Page 2 of 8 results (0.006 seconds)

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 1

KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html http://www.redhat.com/support/errata/RHSA-2001-025.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5754 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges. • https://www.exploit-db.com/exploits/20491 http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5733 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user. • http://marc.info/?l=bugtraq&m=87602167420184&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/65 •