{"uuid": "e4f4048d-89f7-4087-a1aa-8a1a184c87c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-50154", "type": "seen", "source": "https://t.me/GhostHeck/191", "content": "Zero Click, One NTLM: Microsoft Security Patch Bypass (CVE-2025-50154)\n\nCVE-2025-50154 allows an attacker to extract NTLM hashes without any user interaction, even on fully patched systems. By exploiting a subtle gap left in the mitigation, an attacker can trigger NTLM authentication requests automatically, enabling offline cracking or relay attacks to gain unauthorized access.", "creation_timestamp": "2025-08-14T05:34:45.000000Z"}