Page 19 of 102 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

A system does not present an appropriate legal message or warning to a user who is accessing it. • http://ciac.llnl.gov/ciac/bulletins/j-043.shtml •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed. • https://www.exploit-db.com/exploits/19673 http://www.securityfocus.com/bid/868 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to read plaintext network passwords. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ168115 http://www.securityfocus.com/bid/829 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-052 • CWE-255: Credentials Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word. • https://www.exploit-db.com/exploits/19633 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249973 http://xforce.iss.net/search.php3?type=2&pattern=win-malformed-rtf-control-word https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005 •

CVSS: 7.6EPSS: 27%CPEs: 2EXPL: 2

The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via a long file name string, aka the "File Access URL" vulnerability. • https://www.exploit-db.com/exploits/19607 https://www.exploit-db.com/exploits/19608 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-049 •