Export limit exceeded: 339475 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (287 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-1999-0344 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| NT users can gain debug-level access on a system process using the Sechole exploit. | ||||
| CVE-1999-0366 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value. | ||||
| CVE-1999-0376 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. | ||||
| CVE-1999-0372 | 1 Microsoft | 3 Backoffice, Windows 2000, Windows Nt | 2025-04-03 | N/A |
| The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted. | ||||
| CVE-1999-0382 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges. | ||||
| CVE-1999-0391 | 1 Microsoft | 3 Terminal Server, Windows 2000, Windows Nt | 2025-04-03 | N/A |
| The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. | ||||
| CVE-1999-0496 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin. | ||||
| CVE-1999-0504 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
| A Windows NT local user or administrator account has a default, null, blank, or missing password. | ||||
| CVE-1999-0503 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
| A Windows NT local user or administrator account has a guessable password. | ||||
| CVE-1999-0506 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
| A Windows NT domain user or administrator account has a default, null, blank, or missing password. | ||||
| CVE-1999-0505 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
| A Windows NT domain user or administrator account has a guessable password. | ||||
| CVE-1999-0546 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| The Windows NT guest account is enabled. | ||||
| CVE-1999-0549 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| Windows NT automatically logs in an administrator upon rebooting. | ||||
| CVE-1999-0560 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| A system-critical Windows NT file or directory has inappropriate permissions. | ||||
| CVE-1999-0562 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2025-04-03 | N/A |
| The registry in Windows NT can be accessed remotely by users who are not administrators. | ||||
| CVE-1999-0577 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories. | ||||
| CVE-1999-0578 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | ||||
| CVE-1999-0579 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. | ||||
| CVE-1999-0593 | 1 Microsoft | 1 Windows Nt | 2025-04-03 | N/A |
| The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. | ||||
| CVE-2006-0034 | 1 Microsoft | 5 Distributed Transaction Coordinator, Windows 2000, Windows 2003 Server and 2 more | 2025-04-03 | N/A |
| Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability. | ||||