
CVE-2009-3588
https://notcve.org/view.php?id=CVE-2009-3588
13 Oct 2009 — Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587. Vulnerabilidad inespecífica en el componente arclib en el... • http://secunia.com/advisories/36976 •

CVE-2004-0728 – Microsoft Windows SMS 2.0 - Denial of Service
https://notcve.org/view.php?id=CVE-2004-0728
23 Jul 2004 — The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address. El servicio de Cliente de Control Remoto de Microsoft's Systems Management Server (SMS) 2.50.2726.0 permite a atacantes remotos causar una denegación de servicio (caída) mediante un paquete de datos al puerto TCP 2702 que causa que el servidor lea o esc... • https://www.exploit-db.com/exploits/366 •

CVE-2000-0885
https://notcve.org/view.php?id=CVE-2000-0885
29 Nov 2000 — Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-083 •

CVE-2000-0100 – Microsoft Systems Management Server 2.0 - Default Permissions
https://notcve.org/view.php?id=CVE-2000-0100
29 Dec 1999 — The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program. • https://www.exploit-db.com/exploits/19728 •