Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows Nt
Subscriptions
Total
286 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0285 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. | ||||
CVE-1999-0288 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets. | ||||
CVE-1999-0344 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
NT users can gain debug-level access on a system process using the Sechole exploit. | ||||
CVE-1999-0366 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value. | ||||
CVE-2003-0719 | 1 Microsoft | 7 Netmeeting, Windows 2000, Windows 2003 Server and 4 more | 2025-04-03 | N/A |
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | ||||
CVE-1999-0376 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. | ||||
CVE-1999-0444 | 1 Microsoft | 3 Windows 95, Windows 98, Windows Nt | 2025-04-03 | N/A |
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. | ||||
CVE-1999-0489 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013. | ||||
CVE-1999-0496 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin. | ||||
CVE-1999-0503 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT local user or administrator account has a guessable password. | ||||
CVE-1999-0504 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT local user or administrator account has a default, null, blank, or missing password. | ||||
CVE-1999-0535 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness. | ||||
CVE-1999-0549 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT automatically logs in an administrator upon rebooting. | ||||
CVE-1999-0570 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. | ||||
CVE-1999-0572 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. | ||||
CVE-1999-0576 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. | ||||
CVE-1999-0581 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. | ||||
CVE-1999-0582 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc. | ||||
CVE-1999-0585 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT administrator account has the default name of Administrator. | ||||
CVE-1999-0593 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. |