Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2002-12-31 CVE-2002-1748 Unspecified vulnerability in Open Source Development Network Slashcode
Unknown vulnerability in Slash 2.1.x and 2.2 through 2.2.2, as used in Slashcode, allows remote authenticated users to gain access to arbitrary accounts.
local
low complexity
open-source-development-network
7.2
2002-12-31 CVE-2002-1745 Off-by-one Error vulnerability in Microsoft Internet Information Services 5.0
Off-by-one error in the CodeBrws.asp sample script in Microsoft IIS 5.0 allows remote attackers to view the source code for files with extensions containing with one additional character after .html, .htm, .asp, or .inc, such as .aspx files.
network
low complexity
microsoft CWE-193
7.5
2002-12-31 CVE-2002-1741 Unspecified vulnerability in Alt-N Worldclient
Directory traversal vulnerability in WorldClient.cgi in WorldClient for Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to delete arbitrary files via a ".." (dot dot) in the Attachments parameter.
local
low complexity
alt-n
7.2
2002-12-31 CVE-2002-1735 Buffer Overflow vulnerability in Davin Mccall Dlogin 1.0A
Buffer overflow in dlogin 1.0a could allow local users to gain privileges via unknown attack vectors.
local
low complexity
davin-mccall
7.2
2002-12-31 CVE-2002-1726 Unspecified vulnerability in Brokenbytes Photodb 1.4
secure_inc.php in PhotoDB 1.4 allows remote attackers to bypass authentication via a URL with a large Time parameter, non-empty rmtusername and rmtpassword parameter, and an accesslevel parameter that is lower than the access level of the requested page.
network
low complexity
brokenbytes
7.5
2002-12-31 CVE-2002-1721 Off-by-one Error vulnerability in Pldaniels Altermime 0.1.10/0.1.11
Off-by-one error in alterMIME 0.1.10 and 0.1.11 allows remote attackers to cause a denial of service (crash) via an x-header that causes snprintf overwrite the FFGET_FILE variable with a (null) byte.
network
low complexity
pldaniels CWE-193
7.5
2002-12-31 CVE-2002-1720 Unspecified vulnerability in Outfront Spooky Login
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
network
low complexity
outfront
7.5
2002-12-31 CVE-2002-1715 Unspecified vulnerability in SSH and Ssh2
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
local
low complexity
ssh
7.2
2002-12-31 CVE-2002-1706 Improper Verification of Cryptographic Signature vulnerability in Cisco IOS
Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router.
network
low complexity
cisco CWE-347
7.5
2002-12-31 CVE-2002-1697 Inadequate Encryption Strength vulnerability in Vtun Project Vtun
Electronic Code Book (ECB) mode in VTun 2.0 through 2.5 uses a weak encryption algorithm that produces the same ciphertext from the same plaintext blocks, which could allow remote attackers to gain sensitive information.
network
low complexity
vtun-project CWE-326
7.5