Page 21 of 317 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

14 Feb 2000 — The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. • http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

04 Feb 2000 — A Windows NT administrator account has the default name of Administrator. • https://www.cve.org/CVERecord?id=CVE-1999-0585 •

CVSS: 10.0EPSS: 10%CPEs: 11EXPL: 0

04 Feb 2000 — A system does not present an appropriate legal message or warning to a user who is accessing it. • http://ciac.llnl.gov/ciac/bulletins/j-043.shtml •

CVSS: 3.3EPSS: 2%CPEs: 4EXPL: 0

04 Feb 2000 — The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249108 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

04 Feb 2000 — Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file. • https://www.exploit-db.com/exploits/19743 •

CVSS: 7.1EPSS: 2%CPEs: 7EXPL: 1

01 Feb 2000 — The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability. • https://www.exploit-db.com/exploits/19739 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

20 Jan 2000 — A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. • https://exchange.xforce.ibmcloud.com/vulnerabilities/216 •

CVSS: 7.8EPSS: 2%CPEs: 7EXPL: 1

12 Jan 2000 — NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

04 Jan 2000 — After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039 • CWE-16: Configuration •

CVSS: 7.5EPSS: 24%CPEs: 4EXPL: 2

04 Jan 2000 — Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request. • https://www.exploit-db.com/exploits/19577 •