Page 119 of 637 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0231.html http://www.securityfocus.com/bid/1304 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 1

The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability. • http://www.securityfocus.com/bid/1295 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-032 •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=262694 http://www.securityfocus.com/bid/1262 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036 •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 1

Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. • https://www.exploit-db.com/exploits/214 http://www.securityfocus.com/bid/1236 http://www.securityfocus.com/templates/advisory.html?id=2240 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-029 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

NTMail 5.x allows network users to bypass the NTMail proxy restrictions by redirecting their requests to NTMail's web configuration server. • http://www.gordano.com/support/archives/ntmail/2000-05/00001114.htm http://www.securityfocus.com/bid/1196 http://www.securityfocus.com/templates/archive.pike?list=1&msg=NABBJLKKPKIHDIMKFKGCMEFANMAB.georger%40nls.net •