Page 4 of 20 results (0.020 seconds)

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. • http://marc.info/?l=bugtraq&m=90221101925891&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 1

Teardrop IP denial of service. • https://www.exploit-db.com/exploits/19103 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 https://exchange.xforce.ibmcloud.com/vulnerabilities/528 •