Page 57 of 317 results (0.008 seconds)

CVSS: 5.0EPSS: 8%CPEs: 4EXPL: 1

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets. • https://www.exploit-db.com/exploits/19238 http://safenetworks.com/Windows/wins.html https://exchange.xforce.ibmcloud.com/vulnerabilities/1233 •

CVSS: 5.0EPSS: 90%CPEs: 3EXPL: 1

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. • https://www.exploit-db.com/exploits/19118 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A913 •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. • http://marc.info/?l=bugtraq&m=90221101925891&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size. • http://www.microsoft.com/technet/support/kb.asp?ID=180963 http://www.nai.com/nai_labs/asp_set/advisory/25_windows_nt_dos_adv.asp •

CVSS: 5.0EPSS: 77%CPEs: 2EXPL: 0

Bonk variation of teardrop IP fragmentation denial of service. • https://marc.info/?l=ntbugtraq&m=88901842000424&w=2 •