Page 30 of 214 results (0.004 seconds)

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. • https://exchange.xforce.ibmcloud.com/vulnerabilities/216 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869 http://www.bindview.com/security/advisory/adv_NtImpersonate.html http://www.securityfocus.com/bid/934 http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039 http://www.securityfocus.com/bid/626 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036 • CWE-16: Configuration •

CVSS: 5.0EPSS: 8%CPEs: 4EXPL: 2

Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request. • https://www.exploit-db.com/exploits/19577 https://www.exploit-db.com/exploits/19578 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246045 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-055 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries. • http://support.microsoft.com/support/kb/articles/q196/2/70.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/1974 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A952 •