Page 19 of 317 results (0.004 seconds)

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 1

09 Jan 2001 — Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability. • http://www.securityfocus.com/archive/1/143991 •

CVSS: 7.5EPSS: 15%CPEs: 32EXPL: 0

31 Dec 2000 — Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back. • http://www.securityfocus.com/archive/1/63322 •

CVSS: 7.5EPSS: 13%CPEs: 5EXPL: 1

19 Dec 2000 — Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction tha... • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html •

CVSS: 7.5EPSS: 33%CPEs: 1EXPL: 0

14 Dec 2000 — The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B242366 •

CVSS: 9.8EPSS: 13%CPEs: 6EXPL: 0

29 Nov 2000 — Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-083 •

CVSS: 7.5EPSS: 20%CPEs: 2EXPL: 0

14 Nov 2000 — Vulnerability in Microsoft Windows NT 4.0 allows remote attackers to cause a denial of service in IIS by sending it a series of malformed requests which cause INETINFO.EXE to fail, aka the "Invalid URL" vulnerability. • http://archives.neohapsis.com/archives/vendor/2000-q3/0065.html •

CVSS: 7.5EPSS: 11%CPEs: 4EXPL: 0

29 Aug 2000 — Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0116.html •

CVSS: 7.5EPSS: 17%CPEs: 3EXPL: 2

27 Jul 2000 — The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. • https://www.exploit-db.com/exploits/20106 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

25 Jul 2000 — The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=269049 •

CVSS: 5.5EPSS: 15%CPEs: 1EXPL: 2

08 Jun 2000 — The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability. • https://www.exploit-db.com/exploits/20005 •