Логотип exploitDog
bind:CVE-2006-1059
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-1059

Количество 4

Количество 4

ubuntu логотип

CVE-2006-1059

больше 19 лет назад

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

CVSS2: 1.2
EPSS: Низкий
nvd логотип

CVE-2006-1059

больше 19 лет назад

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

CVSS2: 1.2
EPSS: Низкий
debian логотип

CVE-2006-1059

больше 19 лет назад

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trus ...

CVSS2: 1.2
EPSS: Низкий
github логотип

GHSA-cgxg-c5wj-xpf3

больше 3 лет назад

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-1059

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

CVSS2: 1.2
0%
Низкий
больше 19 лет назад
nvd логотип
CVE-2006-1059

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

CVSS2: 1.2
0%
Низкий
больше 19 лет назад
debian логотип
CVE-2006-1059

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trus ...

CVSS2: 1.2
0%
Низкий
больше 19 лет назад
github логотип
GHSA-cgxg-c5wj-xpf3

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу