Page 55 of 317 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0226 • CWE-19: Data Processing Errors •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. • https://exchange.xforce.ibmcloud.com/vulnerabilities/228 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

A system-critical Windows NT file or directory has inappropriate permissions. • https://www.cve.org/CVERecord?id=CVE-1999-0560 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories. • https://www.cve.org/CVERecord?id=CVE-1999-0577 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target. • http://www.securityfocus.com/archive/1/10789 https://exchange.xforce.ibmcloud.com/vulnerabilities/1383 •