CVE-2000-0979 – Microsoft Windows 9x/ME - Share Level Password Bypass
https://notcve.org/view.php?id=CVE-2000-0979
File and Print Sharing service in Windows 95, Windows 98, and Windows Me does not properly check the password for a file share, which allows remote attackers to bypass share access controls by sending a 1-byte password that matches the first character of the real password, aka the "Share Level Password" vulnerability. • https://www.exploit-db.com/exploits/20283 https://www.exploit-db.com/exploits/20284 https://github.com/Z6543/CVE-2000-0979 http://marc.info/?l=bugtraq&m=97147777618139&w=2 http://www.securityfocus.com/bid/1780 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-072 https://exchange.xforce.ibmcloud.com/vulnerabilities/5395 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A996 •
CVE-2000-0980
https://notcve.org/view.php?id=CVE-2000-0980
NMPI (Name Management Protocol on IPX) listener in Microsoft NWLink does not properly filter packets from a broadcast address, which allows remote attackers to cause a broadcast storm and flood the network. • http://www.securityfocus.com/bid/1781 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-073 https://exchange.xforce.ibmcloud.com/vulnerabilities/5357 •
CVE-2000-1039
https://notcve.org/view.php?id=CVE-2000-1039
Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html http://razor.bindview.com/publish/advisories/adv_NAPTHA.html http://www.cert.org/advisories/CA-2000-21.html http://www.securityfocus.com/bid/2022 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-091 •