6.4
CVSSv2

CVE-2005-1794

Published: 01/06/2005 Updated: 28/03/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote malicious users to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows terminal services using rdp 5.2

microsoft remote desktop connection 5.1.2600.2180

Github Repositories

This project attempts to triage common Nessus findings with large number of instances Usage: /diagnosticpy For eg /diagnosticpy DNS CVE-2005-1794 iplisttxt List of checks supported: SMBv1 supported SMB Signing RDP : CVE-2005-1794

Scanner for network for CVE-2005-1794.

CVE-2005-1794Scanner Can be used to scan several targets vulnerable to CVE-2005-1794 Credit to @daveysec and his orginal script available at githubcom/RhinoSecurityLabs/Security-Research/blob/master/tools/python/CVE-2005-1794-checkpy Disclaimer I take not responsibility for your use of the software Development is done in my personal capacity and carry no affiliat

Tesla_PenTest - Penetration Testing Project Overview This project involves a comprehensive penetration testing assessment of Tesla's internal network The aim was to identify vulnerabilities and assess the potential impact of a security breach on the confidentiality, integrity, and availability of Tesla's information systems Table of Contents Executive Summary Intro

Tesla_PenTest - Penetration Testing Project Overview This project involves a comprehensive penetration testing assessment of Tesla's internal network The aim was to identify vulnerabilities and assess the potential impact of a security breach on the confidentiality, integrity, and availability of Tesla's information systems Table of Contents Executive Summary Intro