Page 22 of 213 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Windows NT allows remote attackers to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users. • http://www.securityfocus.com/archive/1/44430 http://www.securityfocus.com/bid/959 https://exchange.xforce.ibmcloud.com/vulnerabilities/4015 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-041 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A82 • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 3

Windows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of service (crash in lsass.exe) by running the NT4ALL exploit program in 'SPECIAL' mode. • https://www.exploit-db.com/exploits/21047 http://www.securityfocus.com/archive/1/201722 http://www.securityfocus.com/bid/3144 https://exchange.xforce.ibmcloud.com/vulnerabilities/6943 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 1

Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe. • http://marc.info/?l=bugtraq&m=99640583014377&w=2 http://marc.info/?l=vuln-dev&m=99651044701417&w=2 http://online.securityfocus.com/archive/1/200118 http://online.securityfocus.com/archive/1/200985 http://online.securityfocus.com/archive/1/201151 http://www.securityfocus.com/bid/3115 •

CVSS: 7.5EPSS: 3%CPEs: 35EXPL: 3

Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll. El desbordamiento de búfer en el subcomponente Microsoft Visual Studio RAD Support de FrontPage Server Extensions permite a los atacantes remotos ejecutar comandos arbitrarios a través de una solicitud de registro larga (URL) a fp30reg.dll. • https://www.exploit-db.com/exploits/20950 https://www.exploit-db.com/exploits/20951 http://marc.info/?l=bugtraq&m=99348216322147&w=2 http://www.osvdb.org/577 http://www.securityfocus.com/bid/2906 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-035 https://exchange.xforce.ibmcloud.com/vulnerabilities/6730 •