Search Results (287 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-0549 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT automatically logs in an administrator upon rebooting.
CVE-1999-0560 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A system-critical Windows NT file or directory has inappropriate permissions.
CVE-1999-0570 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
CVE-1999-0576 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
CVE-1999-0577 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
CVE-2003-0807 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2025-04-03 N/A
Buffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.
CVE-2004-0123 1 Microsoft 7 Windows 2000, Windows 2003 Server, Windows 98 and 4 more 2025-04-03 N/A
Double free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code.
CVE-1999-0015 4 Hp, Microsoft, Netbsd and 1 more 5 Hp-ux, Windows 95, Windows Nt and 2 more 2025-04-03 N/A
Teardrop IP denial of service.
CVE-1999-0716 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
CVE-1999-0499 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
NETBIOS share information may be published through SNMP registry keys in NT.
CVE-1999-0519 1 Microsoft 4 Outlook, Windows 2000, Windows 95 and 1 more 2025-04-03 N/A
A NETBIOS/SMB share password is the default, null, or missing.
CVE-1999-0534 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
CVE-1999-0562 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
The registry in Windows NT can be accessed remotely by users who are not administrators.
CVE-1999-0582 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
CVE-1999-0715 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
CVE-1999-0721 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
CVE-1999-0726 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header.
CVE-1999-1358 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only.
CVE-2000-0305 2 Be, Microsoft 6 Beos, Terminal Server, Windows 2000 and 3 more 2025-04-03 N/A
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
CVE-2000-0663 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.