssh | ssh | 1.2.19 | |
ssh | ssh | 1.2.20 | |
ssh | ssh | 1.2.21 | |
ssh | ssh | 1.2.22 | |
ssh | ssh | 1.2.23 | |
ssh | ssh | 1.2.24 | |
ssh | ssh | 1.2.25 | |
ssh | ssh | 1.2.26 | |
ssh | ssh | 1.2.27 | |
ssh | ssh | 1.2.28 | |
ssh | ssh | 1.2.29 | |
ssh | ssh | 1.2.30 | |
ssh | ssh | 1.2.31 | |
ssh | ssh2 | 2.0 | |
ssh | ssh2 | 2.0.1 | |
ssh | ssh2 | 2.0.2 | |
ssh | ssh2 | 2.0.3 | |
ssh | ssh2 | 2.0.4 | |
ssh | ssh2 | 2.0.5 | |
ssh | ssh2 | 2.0.6 | |
ssh | ssh2 | 2.0.7 | |
ssh | ssh2 | 2.0.8 | |
ssh | ssh2 | 2.0.9 | |
ssh | ssh2 | 2.0.10 | |
ssh | ssh2 | 2.0.11 | |
ssh | ssh2 | 2.0.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program." } ], "id": "CVE-2000-0217", "lastModified": "2024-11-20T23:31:59.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2000-02-24T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1006" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-06-09 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server." } ], "id": "CVE-1999-1231", "lastModified": "2024-11-20T23:30:37.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-06-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/14758" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/14758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-11-25 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges." } ], "id": "CVE-2002-1644", "lastModified": "2024-11-20T23:41:47.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-11-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/740619" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6247" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ssh.com/company/newsroom/article/286/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/740619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ssh.com/company/newsroom/article/286/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login." } ], "id": "CVE-1999-0398", "lastModified": "2024-11-20T23:28:38.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-01-01T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-12-29 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root." } ], "id": "CVE-1999-1159", "lastModified": "2024-11-20T23:30:27.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-12-29T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-06-27 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections." } ], "id": "CVE-2001-0364", "lastModified": "2024-11-20T23:35:12.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-06-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2477" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2002-1645
Vulnerability from cvelistv5
Published
2005-03-28 05:00
Modified
2024-08-08 03:34
Severity ?
EPSS score ?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/6263 | vdb-entry, x_refsource_BID | |
http://www.ssh.com/company/newsroom/article/287/ | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10723 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/140977 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:55.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6263", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6263" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ssh.com/company/newsroom/article/287/" }, { "name": "ssh-client-url-bo(10723)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723" }, { "name": "VU#140977", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/140977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6263", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6263" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ssh.com/company/newsroom/article/287/" }, { "name": "ssh-client-url-bo(10723)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723" }, { "name": "VU#140977", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/140977" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6263", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6263" }, { "name": "http://www.ssh.com/company/newsroom/article/287/", "refsource": "CONFIRM", "url": "http://www.ssh.com/company/newsroom/article/287/" }, { "name": "ssh-client-url-bo(10723)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723" }, { "name": "VU#140977", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/140977" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1645", "datePublished": "2005-03-28T05:00:00", "dateReserved": "2005-03-28T00:00:00", "dateUpdated": "2024-08-08T03:34:55.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1159
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/1471 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=91495920911490&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ssh-privileged-port-forward(1471)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471" }, { "name": "19981229 ssh2 security problem (and patch) (fwd)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-12-14T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ssh-privileged-port-forward(1471)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471" }, { "name": "19981229 ssh2 security problem (and patch) (fwd)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ssh-privileged-port-forward(1471)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471" }, { "name": "19981229 ssh2 security problem (and patch) (fwd)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1159", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0398
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:34
Severity ?
EPSS score ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:34:51.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T07:27:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0398", "datePublished": "2000-02-04T05:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:34:51.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1231
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/14758 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/2276 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19990609 ssh advirsory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/14758" }, { "name": "ssh-leak(2276)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19990609 ssh advirsory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/14758" }, { "name": "ssh-leak(2276)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19990609 ssh advirsory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/14758" }, { "name": "ssh-leak(2276)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1231", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0364
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:14
Severity ?
EPSS score ?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/2477 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6241 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=98467799732241&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:14:07.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2477" }, { "name": "ssh-ssheloop-dos(6241)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241" }, { "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2477" }, { "name": "ssh-ssheloop-dos(6241)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241" }, { "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2477" }, { "name": "ssh-ssheloop-dos(6241)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241" }, { "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0364", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:14:07.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1715
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
EPSS score ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/8908 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/4547 | vdb-entry, x_refsource_BID | |
http://online.securityfocus.com/archive/1/268446 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:55.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ssh-bypass-restricted-shells(8908)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908" }, { "name": "4547", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4547" }, { "name": "20020418 Restricted Shells", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/268446" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ssh-bypass-restricted-shells(8908)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908" }, { "name": "4547", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4547" }, { "name": "20020418 Restricted Shells", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/268446" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ssh-bypass-restricted-shells(8908)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908" }, { "name": "4547", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4547" }, { "name": "20020418 Restricted Shells", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/268446" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1715", "datePublished": "2005-06-21T04:00:00", "dateReserved": "2005-06-21T00:00:00", "dateUpdated": "2024-08-08T03:34:55.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1644
Vulnerability from cvelistv5
Published
2005-03-28 05:00
Modified
2024-08-08 03:34
Severity ?
EPSS score ?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/10710 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6247 | vdb-entry, x_refsource_BID | |
http://www.ssh.com/company/newsroom/article/286/ | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/740619 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:55.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ssh-setsid-privilege-elevation(10710)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710" }, { "name": "6247", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6247" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ssh.com/company/newsroom/article/286/" }, { "name": "VU#740619", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/740619" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ssh-setsid-privilege-elevation(10710)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710" }, { "name": "6247", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6247" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ssh.com/company/newsroom/article/286/" }, { "name": "VU#740619", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/740619" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1644", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ssh-setsid-privilege-elevation(10710)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710" }, { "name": "6247", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6247" }, { "name": "http://www.ssh.com/company/newsroom/article/286/", "refsource": "CONFIRM", "url": "http://www.ssh.com/company/newsroom/article/286/" }, { "name": "VU#740619", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/740619" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1644", "datePublished": "2005-03-28T05:00:00", "dateReserved": "2005-03-28T00:00:00", "dateUpdated": "2024-08-08T03:34:55.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0217
Vulnerability from cvelistv5
Published
2000-04-10 04:00
Modified
2024-08-08 05:05
Severity ?
EPSS score ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1006 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:05:54.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1006" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1006" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1006", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1006" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0217", "datePublished": "2000-04-10T04:00:00", "dateReserved": "2000-03-22T00:00:00", "dateUpdated": "2024-08-08T05:05:54.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1029
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 16:55
Severity ?
EPSS score ?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/2193 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=92663402004280&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/277 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:55:29.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ssh2-bruteforce(2193)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193" }, { "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2" }, { "name": "277", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/277" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ssh2-bruteforce(2193)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193" }, { "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2" }, { "name": "277", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/277" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ssh2-bruteforce(2193)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193" }, { "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2" }, { "name": "277", "refsource": "BID", "url": "http://www.securityfocus.com/bid/277" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1029", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T16:55:29.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }