Логотип exploitDog
bind:CVE-2016-0049
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-0049

Количество 3

Количество 3

nvd логотип

CVE-2016-0049

почти 10 лет назад

Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-xfcg-5cmm-j3j6

больше 3 лет назад

Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

CVSS3: 6.2
EPSS: Низкий
fstec логотип

BDU:2016-00489

почти 10 лет назад

Уязвимость операционной системы Windows, позволяющая нарушителю обойти процедуру аутентификации

CVSS2: 2.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-0049

Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

CVSS3: 6.2
4%
Низкий
почти 10 лет назад
github логотип
GHSA-xfcg-5cmm-j3j6

Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

CVSS3: 6.2
4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2016-00489

Уязвимость операционной системы Windows, позволяющая нарушителю обойти процедуру аутентификации

CVSS2: 2.1
4%
Низкий
почти 10 лет назад

Уязвимостей на страницу