Page 28 of 317 results (0.004 seconds)

CVSS: 4.3EPSS: 1%CPEs: 3EXPL: 2

Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp. • https://www.exploit-db.com/exploits/21260 http://marc.info/?l=vulnwatch&m=101235440104716&w=2 http://www.iss.net/security_center/static/8050.php http://www.securityfocus.com/bid/3999 •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/01/msg00278.html http://support.microsoft.com/default.aspx?scid=kb%3BEN-US%3Bq188700 http://www.heysoft.de/nt/lbh.htm http://www.securityfocus.com/bid/3933 •

CVSS: 10.0EPSS: 2%CPEs: 43EXPL: 0

Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 5.0EPSS: 1%CPEs: 43EXPL: 0

Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability." Microsoft Virtual Machine (VM) build versión 5.0.3805 y anteriores permite a los atacantes remotos determinar el nombre de usuario de un usuario local a través de un applet de Java que accede a la propiedad del sistema user.dir, también conocida como "User.dir Exposure Vulnerability". • http://www.securityfocus.com/bid/6380 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet. Las APIs de conectividad de base de datos Java (JDBC) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores permiten a los atacantes remotos eludir las comprobaciones de seguridad y acceder al contenido de la base de datos a través de un applet Java no fiable. • http://www.ciac.org/ciac/bulletins/n-026.shtml http://www.securityfocus.com/bid/6379 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 https://exchange.xforce.ibmcloud.com/vulnerabilities/10833 •