Page 40 of 214 results (0.011 seconds)

CVSS: 5.0EPSS: 18%CPEs: 4EXPL: 0

The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 8%CPEs: 4EXPL: 1

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets. • https://www.exploit-db.com/exploits/19238 http://safenetworks.com/Windows/wins.html https://exchange.xforce.ibmcloud.com/vulnerabilities/1233 •

CVSS: 5.0EPSS: 90%CPEs: 3EXPL: 1

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. • https://www.exploit-db.com/exploits/19118 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A913 •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. • http://marc.info/?l=bugtraq&m=90221101925891&w=2 •