Teardrop IP denial of service.
Max CVSS
5.0
EPSS Score
0.13%
Published
1997-12-16
Updated
2018-05-03
Land IP denial of service.
Max CVSS
5.0
EPSS Score
0.15%
Published
1997-12-01
Updated
2008-09-09
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
Max CVSS
6.4
EPSS Score
0.24%
Published
1997-07-01
Updated
2022-08-17
Predictable TCP sequence numbers allow spoofing.
Max CVSS
5.0
EPSS Score
0.30%
Published
1995-01-01
Updated
2017-10-10
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.
Max CVSS
5.0
EPSS Score
1.49%
Published
1997-12-16
Updated
2018-08-22
Windows NT 4.0 beta allows users to read and delete shares.
Max CVSS
10.0
EPSS Score
0.35%
Published
1999-01-19
Updated
2022-08-17
Denial of service in RAS/PPTP on NT systems.
Max CVSS
5.0
EPSS Score
0.30%
Published
1999-06-30
Updated
2022-08-17
Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.
Max CVSS
5.0
EPSS Score
0.30%
Published
1997-07-01
Updated
2008-09-09
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Max CVSS
5.0
EPSS Score
7.50%
Published
1997-01-01
Updated
2018-08-13
Denial of service in Windows NT messenger service through a long username.
Max CVSS
5.0
EPSS Score
0.21%
Published
1999-07-23
Updated
2022-08-17
Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size.
Max CVSS
5.0
EPSS Score
0.28%
Published
1998-02-14
Updated
2008-09-09
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
Max CVSS
10.0
EPSS Score
0.54%
Published
1999-01-01
Updated
2022-08-17
Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service.
Max CVSS
5.0
EPSS Score
67.32%
Published
1997-06-01
Updated
2018-08-13
Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.
Max CVSS
5.0
EPSS Score
72.79%
Published
1997-02-07
Updated
2018-08-13
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Max CVSS
7.2
EPSS Score
0.21%
Published
1997-01-01
Updated
2022-08-17

CVE-1999-0256

Public exploit
Buffer overflow in War FTP allows remote execution of commands.
Max CVSS
7.5
EPSS Score
96.21%
Published
1998-02-01
Updated
2008-09-09
Bonk variation of teardrop IP fragmentation denial of service.
Max CVSS
5.0
EPSS Score
77.56%
Published
1998-02-13
Updated
2022-08-17
Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.
Max CVSS
5.0
EPSS Score
77.56%
Published
1997-01-01
Updated
2022-08-17
Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.
Max CVSS
5.0
EPSS Score
77.56%
Published
1997-06-10
Updated
2022-08-17
In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
Max CVSS
5.0
EPSS Score
90.53%
Published
1998-06-01
Updated
2018-10-12
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.
Max CVSS
10.0
EPSS Score
0.47%
Published
1999-01-01
Updated
2022-08-17
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
Max CVSS
5.0
EPSS Score
8.35%
Published
1998-08-01
Updated
2018-05-03
Denial of service through Winpopup using large user names.
Max CVSS
5.0
EPSS Score
77.56%
Published
1997-04-01
Updated
2022-08-17
NT users can gain debug-level access on a system process using the Sechole exploit.
Max CVSS
7.2
EPSS Score
0.05%
Published
1998-08-01
Updated
2018-10-12
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Max CVSS
7.5
EPSS Score
1.00%
Published
1999-02-08
Updated
2018-10-12
253 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!