Vulnerabilities
Vulnerable Software
Nefarious2 Project:  Security Vulnerabilities
The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
CVSS Score
9.8
EPSS Score
0.004
Published
2017-03-07


Contact Us

Shodan ® - All rights reserved