[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:700200
It was discovered that Kerberos did not properly determine the acceptability of certain checksums. A remote attacker could use certain checksums to alter the prompt message, modify a response to a Key Distribution Center or forge a KRB-SAFE message. It was discovered that Kerberos did not properly ...

oval:org.secpod.oval:def:300058
Multiple vulnerabilities were discovered and corrected in krb5: An unauthenticated remote attacker could alter a SAM-2 challenge, affecting the prompt text seen by the user or the kind of response sent to the KDC. Under some circumstances, this can negate the incremental security benefit of using a ...

oval:org.secpod.oval:def:3028
The host is installed with MIT Kerberos 5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle 'KrbFastReq' forgery issue. Successful exploitation could allow attackers to bypass security.

oval:org.secpod.oval:def:3050
The host is missing an important security update according to, APPLE-SA-2011-03-21-1. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to e ...

CWE    1
CWE-264
*CVE
CVE-2010-4021

© SecPod Technologies