Search criteria

27 vulnerabilities found for ssh2 by ssh

CVE-2002-1715 (GCVE-0-2002-1715)

Vulnerability from cvelistv5 – Published: 2005-06-21 04:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-bypass-restricted-shells(8908)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
          },
          {
            "name": "4547",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4547"
          },
          {
            "name": "20020418 Restricted Shells",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/268446"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-bypass-restricted-shells(8908)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
        },
        {
          "name": "4547",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4547"
        },
        {
          "name": "20020418 Restricted Shells",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/268446"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-bypass-restricted-shells(8908)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
            },
            {
              "name": "4547",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4547"
            },
            {
              "name": "20020418 Restricted Shells",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/268446"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1715",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1644 (GCVE-0-2002-1644)

Vulnerability from cvelistv5 – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-setsid-privilege-elevation(10710)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
          },
          {
            "name": "6247",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6247"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/286/"
          },
          {
            "name": "VU#740619",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/740619"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-setsid-privilege-elevation(10710)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
        },
        {
          "name": "6247",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6247"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/286/"
        },
        {
          "name": "VU#740619",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/740619"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-setsid-privilege-elevation(10710)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
            },
            {
              "name": "6247",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6247"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/286/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/286/"
            },
            {
              "name": "VU#740619",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/740619"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1644",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1645 (GCVE-0-2002-1645)

Vulnerability from cvelistv5 – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6263",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6263"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/287/"
          },
          {
            "name": "ssh-client-url-bo(10723)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
          },
          {
            "name": "VU#140977",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/140977"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6263",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6263"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/287/"
        },
        {
          "name": "ssh-client-url-bo(10723)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
        },
        {
          "name": "VU#140977",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/140977"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6263",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6263"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/287/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/287/"
            },
            {
              "name": "ssh-client-url-bo(10723)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
            },
            {
              "name": "VU#140977",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/140977"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1645",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0364 (GCVE-0-2001-0364)

Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:14
VLAI?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2477",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2477"
          },
          {
            "name": "ssh-ssheloop-dos(6241)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
          },
          {
            "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2477",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2477"
        },
        {
          "name": "ssh-ssheloop-dos(6241)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
        },
        {
          "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2477",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2477"
            },
            {
              "name": "ssh-ssheloop-dos(6241)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
            },
            {
              "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0364",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1159 (GCVE-0-1999-1159)

Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.757Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-privileged-port-forward(1471)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
          },
          {
            "name": "19981229 ssh2 security problem (and patch) (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1998-12-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2001-12-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-privileged-port-forward(1471)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
        },
        {
          "name": "19981229 ssh2 security problem (and patch) (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1159",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-privileged-port-forward(1471)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
            },
            {
              "name": "19981229 ssh2 security problem (and patch) (fwd)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1159",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.757Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1029 (GCVE-0-1999-1029)

Vulnerability from cvelistv5 – Published: 2001-09-12 04:00 – Updated: 2024-08-01 16:55
VLAI?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:55:29.464Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh2-bruteforce(2193)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
          },
          {
            "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
          },
          {
            "name": "277",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/277"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh2-bruteforce(2193)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
        },
        {
          "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
        },
        {
          "name": "277",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/277"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh2-bruteforce(2193)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
            },
            {
              "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
            },
            {
              "name": "277",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/277"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1029",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T16:55:29.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1231 (GCVE-0-1999-1231)

Vulnerability from cvelistv5 – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.790Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19990609 ssh advirsory",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/14758"
          },
          {
            "name": "ssh-leak(2276)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19990609 ssh advirsory",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/14758"
        },
        {
          "name": "ssh-leak(2276)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19990609 ssh advirsory",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/14758"
            },
            {
              "name": "ssh-leak(2276)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1231",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0217 (GCVE-0-2000-0217)

Vulnerability from cvelistv5 – Published: 2000-04-10 04:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/1006 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:54.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1006"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1006"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1006"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0217",
    "datePublished": "2000-04-10T04:00:00",
    "dateReserved": "2000-03-22T00:00:00",
    "dateUpdated": "2024-08-08T05:05:54.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-0398 (GCVE-0-1999-0398)

Vulnerability from cvelistv5 – Published: 2000-02-04 05:00 – Updated: 2024-08-01 16:34
VLAI?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:27:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0398",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0398",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1715 (GCVE-0-2002-1715)

Vulnerability from nvd – Published: 2005-06-21 04:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-bypass-restricted-shells(8908)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
          },
          {
            "name": "4547",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4547"
          },
          {
            "name": "20020418 Restricted Shells",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/268446"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-bypass-restricted-shells(8908)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
        },
        {
          "name": "4547",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4547"
        },
        {
          "name": "20020418 Restricted Shells",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/268446"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-bypass-restricted-shells(8908)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
            },
            {
              "name": "4547",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4547"
            },
            {
              "name": "20020418 Restricted Shells",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/268446"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1715",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1644 (GCVE-0-2002-1644)

Vulnerability from nvd – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-setsid-privilege-elevation(10710)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
          },
          {
            "name": "6247",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6247"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/286/"
          },
          {
            "name": "VU#740619",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/740619"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-setsid-privilege-elevation(10710)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
        },
        {
          "name": "6247",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6247"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/286/"
        },
        {
          "name": "VU#740619",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/740619"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-setsid-privilege-elevation(10710)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
            },
            {
              "name": "6247",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6247"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/286/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/286/"
            },
            {
              "name": "VU#740619",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/740619"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1644",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1645 (GCVE-0-2002-1645)

