Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows Nt
Subscriptions
Total
286 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2000-1200 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT allows remote attackers to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users. | ||||
CVE-2000-1227 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back. | ||||
CVE-1999-0074 | 4 Freebsd, Linux, Microsoft and 1 more | 4 Freebsd, Linux Kernel, Windows Nt and 1 more | 2025-04-03 | N/A |
Listening TCP ports are sequentially allocated, allowing spoofing attacks. | ||||
CVE-1999-1234 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo. | ||||
CVE-1999-1132 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs. | ||||
CVE-1999-0519 | 1 Microsoft | 4 Outlook, Windows 2000, Windows 95 and 1 more | 2025-04-03 | N/A |
A NETBIOS/SMB share password is the default, null, or missing. | ||||
CVE-1999-1127 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | 7.5 High |
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability. | ||||
CVE-1999-0995 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request." | ||||
CVE-1999-0511 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
IP forwarding is enabled on a machine which is not a router or firewall. | ||||
CVE-1999-0285 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. | ||||
CVE-1999-0994 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords. | ||||
CVE-1999-0987 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name. | ||||
CVE-1999-0506 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT domain user or administrator account has a default, null, blank, or missing password. | ||||
CVE-1999-0980 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request. | ||||
CVE-2003-0818 | 1 Microsoft | 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more | 2025-04-03 | N/A |
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. | ||||
CVE-1999-0969 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork. | ||||
CVE-1999-0505 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
A Windows NT domain user or administrator account has a guessable password. | ||||
CVE-1999-0275 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Denial of service in Windows NT DNS servers by flooding port 53 with too many characters. | ||||
CVE-1999-0225 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size. | ||||
CVE-2003-0717 | 1 Microsoft | 5 Windows 2000, Windows 2003 Server, Windows Me and 2 more | 2025-04-03 | N/A |
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. |