Описание
fasttrack p2p, as used in (1) KaZaA, (2) grokster, and (3) morpheus allows remote attackers to spoof other users by modifying the username and network information in the message header.
Ссылки
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:fasttrack:kazaa:1.2:*:*:*:*:*:*:*
cpe:2.3:a:fasttrack:kazaa:1.3:*:*:*:*:*:*:*
cpe:2.3:a:fasttrack:kazaa:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fasttrack:kazaa:1.4:*:*:*:*:*:*:*
cpe:2.3:a:fasttrack:kazaa:1.5:*:*:*:*:*:*:*
cpe:2.3:a:grokster:grokster:1.3:*:*:*:*:*:*:*
cpe:2.3:a:grokster:grokster:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:music_city_networks:morpheus:1.3:*:*:*:*:*:*:*
cpe:2.3:a:music_city_networks:morpheus:1.3.3:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00861
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
fasttrack p2p, as used in (1) KaZaA, (2) grokster, and (3) morpheus allows remote attackers to spoof other users by modifying the username and network information in the message header.
EPSS
Процентиль: 75%
0.00861
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other