Page 32 of 213 results (0.015 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt. • http://marc.info/?l=bugtraq&m=91788829326419&w=2 http://marc.info/?l=ntbugtraq&m=91764169410814&w=2 http://marc.info/?l=ntbugtraq&m=91822011021558&w=2 http://support.microsoft.com/support/kb/articles/q214/8/02.asp http://www.securityfocus.com/bid/198 https://exchange.xforce.ibmcloud.com/vulnerabilities/1975 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. • https://www.exploit-db.com/exploits/19798 http://marc.info/?l=ntbugtraq&m=90222453431604&w=2 http://support.microsoft.com/support/kb/articles/q103/8/61.asp http://www.ciac.org/ciac/bulletins/k-029.shtml http://www.securityfocus.com/bid/1044 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-008 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. • http://support.microsoft.com/support/kb/articles/q142/6/53.asp http://www.iss.net/security_center/static/7421.php •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup. • http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP https://exchange.xforce.ibmcloud.com/vulnerabilities/3893 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp http://www.iss.net/security_center/static/7405.php •