An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability.
This module tries to verify if the vulnerability is present, without deploying an agent.
This module tries to verify if the vulnerability is present, without deploying an agent.
CVE Link
Exploit Type - Old
Exploits/Remote
Exploit Platform
Product Name