Système d'exploitation3133+ CVE indexées

CVE Windows Server

Toutes les vulnérabilités CVE de Windows Server (2019, 2022). Patch Tuesday et CVEs hors-cycle, données NVD en temps réel.

7HIGH
12MEDIUM

Dernières CVE Windows Server

Source : NIST NVD — mis à jour toutes les 6h

Voir les 3133
CVE-1999-0274
MEDIUM5

Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.

CVE-1999-0275
MEDIUM5

Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.

CVE-1999-0012
HIGH7

Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.

CVE-1999-1361
MEDIUM6.4

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.

CVE-1999-0288
MEDIUM5

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.

CVE-1999-0158
MEDIUM5

Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known.

CVE-1999-0200
HIGH10

Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.

CVE-1999-0597
HIGH10

A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.

CVE-1999-0404
HIGH7.5

Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.

CVE-1999-0386
MEDIUM5

Microsoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL.

CVE-1999-0229
MEDIUM5

Denial of service in Windows NT IIS server using ..\..

CVE-1999-0723
HIGH7.1

The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input.

CVE-1999-0680
MEDIUM5

Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.

CVE-1999-1222
MEDIUM5

Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.

CVE-1999-1359
HIGH7.5

When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.

CVE-2000-0089
LOW2.1

The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.

CVE-2000-0211
MEDIUM5

The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the "Misordered Windows Media Services Handshake" vulnerability.

CVE-2000-0305
HIGH7.8

Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.

CVE-2000-0505
MEDIUM5

The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters.

CVE-2000-0377
MEDIUM5

The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability.

Surveillez Windows Server automatiquement

Ajoutez Windows Server à votre parc et recevez une alerte email dès qu'une nouvelle CVE est publiée. Essai Enterprise 7 jours, sans carte bancaire.

Démarrer l'essai gratuit

Sans CB · Annulation en 1 clic