Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mj8p-r5gp-w6p8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.

EPSS

Процентиль: 42%
0.00198
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.

redhat
почти 18 лет назад

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.

nvd
больше 17 лет назад

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.

debian
больше 17 лет назад

backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is ...

fstec
больше 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 42%
0.00198
Низкий