Show filters
28 Total Results
Displaying 21-28 of 28
Sort by:
Attacker Value
Unknown

CVE-2002-2326

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
The default configuration of Mail.app in Mac OS X 10.0 through 10.0.4 and 10.1 through 10.1.5 sends iDisk authentication credentials in cleartext when connecting to Mac.com, which could allow remote attackers to obtain passwords by sniffing network traffic.
0
Attacker Value
Unknown

CVE-2002-2379

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Cisco AS5350 IOS 12.2(11)T with access control lists (ACLs) applied and possibly with ssh running allows remote attackers to cause a denial of service (crash) via a port scan, possibly due to an ssh bug. NOTE: this issue could not be reproduced by the vendor
0
Attacker Value
Unknown

CVE-2002-2303

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
3D3.Com ShopFactory 5.8 uses client-side encryption and decryption for sensitive price data, which allows remote attackers to modify shopping cart prices by using the Javascript to decrypt the cookie that contains the data.
0
Attacker Value
Unknown

CVE-2001-1463

Disclosure Date: November 19, 2001 (last updated February 22, 2025)
The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.
0
Attacker Value
Unknown

CVE-2001-0361

Disclosure Date: June 27, 2001 (last updated February 22, 2025)
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
0
Attacker Value
Unknown

CVE-2001-0103

Disclosure Date: February 12, 2001 (last updated February 22, 2025)
CoffeeCup Direct and Free FTP clients uses weak encryption to store passwords in the FTPServers.ini file, which could allow attackers to easily decrypt the passwords.
0
Attacker Value
Unknown

CVE-2001-1473

Disclosure Date: January 18, 2001 (last updated February 22, 2025)
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
0
Attacker Value
Unknown

CVE-2000-0589

Disclosure Date: June 26, 2000 (last updated February 22, 2025)
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
0