Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j989-83h4-x7f9

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.

EPSS

Процентиль: 96%
0.26564
Средний

Связанные уязвимости

nvd
около 27 лет назад

The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.

EPSS

Процентиль: 96%
0.26564
Средний