Page 2 of 9 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device. • http://marc.info/?l=ntbugtraq&m=92127046701349&w=2 http://marc.info/?l=ntbugtraq&m=92162979530341&w=2 http://support.microsoft.com/support/kb/articles/q222/1/59.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7398 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters. • http://support.microsoft.com/support/kb/articles/q160/6/01.asp http://www.iss.net/security_center/static/7403.php •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7422 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session. • http://www.securityfocus.com/archive/1/7219 https://exchange.xforce.ibmcloud.com/vulnerabilities/528 •