Page 39 of 214 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 1

Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. • https://www.exploit-db.com/exploits/19198 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-006 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ214840 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-004 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 beta allows users to read and delete shares. • https://exchange.xforce.ibmcloud.com/vulnerabilities/11 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. • https://marc.info/?l=bugtraq&m=91552769809542&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target. • http://www.securityfocus.com/archive/1/10789 https://exchange.xforce.ibmcloud.com/vulnerabilities/1383 •