Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
Max CVSS
7.8
EPSS Score
0.35%
Published
1999-07-20
Updated
2018-10-12
An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header.
Max CVSS
7.8
EPSS Score
0.35%
Published
1999-06-30
Updated
2018-10-12
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
Max CVSS
7.8
EPSS Score
0.22%
Published
1999-07-06
Updated
2018-10-12
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
Max CVSS
7.8
EPSS Score
0.43%
Published
1999-07-03
Updated
2018-10-12
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Max CVSS
7.8
EPSS Score
2.04%
Published
1999-12-16
Updated
2018-10-12
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
Max CVSS
7.8
EPSS Score
1.45%
Published
2000-05-19
Updated
2018-10-12

CVE-2006-0988

Public exploit
The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
Max CVSS
7.8
EPSS Score
1.48%
Published
2006-03-03
Updated
2018-10-18
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Max CVSS
7.6
EPSS Score
7.31%
Published
2002-03-15
Updated
2018-10-12
Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.
Max CVSS
7.6
EPSS Score
10.33%
Published
2004-06-01
Updated
2018-10-12

CVE-1999-0256

Public exploit
Buffer overflow in War FTP allows remote execution of commands.
Max CVSS
7.5
EPSS Score
96.21%
Published
1998-02-01
Updated
2008-09-09
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Max CVSS
7.5
EPSS Score
1.00%
Published
1999-02-08
Updated
2018-10-12
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
Max CVSS
7.5
EPSS Score
0.38%
Published
1999-01-05
Updated
2022-08-17
NETBIOS share information may be published through SNMP registry keys in NT.
Max CVSS
7.5
EPSS Score
0.35%
Published
1997-01-01
Updated
2022-08-17

CVE-1999-0504

Public exploit
A Windows NT local user or administrator account has a default, null, blank, or missing password.
Max CVSS
7.5
EPSS Score
0.55%
Published
1997-01-01
Updated
2022-08-17
IP forwarding is enabled on a machine which is not a router or firewall.
Max CVSS
7.5
EPSS Score
0.35%
Published
1997-01-01
Updated
2022-08-17
A NETBIOS/SMB share password is the default, null, or missing.
Max CVSS
7.5
EPSS Score
0.35%
Published
1997-01-01
Updated
2022-08-17
The registry in Windows NT can be accessed remotely by users who are not administrators.
Max CVSS
7.5
EPSS Score
0.47%
Published
1997-01-01
Updated
2017-10-19
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
Max CVSS
7.5
EPSS Score
0.35%
Published
1997-01-01
Updated
2022-08-17
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
Max CVSS
7.5
EPSS Score
0.35%
Published
1997-01-01
Updated
2022-08-17
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Max CVSS
7.5
EPSS Score
0.77%
Published
1999-09-20
Updated
2018-10-12
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
Max CVSS
7.5
EPSS Score
94.69%
Published
1999-12-31
Updated
2024-02-08
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an attacker to guess.
Max CVSS
7.5
EPSS Score
0.30%
Published
1999-12-31
Updated
2017-10-10
When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.
Max CVSS
7.5
EPSS Score
0.30%
Published
1999-12-31
Updated
2008-09-05
RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Max CVSS
7.5
EPSS Score
2.80%
Published
1999-12-31
Updated
2017-10-10
Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
Max CVSS
7.5
EPSS Score
0.43%
Published
2000-04-19
Updated
2018-10-19
89 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!