CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1341 | CVE-1999-1361 | Candidate | Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. | Proposed (20010912) | ACCEPT(1) Wall | MODIFY(1) Frech | NOOP(2) Cole, Foat | Frech> XF:winnt-wins-packet-flood-dos(7329) | View |
1342 | CVE-1999-1362 | Entry | Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters. | View | |||
1343 | CVE-1999-1363 | Entry | Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. | View | |||
1344 | CVE-1999-1364 | Candidate | Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. | Modified (20020218-01) | ACCEPT(3) Cole, Foat, Wall | MODIFY(1) Frech | Frech> XF:nt-threadcontext-dos(7421) | View |
1345 | CVE-1999-1365 | Entry | Windows NT searches a user"s home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default. | View |
Page 269 of 20943, showing 5 records out of 104715 total, starting on record 1341, ending on 1345