Page 26 of 214 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0116.html http://www.nai.com/research/covert/advisories/045.asp http://www.securityfocus.com/bid/1620 https://exchange.xforce.ibmcloud.com/vulnerabilities/5168 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1079 •

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 2

The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. • https://www.exploit-db.com/exploits/20106 http://www.nai.com/research/covert/advisories/044.asp http://www.securityfocus.com/bid/1514 http://www.securityfocus.com/bid/1515 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-047 https://exchange.xforce.ibmcloud.com/vulnerabilities/5035 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=269049 http://www.securityfocus.com/bid/1507 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-052 https://exchange.xforce.ibmcloud.com/vulnerabilities/5040 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability. • https://www.exploit-db.com/exploits/20005 https://www.exploit-db.com/exploits/20006 http://www.microsoft.com/technet/support/kb.asp?ID=264684 http://www.securityfocus.com/bid/1331 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-040 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1021 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0231.html http://www.securityfocus.com/bid/1304 •