Page 37 of 317 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability. • http://www.securityfocus.com/archive/1/143991 http://www.securityfocus.com/bid/1924 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-087 https://exchange.xforce.ibmcloud.com/vulnerabilities/5489 •

CVSS: 5.0EPSS: 0%CPEs: 32EXPL: 0

Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back. • http://www.securityfocus.com/archive/1/63322 http://www.securityfocus.com/bid/1301 •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 1

Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html http://razor.bindview.com/publish/advisories/adv_NAPTHA.html http://www.cert.org/advisories/CA-2000-21.html http://www.securityfocus.com/bid/2022 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-091 •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 0

The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B242366 http://www.kb.cert.org/vuls/id/3062 http://www.securityfocus.com/bid/6827 https://exchange.xforce.ibmcloud.com/vulnerabilities/7107 •

CVSS: 7.5EPSS: 43%CPEs: 6EXPL: 0

Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-083 https://exchange.xforce.ibmcloud.com/vulnerabilities/5399 •