Vulnerabilities > SSH > High

DATE CVE VULNERABILITY TITLE RISK
2008-01-09 CVE-2007-5616 Permissions, Privileges, and Access Controls vulnerability in multiple products
ssh-signer in SSH Tectia Client and Server 5.x before 5.2.4, and 5.3.x before 5.3.6, on Unix and Linux allows local users to gain privileges via unspecified vectors.
local
low complexity
ssh linux opengroup CWE-264
7.2
2006-08-23 CVE-2006-4316 Local Privilege Escalation vulnerability in SSH Tectia Manager Agent Process
SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges.
local
low complexity
ssh
7.2
2006-08-23 CVE-2006-4315 Privilege Escalation vulnerability in SSH Tectia Windows Path Specification
Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories.
local
low complexity
ssh
7.2
2005-12-17 CVE-2005-4310 Authentication Authorization Bypass vulnerability in SSH Tectia Server 5.0.0A/5.0.0F/5.0.0T
SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.
network
low complexity
ssh
7.5
2002-12-31 CVE-2002-1715 Unspecified vulnerability in SSH and Ssh2
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
local
low complexity
ssh
7.2
2002-12-31 CVE-2002-1646 Unspecified vulnerability in SSH Secure Shell FOR Servers
SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote attackers to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g.
network
low complexity
ssh
7.5
2002-11-25 CVE-2002-1644 Privilege Escalation vulnerability in SSH Communications SSH Server
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
local
low complexity
ssh
7.2
2001-08-22 CVE-2001-0572 The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
network
low complexity
openbsd ssh
7.5
2001-08-14 CVE-2001-0553 Unspecified vulnerability in SSH Secure Shell 3.0.0
SSH Secure Shell 3.0.0 on Unix systems does not properly perform password authentication to the sshd2 daemon, which allows local users to gain access to accounts with short password fields, such as locked accounts that use "NP" in the password field.
local
low complexity
ssh
7.2
2001-06-27 CVE-2001-0471 Unspecified vulnerability in SSH
SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.
network
low complexity
ssh
7.5