Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33015 | An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. |
Thu, 14 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. | An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. |
| Weaknesses | CWE-40 |
Status: PUBLISHED
Assigner: Dragos
Published:
Updated: 2024-11-14T17:23:37.514Z
Reserved: 2023-04-06T17:45:40.441Z
Link: CVE-2023-29446
Updated: 2024-08-02T14:07:46.304Z
Status : Modified
Published: 2024-01-10T21:15:08.603
Modified: 2024-11-21T07:57:04.453
Link: CVE-2023-29446
No data.
OpenCVE Enrichment
No data.
EUVD