- EPSS 8.55%
- Veröffentlicht 05.10.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting pac...
CVE-1999-0505
- EPSS 0.74%
- Veröffentlicht 01.10.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
A Windows NT domain user or administrator account has a guessable password.
CVE-1999-0506
- EPSS 8.67%
- Veröffentlicht 01.10.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
CVE-1999-0546
- EPSS 0.47%
- Veröffentlicht 01.10.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Windows NT guest account is enabled.
- EPSS 15.29%
- Veröffentlicht 29.09.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
- EPSS 26.56%
- Veröffentlicht 01.08.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
CVE-1999-0344
- EPSS 0.44%
- Veröffentlicht 01.08.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
NT users can gain debug-level access on a system process using the Sechole exploit.
- EPSS 76.06%
- Veröffentlicht 01.06.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
CVE-1999-1361
- EPSS 5.24%
- Veröffentlicht 09.05.1998 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error ...
- EPSS 16.12%
- Veröffentlicht 14.02.1998 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size.