Page 47 of 317 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. • https://www.exploit-db.com/exploits/23264 http://marc.info/?l=bugtraq&m=94398141118586&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users. • http://www.securityfocus.com/bid/833 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237923 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word. • https://www.exploit-db.com/exploits/19633 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249973 http://xforce.iss.net/search.php3?type=2&pattern=win-malformed-rtf-control-word https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649 http://www.securityfocus.com/bid/768 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •