Page 61 of 637 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

Unspecified vulnerability in Windows 2000 Advanced Server SP4 running Active Directory allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain VulnDisco Pack module. NOTE: the provenance of this information is unknown; the details are obtained from third party information. As of 20061116, this disclosure has no actionable information. However, since the VulnDisco Pack author is a reliable researcher, the disclosure is being assigned a CVE identifier for tracking purposes. Vulnerabilidad no especificada en Windows 2000 Advanced SErver SP4 ejecutando el Directorio Activo permite a atacantes remotos provocar una denegación de servicio a través de vectores no especificados, como se ha demostrado con un determinado módulo VulnDisco Pack. • http://secunia.com/advisories/22871 http://www.securityfocus.com/bid/21083 •

CVSS: 5.0EPSS: 56%CPEs: 3EXPL: 0

Unspecified vulnerability in the driver for the Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to cause a denial of service (hang and reboot) via has unknown attack vectors, aka "NetWare Driver Denial of Service Vulnerability." Vulnerabilidad no especificada en el controlador para Client Service for NetWare (CSNW) en Microsoft Windows 2000 SP4, XP SP2, y Server 2003 hasta el SP1 permite a atacantes remotos provocar una denegación de servicio (cuelgue o reinicio) mediante vectores de ataque desconocidos, también conocido como "Vulnerabilidad de denegación de servicio del controlador NetWare". • http://secunia.com/advisories/22866 http://securitytracker.com/id?1017224 http://www.securityfocus.com/archive/1/451844/100/0/threaded http://www.securityfocus.com/bid/20984 http://www.us-cert.gov/cas/techalerts/TA06-318A.html http://www.vupen.com/english/advisories/2006/4504 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A413 •

CVSS: 7.5EPSS: 96%CPEs: 3EXPL: 2

Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability." Desbordamiento de búfer en Client Service for NetWare (CSNW) en Microsoft Windows 2000 SP4, XP SP2, y Server 2003 hasta el SP1 permite a atacantes remotos ejecutar código de su elección mediante mensajes artesanales, también conocido como "Vulnerabilidad de corrupción de memoria en Client Service for NetWare". • https://www.exploit-db.com/exploits/16373 https://www.exploit-db.com/exploits/16369 http://secunia.com/advisories/22866 http://securitytracker.com/id?1017224 http://www.securityfocus.com/archive/1/451844/100/0/threaded http://www.securityfocus.com/bid/21023 http://www.us-cert.gov/cas/techalerts/TA06-318A.html http://www.vupen.com/english/advisories/2006/4504 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 https://exchange.xforce.ibmcloud.c •

CVSS: 10.0EPSS: 96%CPEs: 2EXPL: 4

Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname. Desbordamiento de búfer basado en pila en la función NetpManageIPCConnect del servicio Workstation (wkssvc.dll) en Microsoft Windows 2000 SP4 y XP SP2 permite a atacantes remotos ejecutar código de su elección mediante mensajes RPC NetrJoinDomain2 con un nombre de anfitrión largo. • https://www.exploit-db.com/exploits/2809 https://www.exploit-db.com/exploits/2789 https://www.exploit-db.com/exploits/2800 https://www.exploit-db.com/exploits/16372 http://research.eeye.com/html/advisories/published/AD20061114.html http://secunia.com/advisories/22883 http://securitytracker.com/id?1017221 http://www.kb.cert.org/vuls/id/778036 http://www.securityfocus.com/archive/1/451588/100/0/threaded http://www.securityfocus.com/bid/20985 http://www.us-cert.g •

CVSS: 7.5EPSS: 56%CPEs: 8EXPL: 0

Integer overflow in the ReadWideString function in agentdpv.dll in Microsoft Agent on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a large length value in an .ACF file, which results in a heap-based buffer overflow. Microsoft Agent en Microsoft Windows 2000 SP4, XP SP2, y Server 2003 hasta el SP1 permite a atacantes remotos ejecutar código de su elección mediante un fichero .ACF artesanal que dispara una corrupción de memoria. • http://secunia.com/advisories/22878 http://securitytracker.com/id?1017222 http://www.coseinc.com/alert.html http://www.kb.cert.org/vuls/id/810772 http://www.securityfocus.com/archive/1/458558/100/0/threaded http://www.securityfocus.com/bid/21034 http://www.us-cert.gov/cas/techalerts/TA06-318A.html http://www.vupen.com/english/advisories/2006/4506 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-068 https://exchange.xforce.ibmcloud.com/vuln • CWE-189: Numeric Errors •