Lucene search

K
MicrosoftWindows Nt

252 matches found

CVE
CVE
added 2007/04/10 11:19 p.m.43 views

CVE-2007-1912

Heap-based buffer overflow in Microsoft Windows allows user-assisted remote attackers to have an unknown impact via a crafted .HLP file.

6.8CVSS7AI score0.21615EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.42 views

CVE-1999-0228

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

5CVSS7.4AI score0.04618EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.42 views

CVE-1999-0577

A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.

10CVSS7.1AI score0.13357EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.42 views

CVE-1999-0755

Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option.

5CVSS7.2AI score0.54563EPSS
CVE
CVE
added 2000/06/02 4:0 a.m.42 views

CVE-1999-0819

NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.

5CVSS7AI score0.48131EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.42 views

CVE-1999-1127

Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.

7.5CVSS7AI score0.3003EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.42 views

CVE-1999-1452

GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt.

2.1CVSS6.6AI score0.03382EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.42 views

CVE-2001-0003

Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulner...

5CVSS7AI score0.16137EPSS
CVE
CVE
added 2005/06/21 4:0 a.m.42 views

CVE-2002-1712

Microsoft Windows 2000 allows remote attackers to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.

5CVSS7AI score0.32922EPSS
CVE
CVE
added 2005/07/14 4:0 a.m.42 views

CVE-2002-2028

The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing.

2.1CVSS6.9AI score0.01101EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.41 views

CVE-1999-1132

Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.

5CVSS7.1AI score0.19456EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.41 views

CVE-1999-1360

Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.

2.1CVSS6.4AI score0.00372EPSS
CVE
CVE
added 2000/03/22 5:0 a.m.41 views

CVE-2000-0121

The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.

3.6CVSS6.6AI score0.02119EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.41 views

CVE-2001-0373

The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.

2.1CVSS6.9AI score0.0126EPSS
CVE
CVE
added 2000/01/18 5:0 a.m.40 views

CVE-1999-0899

The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.

7.2CVSS7.6AI score0.01934EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.40 views

CVE-1999-0975

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.

4.6CVSS7.2AI score0.0025EPSS
CVE
CVE
added 2000/06/02 4:0 a.m.40 views

CVE-2000-0232

Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denial of service via a malformed TCP/IP print request.

2.1CVSS6.8AI score0.00801EPSS
CVE
CVE
added 2000/07/12 4:0 a.m.40 views

CVE-2000-0403

The CIFS Computer Browser service on Windows NT 4.0 allows a remote attacker to cause a denial of service by sending a large number of host announcement requests to the master browse tables, aka the "HostAnnouncement Flooding" or "HostAnnouncement Frame" vulnerability.

5CVSS7AI score0.13213EPSS
CVE
CVE
added 2000/07/12 4:0 a.m.40 views

CVE-2000-0404

The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.

5CVSS6.7AI score0.13213EPSS
CVE
CVE
added 2002/09/05 4:0 a.m.40 views

CVE-2002-0725

NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.

5.5CVSS6.7AI score0.00643EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.40 views

CVE-2002-1184

The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow attackers to gain privileges as other users via Trojan hor...

4.6CVSS7.2AI score0.00398EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.39 views

CVE-1999-0496

A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.

7.2CVSS7.5AI score0.00311EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.39 views

CVE-1999-0572

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

9.3CVSS7.3AI score0.08967EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.39 views

CVE-1999-0578

A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.

4.6CVSS7.1AI score0.0034EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.39 views

CVE-1999-0815

Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.

5CVSS7AI score0.17101EPSS
CVE
CVE
added 2000/07/12 4:0 a.m.39 views

CVE-2000-0377

The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability.

5CVSS6.1AI score0.12082EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.39 views

CVE-2001-0006

The Winsock2ProtocolCatalogMutex mutex in Windows NT 4.0 has inappropriate Everyone/Full Control permissions, which allows local users to modify the permissions to "No Access" and disable Winsock network connectivity to cause a denial of service, aka the "Winsock Mutex" vulnerability.

7.1CVSS6.7AI score0.00128EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.39 views

CVE-2001-0017

Memory leak in PPTP server in Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.

5CVSS6.6AI score0.19067EPSS
CVE
CVE
added 2007/10/20 10:0 a.m.39 views

CVE-2003-1407

Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command.

7.2CVSS7.9AI score0.03663EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.38 views

CVE-1999-0581

The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.

10CVSS7AI score0.04008EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.38 views

CVE-1999-1084

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

4.6CVSS6.6AI score0.00764EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.38 views

CVE-1999-1358

When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy f...

4.6CVSS6.8AI score0.00227EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.38 views

CVE-1999-1363

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.

2.1CVSS6.7AI score0.00372EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.38 views

CVE-2000-0858

Vulnerability in Microsoft Windows NT 4.0 allows remote attackers to cause a denial of service in IIS by sending it a series of malformed requests which cause INETINFO.EXE to fail, aka the "Invalid URL" vulnerability.

5CVSS6.9AI score0.20398EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.37 views

CVE-1999-0549

Windows NT automatically logs in an administrator upon rebooting.

7.2CVSS7AI score0.00411EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.37 views

CVE-1999-0969

The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.

5CVSS7.5AI score0.15287EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.36 views

CVE-1999-0534

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process...

4.6CVSS7.5AI score0.00272EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.35 views

CVE-1999-0987

Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.

10CVSS7AI score0.05512EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.35 views

CVE-1999-1359

When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.

7.5CVSS7AI score0.06691EPSS
CVE
CVE
added 2000/03/22 5:0 a.m.35 views

CVE-2000-0197

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

4.6CVSS6.9AI score0.00363EPSS
CVE
CVE
added 2000/12/19 5:0 a.m.35 views

CVE-2000-0885

Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is high...

7.5CVSS7.5AI score0.24682EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.34 views

CVE-1999-0593

The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.

4.9CVSS6.6AI score0.00494EPSS
CVE
CVE
added 2002/06/25 4:0 a.m.34 views

CVE-1999-1362

Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.

2.1CVSS6.6AI score0.00244EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.34 views

CVE-1999-1579

The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine.

5CVSS7.3AI score0.27095EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.33 views

CVE-1999-1387

Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.

5CVSS7.6AI score0.09831EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.32 views

CVE-1999-1361

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.

6.4CVSS7.4AI score0.05238EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.31 views

CVE-1999-0582

A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.

5CVSS7.4AI score0.07541EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.31 views

CVE-1999-1463

Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.

5CVSS7.7AI score0.03994EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.31 views

CVE-1999-1581

Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded.

5CVSS7.5AI score0.16507EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.30 views

CVE-1999-1217

The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.

4.6CVSS7.3AI score0.00448EPSS
Total number of security vulnerabilities252