Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Nt Subscriptions
Total 286 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0819 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
CVE-1999-0824 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
CVE-1999-0585 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT administrator account has the default name of Administrator.
CVE-1999-0366 1 Microsoft 1 Windows Nt 2025-04-03 N/A
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
CVE-1999-0582 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
CVE-1999-0581 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
CVE-2003-0719 1 Microsoft 7 Netmeeting, Windows 2000, Windows 2003 Server and 4 more 2025-04-03 N/A
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
CVE-1999-0228 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.
CVE-1999-0579 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
CVE-1999-0578 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
CVE-2003-0715 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2025-04-03 N/A
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.
CVE-1999-0576 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
CVE-1999-0575 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
CVE-1999-0344 1 Microsoft 1 Windows Nt 2025-04-03 N/A
NT users can gain debug-level access on a system process using the Sechole exploit.
CVE-1999-0227 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service.
CVE-1999-0140 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Denial of service in RAS/PPTP on NT systems.
CVE-1999-1359 1 Microsoft 1 Windows Nt 2025-04-03 N/A
When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.
CVE-1999-1316 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an attacker to guess.
CVE-1999-1360 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.
CVE-1999-0572 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.