Page 59 of 317 results (0.011 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories. • http://marc.info/?l=ntbugtraq&m=87602726319426&w=2 http://marc.info/?l=ntbugtraq&m=87602726319435&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/526 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 https://exchange.xforce.ibmcloud.com/vulnerabilities/528 •

CVSS: 6.4EPSS: 0%CPEs: 4EXPL: 0

Listening TCP ports are sequentially allocated, allowing spoofing attacks. • https://www.cve.org/CVERecord?id=CVE-1999-0074 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 4

Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke. • https://www.exploit-db.com/exploits/20437 https://www.exploit-db.com/exploits/20438 https://www.exploit-db.com/exploits/20439 https://www.exploit-db.com/exploits/20440 http://www.osvdb.org/1666 •

CVSS: 5.0EPSS: 77%CPEs: 1EXPL: 0

Denial of service in Windows NT DNS servers by flooding port 53 with too many characters. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0275 •