Microsoft

Windows Nt

263 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.92%
  • Veröffentlicht 04.02.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.

  • EPSS 0.15%
  • Veröffentlicht 04.02.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file.

  • EPSS 1.86%
  • Veröffentlicht 01.02.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.

  • EPSS 1.31%
  • Veröffentlicht 20.01.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.

Exploit
  • EPSS 2.72%
  • Veröffentlicht 12.01.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request."

  • EPSS 17.1%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.

Exploit
  • EPSS 0.76%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

  • EPSS 30.03%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vuln...

  • EPSS 19.46%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.

  • EPSS 14.46%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.