Описание
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2000-0762
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5076
- http://support.ca.com/techbases/eTrust/etrust_access_control-response.html
- http://www.osvdb.org/1517
- http://www.securityfocus.com/bid/1583
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1$ba473260$ddeaa2cd@itradefair.net
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1%24ba473260%24ddeaa2cd%40itradefair.net
EPSS
Процентиль: 77%
0.01043
Низкий
CVE ID
Связанные уязвимости
nvd
почти 25 лет назад
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
EPSS
Процентиль: 77%
0.01043
Низкий