Page 3 of 20 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device. • http://marc.info/?l=ntbugtraq&m=92127046701349&w=2 http://marc.info/?l=ntbugtraq&m=92162979530341&w=2 http://support.microsoft.com/support/kb/articles/q222/1/59.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7398 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters. • http://support.microsoft.com/support/kb/articles/q160/6/01.asp http://www.iss.net/security_center/static/7403.php •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 1

The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges. • https://www.exploit-db.com/exploits/19359 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-008 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 1

Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. • https://www.exploit-db.com/exploits/19198 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-006 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •