Show filters
321 Total Results
Displaying 251-260 of 321
Sort by:
Attacker Value
Unknown

CVE-2001-1507

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
0
Attacker Value
Unknown

CVE-2001-1585

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.
0
Attacker Value
Unknown

CVE-2001-1559

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference.
Attacker Value
Unknown

CVE-2001-0872

Disclosure Date: December 21, 2001 (last updated February 22, 2025)
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
0
Attacker Value
Unknown

CVE-2001-0816

Disclosure Date: December 06, 2001 (last updated February 22, 2025)
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
0
Attacker Value
Unknown

CVE-2001-1415

Disclosure Date: November 13, 2001 (last updated February 22, 2025)
vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes.
0
Attacker Value
Unknown

CVE-2001-1380

Disclosure Date: October 18, 2001 (last updated February 22, 2025)
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
0
Attacker Value
Unknown

CVE-2001-0670

Disclosure Date: October 03, 2001 (last updated February 22, 2025)
Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.
0
Attacker Value
Unknown

CVE-2001-1382

Disclosure Date: September 27, 2001 (last updated February 22, 2025)
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
0
Attacker Value
Unknown

CVE-2001-1029

Disclosure Date: September 20, 2001 (last updated February 22, 2025)
libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
0