Page 2 of 16 results (0.003 seconds)

CVSS: 5.0EPSS: 4%CPEs: 14EXPL: 1

The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop." • http://marc.info/?l=bugtraq&m=103235745116592&w=2 http://marc.info/?l=bugtraq&m=103236181522253&w=2 http://www.iss.net/security_center/static/10120.php http://www.securityfocus.com/bid/5713 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-051 •

CVSS: 5.0EPSS: 2%CPEs: 22EXPL: 0

Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol." • http://marc.info/?l=bugtraq&m=103235960119404&w=2 http://marc.info/?l=bugtraq&m=103236181522253&w=2 http://www.iss.net/security_center/static/10121.php http://www.iss.net/security_center/static/10122.php http://www.kb.cert.org/vuls/id/865833 http://www.securityfocus.com/bid/5711 http://www.securityfocus.com/bid/5712 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-051 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mi •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Memory leak in Terminal servers in Windows NT and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed Remote Desktop Protocol (RDP) requests to port 3389. • http://www.securityfocus.com/bid/3099 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-040 https://exchange.xforce.ibmcloud.com/vulnerabilities/6912 •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=262694 http://www.securityfocus.com/bid/1262 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036 •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 1

Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. • https://www.exploit-db.com/exploits/214 http://www.securityfocus.com/bid/1236 http://www.securityfocus.com/templates/advisory.html?id=2240 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-029 • CWE-399: Resource Management Errors •