well, it´s the follow up of Telnet. you can remotely login to a box, from normal user to root. in opposite to Telnet the connection uses encryption, which provides a good security. Telnet was sending all data in clear text, so an attacker could easily sniff the connection. the exploits available for SSH are flaws in the service itself and not in the protocol....
