Windows NT 4.0 has predictable TCP sequence numbers, allowing spoofing and session hijacking.
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2000-0328 | 2 Jun 200004:00 | – | cve |
![]() | CVE-2000-0328 | 24 Aug 199904:00 | – | nvd |
![]() | Multiple TCP/IP implementations may use statistically predictable initial sequence numbers | 13 Mar 200100:00 | – | cert |
![]() | Advisory CA-2001-09 | 3 May 200100:00 | – | securityvulns |
![]() | TCP/IP Predictable TCP Initial Sequence Number Vulnerability | 22 Apr 201300:00 | – | openvas |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/604 |
securityfocus | www.securityfocus.com/templates/archive.pike |
docs | www.docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-046 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo