Page 48 of 317 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. • https://www.exploit-db.com/exploits/19594 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649 http://www.securityfocus.com/bid/769 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 18%CPEs: 1EXPL: 0

LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo. • http://marc.info/?l=ntbugtraq&m=94096671308565&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/3293 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238453 http://www.securityfocus.com/bid/646 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 1

The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager. • https://www.exploit-db.com/exploits/19502 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242294 http://www.securityfocus.com/bid/645 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-041 • CWE-16: Configuration •

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking. • http://www.securityfocus.com/bid/604 http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.19990824165629.00abcb40%40192.168.124.1 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-046 •