Vulnerability from nvd – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6263",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6263"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/287/"
          },
          {
            "name": "ssh-client-url-bo(10723)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
          },
          {
            "name": "VU#140977",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/140977"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6263",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6263"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/287/"
        },
        {
          "name": "ssh-client-url-bo(10723)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
        },
        {
          "name": "VU#140977",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/140977"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6263",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6263"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/287/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/287/"
            },
            {
              "name": "ssh-client-url-bo(10723)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
            },
            {
              "name": "VU#140977",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/140977"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1645",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0364 (GCVE-0-2001-0364)

Vulnerability from nvd – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:14
VLAI?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2477",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2477"
          },
          {
            "name": "ssh-ssheloop-dos(6241)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
          },
          {
            "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2477",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2477"
        },
        {
          "name": "ssh-ssheloop-dos(6241)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
        },
        {
          "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2477",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2477"
            },
            {
              "name": "ssh-ssheloop-dos(6241)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
            },
            {
              "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0364",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1159 (GCVE-0-1999-1159)

Vulnerability from nvd – Published: 2002-03-09 05:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.757Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-privileged-port-forward(1471)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
          },
          {
            "name": "19981229 ssh2 security problem (and patch) (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1998-12-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2001-12-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-privileged-port-forward(1471)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
        },
        {
          "name": "19981229 ssh2 security problem (and patch) (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1159",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-privileged-port-forward(1471)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
            },
            {
              "name": "19981229 ssh2 security problem (and patch) (fwd)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1159",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.757Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1029 (GCVE-0-1999-1029)

Vulnerability from nvd – Published: 2001-09-12 04:00 – Updated: 2024-08-01 16:55
VLAI?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:55:29.464Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh2-bruteforce(2193)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
          },
          {
            "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
          },
          {
            "name": "277",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/277"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh2-bruteforce(2193)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
        },
        {
          "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
        },
        {
          "name": "277",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/277"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh2-bruteforce(2193)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
            },
            {
              "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
            },
            {
              "name": "277",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/277"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1029",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T16:55:29.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1231 (GCVE-0-1999-1231)

Vulnerability from nvd – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.790Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19990609 ssh advirsory",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/14758"
          },
          {
            "name": "ssh-leak(2276)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19990609 ssh advirsory",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/14758"
        },
        {
          "name": "ssh-leak(2276)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19990609 ssh advirsory",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/14758"
            },
            {
              "name": "ssh-leak(2276)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1231",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0217 (GCVE-0-2000-0217)

Vulnerability from nvd – Published: 2000-04-10 04:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/1006 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:54.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1006"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1006"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1006"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0217",
    "datePublished": "2000-04-10T04:00:00",
    "dateReserved": "2000-03-22T00:00:00",
    "dateUpdated": "2024-08-08T05:05:54.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-0398 (GCVE-0-1999-0398)

Vulnerability from nvd – Published: 2000-02-04 05:00 – Updated: 2024-08-01 16:34
VLAI?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:27:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0398",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0398",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2002-1715

Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Impacted products
Vendor Product Version
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12
ssh ssh2 2.0.13
ssh ssh2 2.1
ssh ssh2 2.2
ssh ssh2 2.3
ssh ssh2 2.4
ssh ssh2 2.5
ssh ssh2 3.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
    }
  ],
  "id": "CVE-2002-1715",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2002-1645

Vulnerability from fkie_nvd - Published: 2002-11-25 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
Impacted products
Vendor Product Version
ssh ssh2 3.1
ssh ssh2 3.1.1
ssh ssh2 3.1.2
ssh ssh2 3.1.3
ssh ssh2 3.1.4
ssh ssh2 3.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
    }
  ],
  "evaluatorSolution": "SSH Secure Shell Windows client versions 3.1.5 and 3.2.2 the URL handling mechanism has been fixed so that the maximum URL length is checked and enforced.",
  "id": "CVE-2002-1645",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/140977"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6263"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/287/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/140977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/287/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2002-1644

Vulnerability from fkie_nvd - Published: 2002-11-25 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
Impacted products
Vendor Product Version
ssh ssh2 2.0.13
ssh ssh2 2.1
ssh ssh2 2.2
ssh ssh2 2.3
ssh ssh2 2.4
ssh ssh2 2.5
ssh ssh2 3.0
ssh ssh2 3.0.1
ssh ssh2 3.1
ssh ssh2 3.1.1
ssh ssh2 3.1.2
ssh ssh2 3.1.3
ssh ssh2 3.1.4
ssh ssh2 3.2
ssh ssh2 3.2.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
    }
  ],
  "id": "CVE-2002-1644",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/740619"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/286/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/740619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/286/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2001-0364

Vulnerability from fkie_nvd - Published: 2001-06-27 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
    }
  ],
  "id": "CVE-2001-0364",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2477"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0217

Vulnerability from fkie_nvd - Published: 2000-02-24 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Impacted products
Vendor Product Version
openbsd openssh 1.2
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
    }
  ],
  "id": "CVE-2000-0217",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2000-02-24T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1006"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-1999-1231

Vulnerability from fkie_nvd - Published: 1999-06-09 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
Impacted products
Vendor Product Version
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
    }
  ],
  "id": "CVE-1999-1231",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-06-09T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/14758"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/14758"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-1999-1029

Vulnerability from fkie_nvd - Published: 1999-05-13 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Impacted products
Vendor Product Version
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
    }
  ],
  "id": "CVE-1999-1029",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-05-13T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/277"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-1999-0398

Vulnerability from fkie_nvd - Published: 1999-01-01 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Impacted products
Vendor Product Version
ssh ssh 1.2.27
ssh ssh2 2.0.11

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
    }
  ],
  "id": "CVE-1999-0398",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-01-01T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-1999-1159

Vulnerability from fkie_nvd - Published: 1998-12-29 05:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
    }
  ],
  "id": "CVE-1999-1159",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-12-29T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}