Vulnerabilities
Vulnerable Software
Microsoft:  >> Backoffice  >> 4.5  Security Vulnerabilities
Microsoft BackOffice 4.0 and 4.5, when configured to be accessible by other systems, allows remote attackers to bypass authentication and access the administrative ASP pages via an HTTP request with an authorization type (auth_type) that is not blank.
CVSS Score
10.0
EPSS Score
0.128
Published
2002-08-12


Contact Us

Shodan ® - All rights reserved