Page 56 of 317 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

A Windows NT domain user or administrator account has a guessable password. • https://www.cve.org/CVERecord?id=CVE-1999-0505 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The Windows NT guest account is enabled. • https://www.cve.org/CVERecord?id=CVE-1999-0546 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

A Windows NT domain user or administrator account has a default, null, blank, or missing password. • https://www.cve.org/CVERecord?id=CVE-1999-0506 •

CVSS: 5.0EPSS: 18%CPEs: 4EXPL: 0

The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 • CWE-264: Permissions, Privileges, and Access Controls •