Page 42 of 214 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 https://exchange.xforce.ibmcloud.com/vulnerabilities/528 •

CVSS: 5.0EPSS: 67%CPEs: 1EXPL: 0

Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154087 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25. • http://marc.info/?l=bugtraq&m=87602167420731&w=2 http://marc.info/?l=bugtraq&m=87602167420732&w=2 http://marc.info/?l=bugtraq&m=87602167420741&w=2 •

CVSS: 5.0EPSS: 77%CPEs: 2EXPL: 0

Denial of service through Winpopup using large user names. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0292 •

CVSS: 5.0EPSS: 72%CPEs: 3EXPL: 0

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ162567 •