info
discussion
exploit
solution
references
Microsoft Active Directory Logon Hours Username Enumeration Weakness
An attacker may use the Microsoft Windows Active Directory logon interface to exploit this issue.
Privacy Statement
Copyright 2010, SecurityFocus