Vulnerabilities > Openbsd > Openssh > 1.2

DATE CVE VULNERABILITY TITLE RISK
2001-09-27 CVE-2001-1382 Remote Security vulnerability in OpenSSH
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
network
low complexity
openbsd
5.0
2001-08-14 CVE-2001-0529 Symbolic Link vulnerability in OpenSSH Client X11 Forwarding Cookie Removal File
OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack.
local
low complexity
openbsd
7.2
2000-12-19 CVE-2000-0992 Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a ..
network
low complexity
openbsd ssh
5.0
2000-06-08 CVE-2000-0525 Unspecified vulnerability in Openbsd Openssh 1.2/1.2.3/2.1
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
network
low complexity
openbsd
critical
10.0
2000-02-24 CVE-2000-0217 The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
network
high complexity
openbsd ssh
5.1
2000-02-11 CVE-2000-0143 The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
local
low complexity
ssh openbsd
4.6