Page 33 of 214 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp http://www.iss.net/security_center/static/7405.php •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7422 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs. • http://marc.info/?l=bugtraq&m=90763508011966&w=2 http://marc.info/?l=ntbugtraq&m=90760603030452&w=2 http://support.microsoft.com/support/kb/articles/Q179/1/57.asp http://www.iss.net/security_center/static/1399.php •

CVSS: 7.5EPSS: 94%CPEs: 4EXPL: 0

Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability. • http://support.microsoft.com/support/kb/articles/Q195/7/33.asp http://www.iss.net/security_center/static/523.php https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.8EPSS: 2%CPEs: 4EXPL: 0

Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248185 http://www.securityfocus.com/bid/875 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057 • CWE-20: Improper Input Validation •