Page 23 of 317 results (0.004 seconds)

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

31 Dec 1999 — When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies. • http://support.microsoft.com/support/kb/articles/q163/8/75.asp •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 1999 — Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle. • http://support.microsoft.com/support/kb/articles/q160/6/50.asp •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 1999 — Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters. • http://support.microsoft.com/support/kb/articles/q160/6/01.asp •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

31 Dec 1999 — Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 1999 — Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. • http://support.microsoft.com/support/kb/articles/q142/6/53.asp •

CVSS: 6.1EPSS: 3%CPEs: 1EXPL: 1

31 Dec 1999 — GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt. • http://marc.info/?l=bugtraq&m=91788829326419&w=2 •

CVSS: 8.1EPSS: 7%CPEs: 1EXPL: 0

31 Dec 1999 — RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp •

CVSS: 9.8EPSS: 19%CPEs: 4EXPL: 0

16 Dec 1999 — Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248183 • CWE-255: Credentials Management Errors •

CVSS: 7.8EPSS: 27%CPEs: 4EXPL: 0

16 Dec 1999 — Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248185 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

10 Dec 1999 — The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed. • https://www.exploit-db.com/exploits/19673 •