CVE-2002-1715 : Detail

CVE-2002-1715

0.11%V4
Local
2005-06-21
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21398

Publication date : 2002-04-17 22h00 +00:00
Author : A.Dimitrov
EDB Verified : Yes

Products Mentioned

Configuraton 0

Ssh>>Ssh >> Version 1.2.0

Ssh>>Ssh >> Version 1.2.1

Ssh>>Ssh >> Version 1.2.2

Ssh>>Ssh >> Version 1.2.3

Ssh>>Ssh >> Version 1.2.4

Ssh>>Ssh >> Version 1.2.5

Ssh>>Ssh >> Version 1.2.6

Ssh>>Ssh >> Version 1.2.7

Ssh>>Ssh >> Version 1.2.8

Ssh>>Ssh >> Version 1.2.9

Ssh>>Ssh >> Version 1.2.10

Ssh>>Ssh >> Version 1.2.11

Ssh>>Ssh >> Version 1.2.12

Ssh>>Ssh >> Version 1.2.13

Ssh>>Ssh >> Version 1.2.14

Ssh>>Ssh >> Version 1.2.15

Ssh>>Ssh >> Version 1.2.16

Ssh>>Ssh >> Version 1.2.17

Ssh>>Ssh >> Version 1.2.18

Ssh>>Ssh >> Version 1.2.19

Ssh>>Ssh >> Version 1.2.20

Ssh>>Ssh >> Version 1.2.21

Ssh>>Ssh >> Version 1.2.22

Ssh>>Ssh >> Version 1.2.23

Ssh>>Ssh >> Version 1.2.24

Ssh>>Ssh >> Version 1.2.25

Ssh>>Ssh >> Version 1.2.26

Ssh>>Ssh >> Version 1.2.27

Ssh>>Ssh >> Version 1.2.28

Ssh>>Ssh >> Version 1.2.29

Ssh>>Ssh >> Version 1.2.30

Ssh>>Ssh >> Version 1.2.31

Ssh>>Ssh2 >> Version 2.0

Ssh>>Ssh2 >> Version 2.0.1

Ssh>>Ssh2 >> Version 2.0.2

Ssh>>Ssh2 >> Version 2.0.3

Ssh>>Ssh2 >> Version 2.0.4

Ssh>>Ssh2 >> Version 2.0.5

Ssh>>Ssh2 >> Version 2.0.6

Ssh>>Ssh2 >> Version 2.0.7

Ssh>>Ssh2 >> Version 2.0.8

Ssh>>Ssh2 >> Version 2.0.9

Ssh>>Ssh2 >> Version 2.0.10

Ssh>>Ssh2 >> Version 2.0.11

Ssh>>Ssh2 >> Version 2.0.12

Ssh>>Ssh2 >> Version 2.0.13

Ssh>>Ssh2 >> Version 2.1

Ssh>>Ssh2 >> Version 2.2

Ssh>>Ssh2 >> Version 2.3

Ssh>>Ssh2 >> Version 2.4

Ssh>>Ssh2 >> Version 2.5

Ssh>>Ssh2 >> Version 3.0

References

http://www.securityfocus.com/bid/4547
Tags : vdb-entry, x_refsource_BID
http://online.securityfocus.com/archive/1/268446
Tags : mailing-list, x_refsource_BUGTRAQ