Lucene search

K
MicrosoftWindows Nt

20 matches found

CVE
CVE
added 1999/09/29 4:0 a.m.57 views

CVE-1999-0384

The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.

4.6CVSS6.8AI score0.00272EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.53 views

CVE-1999-0546

The Windows NT guest account is enabled.

4.6CVSS6.8AI score0.00472EPSS
CVE
CVE
added 2005/07/14 4:0 a.m.51 views

CVE-2002-2073

Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp.

4.3CVSS5.7AI score0.04222EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.50 views

CVE-1999-0376

Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.

4.6CVSS6.9AI score0.00306EPSS
CVE
CVE
added 2003/05/12 4:0 a.m.50 views

CVE-2003-0112

Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.

4.6CVSS6.8AI score0.03564EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.48 views

CVE-1999-0715

Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.

4.6CVSS7.3AI score0.00919EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.48 views

CVE-1999-0716

Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.

4.6CVSS7.2AI score0.01139EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.47 views

CVE-1999-1317

Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the ?? object folder using a different case letter (upper or lower) to point to a different device.

4.6CVSS6.6AI score0.01058EPSS
CVE
CVE
added 2000/04/25 4:0 a.m.43 views

CVE-1999-0824

A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.

4.6CVSS6.8AI score0.00272EPSS
CVE
CVE
added 2000/10/13 4:0 a.m.43 views

CVE-2000-0663

The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerab...

4.6CVSS7.2AI score0.00825EPSS
CVE
CVE
added 2001/02/16 5:0 a.m.43 views

CVE-2001-0046

The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vulnerabilities.

4.6CVSS6.4AI score0.00454EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.40 views

CVE-1999-0975

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.

4.6CVSS7.2AI score0.0025EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.40 views

CVE-2002-1184

The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow attackers to gain privileges as other users via Trojan hor...

4.6CVSS7.2AI score0.00398EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.39 views

CVE-1999-0578

A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.

4.6CVSS7.1AI score0.0034EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.38 views

CVE-1999-1084

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

4.6CVSS6.6AI score0.00764EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.38 views

CVE-1999-1358

When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy f...

4.6CVSS6.8AI score0.00227EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.36 views

CVE-1999-0534

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process...

4.6CVSS7.5AI score0.00272EPSS
CVE
CVE
added 2000/03/22 5:0 a.m.35 views

CVE-2000-0197

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

4.6CVSS6.9AI score0.00363EPSS
CVE
CVE
added 2000/02/04 5:0 a.m.34 views

CVE-1999-0593

The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.

4.9CVSS6.6AI score0.00494EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.30 views

CVE-1999-1217

The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.

4.6CVSS7.3AI score0.00448EPSS