Page 41 of 317 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. • http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html http://www.securityfocus.com/bid/1050 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file. • https://www.exploit-db.com/exploits/19743 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0129 •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

A system does not present an appropriate legal message or warning to a user who is accessing it. • http://ciac.llnl.gov/ciac/bulletins/j-043.shtml •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249108 http://www.securityfocus.com/bid/947 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-004 •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

A Windows NT administrator account has the default name of Administrator. • https://www.cve.org/CVERecord?id=CVE-1999-0585 •