Page 34 of 317 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 3

Windows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of service (crash in lsass.exe) by running the NT4ALL exploit program in 'SPECIAL' mode. • https://www.exploit-db.com/exploits/21047 http://www.securityfocus.com/archive/1/201722 http://www.securityfocus.com/bid/3144 https://exchange.xforce.ibmcloud.com/vulnerabilities/6943 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 1

Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe. • http://marc.info/?l=bugtraq&m=99640583014377&w=2 http://marc.info/?l=vuln-dev&m=99651044701417&w=2 http://online.securityfocus.com/archive/1/200118 http://online.securityfocus.com/archive/1/200985 http://online.securityfocus.com/archive/1/201151 http://www.securityfocus.com/bid/3115 •

CVSS: 7.5EPSS: 3%CPEs: 35EXPL: 3

Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll. El desbordamiento de búfer en el subcomponente Microsoft Visual Studio RAD Support de FrontPage Server Extensions permite a los atacantes remotos ejecutar comandos arbitrarios a través de una solicitud de registro larga (URL) a fp30reg.dll. • https://www.exploit-db.com/exploits/20950 https://www.exploit-db.com/exploits/20951 http://marc.info/?l=bugtraq&m=99348216322147&w=2 http://www.osvdb.org/577 http://www.securityfocus.com/bid/2906 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-035 https://exchange.xforce.ibmcloud.com/vulnerabilities/6730 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests. • http://www.ciac.org/ciac/bulletins/l-074.shtml https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-022 https://exchange.xforce.ibmcloud.com/vulnerabilities/6405 •