CVE-2001-1463

The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*

History

20 Nov 2024, 23:37

Type Values Removed Values Added
References () http://securitytracker.com/id?1002882 - Exploit () http://securitytracker.com/id?1002882 - Exploit
References () http://www.kb.cert.org/vuls/id/279763 - Exploit, US Government Resource () http://www.kb.cert.org/vuls/id/279763 - Exploit, US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7925 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/7925 -

Information

Published : 2001-11-19 05:00

Updated : 2024-11-20 23:37


NVD link : CVE-2001-1463

Mitre link : CVE-2001-1463

CVE.ORG link : CVE-2001-1463


JSON object : View

Products Affected

solarwinds

  • serv-u_file_server
CWE
CWE-310

Cryptographic Issues