Логотип exploitDog
bind:CVE-2000-0834
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2000-0834

Количество 2

Количество 2

nvd логотип

CVE-2000-0834

около 25 лет назад

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-4m4v-vqhc-mhjp

почти 4 года назад

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2000-0834

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

CVSS2: 7.5
34%
Средний
около 25 лет назад
github логотип
GHSA-4m4v-vqhc-mhjp

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

34%
Средний
почти 4 года назад

Уязвимостей на страницу