漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote attackers to intercept web traffic by registering a proxy server using WINS or DNS, then responding to WPAD requests, as demonstrated using Internet Explorer. NOTE: it could be argued that if an attacker already has control over WINS/DNS, then web traffic could already be intercepted by modifying WINS or DNS records, so this would not cross privilege boundaries and would not be a vulnerability. It has also been reported that DHCP is an alternate attack vector.
漏洞信息
N/A
漏洞
N/A
漏洞
Microsoft Windows WPAD 默认配置漏洞
漏洞信息
Microsoft Windows的默认配置使用不带有静态WPAD入口的Web Proxy Autodiscovery Protocol (WPAD),这使得远程攻击者可以通过使用WINS或DNS来注册一个代理服务器,然后再对WPAD请求进行响应,从而中断网络流量。
漏洞信息
N/A
漏洞
N/A