Page 45 of 317 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. • http://support.microsoft.com/support/kb/articles/q142/6/53.asp http://www.iss.net/security_center/static/7421.php •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup. • http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP https://exchange.xforce.ibmcloud.com/vulnerabilities/3893 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission. • http://support.microsoft.com/support/kb/articles/q146/6/04.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/562 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. • http://support.microsoft.com/support/kb/articles/q163/1/43.asp http://www.iss.net/security_center/static/7405.php •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. • http://support.microsoft.com/support/kb/articles/q158/3/20.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/7422 •