
CVE-1999-1363
https://notcve.org/view.php?id=CVE-1999-1363
31 Dec 1999 — Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp •

CVE-1999-1455
https://notcve.org/view.php?id=CVE-1999-1455
31 Dec 1999 — RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp •

CVE-1999-0382 – Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4 / NT 3.5.1/SP1/SP2/SP3/SP4/SP5 - Screensaver
https://notcve.org/view.php?id=CVE-1999-0382
12 Mar 1999 — The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges. • https://www.exploit-db.com/exploits/19359 •

CVE-1999-0376 – Microsoft Windows NT 4.0 SP4 - Known DLL Cache
https://notcve.org/view.php?id=CVE-1999-0376
20 Feb 1999 — Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. • https://www.exploit-db.com/exploits/19198 •

CVE-1999-0391
https://notcve.org/view.php?id=CVE-1999-0391
05 Jan 1999 — The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •

CVE-1999-0344
https://notcve.org/view.php?id=CVE-1999-0344
01 Aug 1998 — NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-1999-1361
https://notcve.org/view.php?id=CVE-1999-1361
09 May 1998 — Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. • http://marc.info/?l=bugtraq&m=90221101925891&w=2 •

CVE-1999-0015 – HP HP-UX 10.34 / Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3 - Denial of Service
https://notcve.org/view.php?id=CVE-1999-0015
16 Dec 1997 — Teardrop IP denial of service. • https://www.exploit-db.com/exploits/19103 •

CVE-1999-1463
https://notcve.org/view.php?id=CVE-1999-1463
10 Jul 1997 — Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 •

CVE-1999-0179
https://notcve.org/view.php?id=CVE-1999-0179
01 Jan 1997 — Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ140818 • CWE-17: DEPRECATED: Code •