Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2002-1715

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.3%
CVSS Severity
CVSS v2 Score 7.2
Products affected by CVE-2002-1715
  • Ssh » Ssh2 » Version: 2.0
    cpe:2.3:a:ssh:ssh2:2.0
  • Ssh » Ssh2 » Version: 2.0.1
    cpe:2.3:a:ssh:ssh2:2.0.1
  • Ssh » Ssh2 » Version: 2.0.10
    cpe:2.3:a:ssh:ssh2:2.0.10
  • Ssh » Ssh2 » Version: 2.0.11
    cpe:2.3:a:ssh:ssh2:2.0.11
  • Ssh » Ssh2 » Version: 2.0.12
    cpe:2.3:a:ssh:ssh2:2.0.12
  • Ssh » Ssh2 » Version: 2.0.13
    cpe:2.3:a:ssh:ssh2:2.0.13
  • Ssh » Ssh2 » Version: 2.0.2
    cpe:2.3:a:ssh:ssh2:2.0.2
  • Ssh » Ssh2 » Version: 2.0.3
    cpe:2.3:a:ssh:ssh2:2.0.3
  • Ssh » Ssh2 » Version: 2.0.4
    cpe:2.3:a:ssh:ssh2:2.0.4
  • Ssh » Ssh2 » Version: 2.0.5
    cpe:2.3:a:ssh:ssh2:2.0.5
  • Ssh » Ssh2 » Version: 2.0.6
    cpe:2.3:a:ssh:ssh2:2.0.6
  • Ssh » Ssh2 » Version: 2.0.7
    cpe:2.3:a:ssh:ssh2:2.0.7
  • Ssh » Ssh2 » Version: 2.0.8
    cpe:2.3:a:ssh:ssh2:2.0.8
  • Ssh » Ssh2 » Version: 2.0.9
    cpe:2.3:a:ssh:ssh2:2.0.9
  • Ssh » Ssh2 » Version: 2.1
    cpe:2.3:a:ssh:ssh2:2.1
  • Ssh » Ssh2 » Version: 2.2
    cpe:2.3:a:ssh:ssh2:2.2
  • Ssh » Ssh2 » Version: 2.3
    cpe:2.3:a:ssh:ssh2:2.3
  • Ssh » Ssh2 » Version: 2.4
    cpe:2.3:a:ssh:ssh2:2.4
  • Ssh » Ssh2 » Version: 2.5
    cpe:2.3:a:ssh:ssh2:2.5
  • Ssh » Ssh2 » Version: 3.0
    cpe:2.3:a:ssh:ssh2:3.0
  • Ssh » Ssh » Version: 1.2.0
    cpe:2.3:a:ssh:ssh:1.2.0
  • Ssh » Ssh » Version: 1.2.1
    cpe:2.3:a:ssh:ssh:1.2.1
  • Ssh » Ssh » Version: 1.2.10
    cpe:2.3:a:ssh:ssh:1.2.10
  • Ssh » Ssh » Version: 1.2.11
    cpe:2.3:a:ssh:ssh:1.2.11
  • Ssh » Ssh » Version: 1.2.12
    cpe:2.3:a:ssh:ssh:1.2.12
  • Ssh » Ssh » Version: 1.2.13
    cpe:2.3:a:ssh:ssh:1.2.13
  • Ssh » Ssh » Version: 1.2.14
    cpe:2.3:a:ssh:ssh:1.2.14
  • Ssh » Ssh » Version: 1.2.15
    cpe:2.3:a:ssh:ssh:1.2.15
  • Ssh » Ssh » Version: 1.2.16
    cpe:2.3:a:ssh:ssh:1.2.16
  • Ssh » Ssh » Version: 1.2.17
    cpe:2.3:a:ssh:ssh:1.2.17
  • Ssh » Ssh » Version: 1.2.18
    cpe:2.3:a:ssh:ssh:1.2.18
  • Ssh » Ssh » Version: 1.2.19
    cpe:2.3:a:ssh:ssh:1.2.19
  • Ssh » Ssh » Version: 1.2.2
    cpe:2.3:a:ssh:ssh:1.2.2
  • Ssh » Ssh » Version: 1.2.20
    cpe:2.3:a:ssh:ssh:1.2.20
  • Ssh » Ssh » Version: 1.2.21
    cpe:2.3:a:ssh:ssh:1.2.21
  • Ssh » Ssh » Version: 1.2.22
    cpe:2.3:a:ssh:ssh:1.2.22
  • Ssh » Ssh » Version: 1.2.23
    cpe:2.3:a:ssh:ssh:1.2.23
  • Ssh » Ssh » Version: 1.2.24
    cpe:2.3:a:ssh:ssh:1.2.24
  • Ssh » Ssh » Version: 1.2.25
    cpe:2.3:a:ssh:ssh:1.2.25
  • Ssh » Ssh » Version: 1.2.26
    cpe:2.3:a:ssh:ssh:1.2.26
  • Ssh » Ssh » Version: 1.2.27
    cpe:2.3:a:ssh:ssh:1.2.27
  • Ssh » Ssh » Version: 1.2.28
    cpe:2.3:a:ssh:ssh:1.2.28
  • Ssh » Ssh » Version: 1.2.29
    cpe:2.3:a:ssh:ssh:1.2.29
  • Ssh » Ssh » Version: 1.2.3
    cpe:2.3:a:ssh:ssh:1.2.3
  • Ssh » Ssh » Version: 1.2.30
    cpe:2.3:a:ssh:ssh:1.2.30
  • Ssh » Ssh » Version: 1.2.31
    cpe:2.3:a:ssh:ssh:1.2.31
  • Ssh » Ssh » Version: 1.2.4
    cpe:2.3:a:ssh:ssh:1.2.4
  • Ssh » Ssh » Version: 1.2.5
    cpe:2.3:a:ssh:ssh:1.2.5
  • Ssh » Ssh » Version: 1.2.6
    cpe:2.3:a:ssh:ssh:1.2.6
  • Ssh » Ssh » Version: 1.2.7
    cpe:2.3:a:ssh:ssh:1.2.7
  • Ssh » Ssh » Version: 1.2.8
    cpe:2.3:a:ssh:ssh:1.2.8
  • Ssh » Ssh » Version: 1.2.9
    cpe:2.3:a:ssh:ssh:1.2.9


Contact Us

Shodan ® - All rights reserved