Page 62 of 317 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

The registry in Windows NT can be accessed remotely by users who are not administrators. • https://www.exploit-db.com/exploits/19372 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1023 •

CVSS: 5.0EPSS: 7%CPEs: 2EXPL: 0

Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ140818 • CWE-17: DEPRECATED: Code •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

NETBIOS share information may be published through SNMP registry keys in NT. • https://www.cve.org/CVERecord?id=CVE-1999-0499 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ146965 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 77%CPEs: 3EXPL: 0

Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0274 •