Логотип exploitDog
bind:CVE-2000-0834
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2000-0834

Количество 2

Количество 2

nvd логотип

CVE-2000-0834

почти 25 лет назад

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-4m4v-vqhc-mhjp

больше 3 лет назад

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2000-0834

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

CVSS2: 7.5
28%
Средний
почти 25 лет назад
github логотип
GHSA-4m4v-vqhc-mhjp

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.

28%
Средний
больше 3 лет назад

Уязвимостей на страницу