Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0315
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
fasttrack p2p, as used in (1) KaZaA, (2) grokster, and (3) morpheus allows remote attackers to spoof other users by modifying the username and network information in the message header.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
FastTrack P2P技术信息服务存在身份欺骗漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
KaZaA, Grokster和Morpheus是基于FastTrack P2P技术的文件共享客户端,它们运行于Microsoft Windows平台,并已经移植到Linux平台。 用户可以通过受影响客户端的消息服务伪造一个HTTP GET头来伪装成一个已经存在的用户。不过伪造头的主机和用户名必须是合法的。 客户端的消息服务默认在1214端口监听,即使没有任何连接到该服务。 基于FastTrack P2P技术的文件共享客户端如果有消息功能可能都会有这个漏洞。 这是一个安全漏洞,因为访问控制是基于客户端的身
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0315
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0315
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2002-0315

No comments yet


Leave a comment