Filtered by vendor Ssh Subscriptions
Total 48 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-1029 1 Ssh 1 Ssh2 2025-04-03 N/A
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
CVE-2002-1646 1 Ssh 1 Secure Shell For Servers 2025-04-03 N/A
SSH Secure Shell for Servers 3.0.0 to 3.1.1 allows remote attackers to override the AllowedAuthentications configuration and use less secure authentication schemes (e.g. password) than configured for the server.
CVE-2002-1715 1 Ssh 2 Ssh, Ssh2 2025-04-03 N/A
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
CVE-2001-0361 2 Openbsd, Ssh 2 Openssh, Ssh 2025-04-03 N/A
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
CVE-2021-27893 2 Microsoft, Ssh 4 Windows, Tectia Client, Tectia Connectsecure and 1 more 2024-11-21 7.0 High
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
CVE-2021-27892 2 Microsoft, Ssh 4 Windows, Tectia Client, Tectia Connectsecure and 1 more 2024-11-21 7.8 High
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
CVE-2021-27891 2 Microsoft, Ssh 4 Windows, Tectia Client, Tectia Connectsecure and 1 more 2024-11-21 8.8 High
SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
CVE-2024-30170 2 Privx, Ssh 2 Privx, Privx 2024-08-12 7.5 High
PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,