Логотип exploitDog
bind:CVE-2020-15785
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15785

Количество 2

Количество 2

nvd логотип

CVE-2020-15785

больше 5 лет назад

A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-mp5j-ppmx-jxv4

больше 3 лет назад

A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15785

A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-mp5j-ppmx-jxv4

A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу