CVE-1999-0391
https://notcve.org/view.php?id=CVE-1999-0391
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •
CVE-1999-0344
https://notcve.org/view.php?id=CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-1999-1361
https://notcve.org/view.php?id=CVE-1999-1361
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. • http://marc.info/?l=bugtraq&m=90221101925891&w=2 •
CVE-1999-0015 – HP HP-UX 10.34 / Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3 - Denial of Service
https://notcve.org/view.php?id=CVE-1999-0015
Teardrop IP denial of service. • https://www.exploit-db.com/exploits/19103 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579 •
CVE-1999-1463
https://notcve.org/view.php?id=CVE-1999-1463
Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 https://exchange.xforce.ibmcloud.com/vulnerabilities/528 •