Page 42 of 317 results (0.012 seconds)

CVSS: 3.6EPSS: 0%CPEs: 7EXPL: 1

The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability. • https://www.exploit-db.com/exploits/19739 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248399 http://www.securityfocus.com/bid/963 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-007 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. • https://exchange.xforce.ibmcloud.com/vulnerabilities/216 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869 http://www.bindview.com/security/advisory/adv_NtImpersonate.html http://www.securityfocus.com/bid/934 http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039 http://www.securityfocus.com/bid/626 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036 • CWE-16: Configuration •

CVSS: 5.0EPSS: 8%CPEs: 4EXPL: 2

Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request. • https://www.exploit-db.com/exploits/19577 https://www.exploit-db.com/exploits/19578 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246045 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-055 •