Language:
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2005/ms05-019
https://downloads.avaya.com/elmodocs2/security/ASA-2006-217.htm
http://www.kb.cert.org/vuls/id/JARL-5ZQR4D
http://www-01.ibm.com/support/docview.wss?uid=isg1IY55949
http://www-01.ibm.com/support/docview.wss?uid=isg1IY55950
http://www-01.ibm.com/support/docview.wss?uid=isg1IY62006
http://www.juniper.net/support/security/alerts/niscc-236929.txt
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-064
http://www.kb.cert.org/vuls/id/JARL-5YGQ9G
http://www.kb.cert.org/vuls/id/JARL-5ZQR7H
http://www.kb.cert.org/vuls/id/JARL-5YGQAJ
Severity: Medium
ID: 12213
File Name: tcp_seq_window.nasl
Version: 1.44
Type: remote
Family: Denial of Service
Published: 4/25/2004
Updated: 3/6/2019
Supported Sensors: Nessus
Risk Factor: Low
Score: 2.2
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 4/20/2004
CVE: CVE-2004-0230
BID: 10183
CERT: 415294