Microsoft

Windows Nt

263 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 38.35%
  • Veröffentlicht 15.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.

  • EPSS 46.09%
  • Veröffentlicht 08.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Admin...

  • EPSS 52.63%
  • Veröffentlicht 08.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request. NOTE: this candidate may be ...

  • EPSS 19.48%
  • Veröffentlicht 20.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.

  • EPSS 79.2%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Terminal Server in Windows NT and Windows 2000 allows remote attackers to cause a denial of service via a sequence of invalid Remote Desktop Protocol (RDP) packets.

  • EPSS 18.26%
  • Veröffentlicht 30.10.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

RPC endpoint mapper in Windows NT 4.0 allows remote attackers to cause a denial of service (loss of RPC services) via a malformed request.

  • EPSS 12.47%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.

  • EPSS 10.77%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.

Exploit
  • EPSS 20.5%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT allows remote attackers to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users.

  • EPSS 3.56%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.