{"id":742,"date":"2006-03-02T00:00:00","date_gmt":"2006-03-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/02\/top-ten-vulnerabilities-for-march-2006\/"},"modified":"2021-12-30T11:38:05","modified_gmt":"2021-12-30T11:38:05","slug":"top-ten-vulnerabilities-for-march-2006","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/02\/top-ten-vulnerabilities-for-march-2006\/","title":{"rendered":"Top Ten Vulnerabilities for March 2006"},"content":{"rendered":"<p>Null Session\/Password NetBIOS Access<br \/>\nMultiple Vendor SNMP Request and Trap Handling Vulnerabilities<br \/>\nAT&#038;T WinVNC Server Buffer Overflow and Weak Authentication Vulnerabilities<br \/>\nCisco IOS Telnet Service Remote Denial of Service Vulnerability<br \/>\nWriteable SNMP Information<br \/>\nSSH Protocol Version 1<br \/>\nOpenSSH Multiple Memory Management Vulnerabilities<br \/>\nMicrosoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability<br \/>\nUnauthenticated Access to FTP Server Allowed<br \/>\nStatd Format Bug Vulnerability <\/p>\n<p>http:\/\/www.qualsys\/security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Null Session\/Password NetBIOS Access Multiple Vendor SNMP Request and Trap Handling Vulnerabilities AT&#038;T WinVNC Server Buffer Overflow and Weak Authentication Vulnerabilities Cisco IOS Telnet Service Remote Denial of Service Vulnerability Writeable SNMP Information SSH Protocol Version 1 OpenSSH Multiple Memory Management Vulnerabilities Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-742","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=742"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/742\/revisions"}],"predecessor-version":[{"id":3229,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/742\/revisions\/3229"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}