Page 121 of 637 results (0.013 seconds)

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 1

Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denial of service via a malformed TCP/IP print request. • https://www.exploit-db.com/exploits/19827 http://archives.neohapsis.com/archives/bugtraq/2000-03/0306.html http://www.securityfocus.com/bid/1082 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-021 •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

The installation for Windows 2000 does not activate the Administrator password until the system has rebooted, which allows remote attackers to connect to the ADMIN$ share without a password until the reboot occurs. La instalación para Windows 2000 no activa la contraseña de administrador hasta que el sistema se ha reiniciado, lo que permite a los atacantes remotos conectarse al recurso compartido ADMIN$ sin contraseña hasta que se produzca el reinicio. • http://www.securityfocus.com/bid/990 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000215155750.M4500%40safe.hsc.fr •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

A system does not present an appropriate legal message or warning to a user who is accessing it. • http://ciac.llnl.gov/ciac/bulletins/j-043.shtml •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

A Windows NT administrator account has the default name of Administrator. • https://www.cve.org/CVERecord?id=CVE-1999-0585 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. • https://exchange.xforce.ibmcloud.com/vulnerabilities/216 •