Universal Plug and Play (UPnP) in Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service (memory consumption or crash) via a malformed UPnP request.
Max CVSS
5.0
EPSS Score
3.29%
Published
2001-12-06
Updated
2018-10-12
Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system.
Max CVSS
5.0
EPSS Score
97.23%
Published
2001-12-20
Updated
2018-10-12
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.
Max CVSS
5.0
EPSS Score
0.44%
Published
2001-12-20
Updated
2019-04-30
The Remote Desktop client in Windows XP sends the most recent user account name in cleartext, which could allow remote attackers to obtain terminal server user account names via sniffing.
Max CVSS
5.0
EPSS Score
1.57%
Published
2001-12-31
Updated
2008-09-05
SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.
Max CVSS
5.0
EPSS Score
96.32%
Published
2002-03-08
Updated
2020-04-09
XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.
Max CVSS
5.0
EPSS Score
2.44%
Published
2002-03-08
Updated
2021-07-23
Windows XP with port 445 open allows remote attackers to cause a denial of service (CPU consumption) via a flood of TCP SYN packets containing possibly malformed data.
Max CVSS
5.0
EPSS Score
20.09%
Published
2002-05-31
Updated
2016-10-18
Unknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows 98 Second Edition, Windows Millennium, Windows NT 4.0, Windows 2000, and Windows XP allow remote attackers to delete digital certificates on a user's system via HTML.
Max CVSS
5.0
EPSS Score
1.25%
Published
2002-10-04
Updated
2018-10-12
Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."
Max CVSS
5.0
EPSS Score
2.27%
Published
2002-10-11
Updated
2019-04-30
The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop."
Max CVSS
5.0
EPSS Score
5.52%
Published
2002-10-11
Updated
2019-04-30
Help and Support Center for Windows XP allows remote attackers to delete arbitrary files via a link to the hcp: protocol that accesses uplddrvinfo.htm.
Max CVSS
5.0
EPSS Score
2.37%
Published
2002-09-24
Updated
2018-10-12
The Compressed Folders feature in Microsoft Windows 98 with Plus! Pack, Windows Me, and Windows XP does not properly check the destination folder during the decompression of ZIP files, which allows attackers to place an executable file in a known location on a user's system, aka "Incorrect Target Path for Zipped File Decompression."
Max CVSS
5.0
EPSS Score
0.88%
Published
2002-10-11
Updated
2018-10-12
The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.
Max CVSS
5.0
EPSS Score
0.72%
Published
2002-12-23
Updated
2019-04-30
Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error.
Max CVSS
5.0
EPSS Score
16.20%
Published
2002-12-23
Updated
2019-04-30
Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability."
Max CVSS
5.0
EPSS Score
1.11%
Published
2002-12-23
Updated
2019-04-30
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference.
Max CVSS
5.0
EPSS Score
56.30%
Published
2003-04-02
Updated
2019-04-30
Microsoft Windows XP allows remote attackers to cause a denial of service (CPU consumption) by flooding UDP port 500 (ISAKMP).
Max CVSS
5.0
EPSS Score
0.56%
Published
2002-12-31
Updated
2008-09-05
The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information.
Max CVSS
5.0
EPSS Score
0.93%
Published
2003-10-20
Updated
2019-04-30
Buffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.
Max CVSS
5.0
EPSS Score
8.24%
Published
2004-06-01
Updated
2018-10-12
A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.
Max CVSS
5.1
EPSS Score
60.83%
Published
2003-11-17
Updated
2024-02-15
Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.
Max CVSS
5.0
EPSS Score
40.20%
Published
2003-12-15
Updated
2019-04-30
Help and Support Center in Microsoft Windows XP SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code via quotation marks in an hcp:// URL, which are not quoted when constructing the argument list to HelpCtr.exe.
Max CVSS
5.1
EPSS Score
88.16%
Published
2004-06-01
Updated
2024-02-13
An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.
Max CVSS
5.0
EPSS Score
47.77%
Published
2004-06-01
Updated
2018-10-12
The Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.
Max CVSS
5.0
EPSS Score
96.67%
Published
2004-06-01
Updated
2018-10-12
Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).
Max CVSS
5.1
EPSS Score
96.06%
Published
2004-06-14
Updated
2018-10-12
71 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!