Vulnerabilities > Microsoft > Medium

DATE CVE VULNERABILITY TITLE RISK
1998-02-14 CVE-1999-0225 Unspecified vulnerability in Microsoft Windows NT 4.0
Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size.
network
low complexity
microsoft
5.0
1998-02-13 CVE-1999-0258 Unspecified vulnerability in Microsoft Windows 95 and Windows NT
Bonk variation of teardrop IP fragmentation denial of service.
network
low complexity
microsoft
5.0
1998-02-06 CVE-1999-0012 Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.
network
low complexity
netscape microsoft
5.0
1997-12-23 CVE-1999-1581 Unspecified vulnerability in Microsoft Windows NT 4.0
Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded.
network
low complexity
microsoft
5.0
1997-12-16 CVE-1999-0104 A later variation on the Teardrop IP denial of service attack, a.k.a.
network
low complexity
caldera hp microsoft sun
5.0
1997-12-16 CVE-1999-0015 Teardrop IP denial of service.
network
low complexity
hp microsoft netbsd sun
5.0
1997-12-01 CVE-1999-0016 Land IP denial of service.
network
low complexity
cisco gnu microsoft hp netbsd sun
5.0
1997-10-01 CVE-1999-0294 Unspecified vulnerability in Microsoft Wins
All records in a WINS database can be deleted through SNMP for a denial of service.
network
low complexity
microsoft
5.0
1997-09-01 CVE-1999-0191 Unspecified vulnerability in Microsoft Internet Information Server 3.0
IIS newdsn.exe CGI script allows remote users to overwrite files.
network
low complexity
microsoft
6.4
1997-07-25 CVE-1999-1217 Unspecified vulnerability in Microsoft Windows NT
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
local
low complexity
microsoft
4.6