Page 34 of 214 results (0.022 seconds)

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248183 http://www.securityfocus.com/bid/873 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-056 • CWE-255: Credentials Management Errors •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed. • https://www.exploit-db.com/exploits/19673 http://www.securityfocus.com/bid/868 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. • https://www.exploit-db.com/exploits/23264 http://marc.info/?l=bugtraq&m=94398141118586&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users. • http://www.securityfocus.com/bid/833 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word. • https://www.exploit-db.com/exploits/19633 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249973 http://xforce.iss.net/search.php3?type=2&pattern=win-malformed-rtf-control-word https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005 •