Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4m4v-vqhc-mhjp

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

EPSS

Процентиль: 97%
0.34051
Средний

Связанные уязвимости

nvd
почти 25 лет назад

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

EPSS

Процентиль: 97%
0.34051
Средний