Page 3 of 20 results (0.011 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp http://www.iss.net/security_center/static/7405.php •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7422 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 1

The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges. • https://www.exploit-db.com/exploits/19359 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-008 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 1

Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. • https://www.exploit-db.com/exploits/19198 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-006 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •