Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows Nt
Subscriptions
Total
286 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0366 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value. | ||||
CVE-1999-0344 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
NT users can gain debug-level access on a system process using the Sechole exploit. | ||||
CVE-1999-0226 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service. | ||||
CVE-1999-0119 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT 4.0 beta allows users to read and delete shares. | ||||
CVE-1999-0074 | 4 Freebsd, Linux, Microsoft and 1 more | 4 Freebsd, Linux Kernel, Windows Nt and 1 more | 2025-04-03 | N/A |
Listening TCP ports are sequentially allocated, allowing spoofing attacks. | ||||
CVE-1999-0570 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. | ||||
CVE-1999-0572 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. | ||||
CVE-1999-0575 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking. | ||||
CVE-1999-0576 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. | ||||
CVE-1999-0577 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories. | ||||
CVE-1999-0578 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | ||||
CVE-1999-0579 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. | ||||
CVE-1999-0581 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. | ||||
CVE-1999-0582 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc. | ||||
CVE-1999-0585 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT administrator account has the default name of Administrator. | ||||
CVE-1999-0590 | 3 Apple, Linux, Microsoft | 6 Macos, Linux Kernel, Windows 2000 and 3 more | 2025-04-03 | N/A |
A system does not present an appropriate legal message or warning to a user who is accessing it. | ||||
CVE-1999-0593 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. | ||||
CVE-1999-0595 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. | ||||
CVE-1999-0612 | 2 Gnu, Microsoft | 4 Finger Service, Fingerd, Windows 2000 and 1 more | 2025-04-03 | N/A |
A version of finger is running that exposes valid user information to any entity on the network. | ||||
CVE-1999-0562 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
The registry in Windows NT can be accessed remotely by users who are not administrators. |