Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Nt Subscriptions
Total 286 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2000-0328 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking.
CVE-2000-0331 1 Microsoft 3 Terminal Server, Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.
CVE-1999-0077 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Predictable TCP sequence numbers allow spoofing.
CVE-1999-1234 1 Microsoft 1 Windows Nt 2025-04-03 N/A
LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.
CVE-1999-1222 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.
CVE-1999-0535 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
CVE-1999-1084 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
CVE-1999-0995 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
CVE-1999-0504 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT local user or administrator account has a default, null, blank, or missing password.
CVE-1999-0275 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.
CVE-1999-0994 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
CVE-1999-0980 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.
CVE-1999-0503 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT local user or administrator account has a guessable password.
CVE-1999-0918 1 Microsoft 4 Windows 2000, Windows 95, Windows 98 and 1 more 2025-04-03 N/A
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
CVE-2001-1122 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of service (crash in lsass.exe) by running the NT4ALL exploit program in 'SPECIAL' mode.
CVE-1999-0898 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.
CVE-1999-0496 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
CVE-1999-0274 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.
CVE-1999-0153 2 Microsoft, Sco 4 Windows 2000, Windows 95, Windows Nt and 1 more 2025-04-03 N/A
Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.
CVE-2004-1305 2 Microsoft, Nortel 19 Windows 2000, Windows 2003 Server, Windows 98 and 16 more 2025-04-03 N/A
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.