Microsoft

Windows Nt

263 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.28%
  • Published 12.04.1999 04:00:00
  • Last modified 03.04.2025 01:03:51

Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.

  • EPSS 3.1%
  • Published 12.03.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges.

  • EPSS 9.09%
  • Published 08.03.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.

  • EPSS 0.31%
  • Published 20.02.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.

  • EPSS 7.88%
  • Published 12.02.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.

  • EPSS 5.7%
  • Published 08.02.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.

  • EPSS 11.7%
  • Published 19.01.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Windows NT 4.0 beta allows users to read and delete shares.

  • EPSS 10.3%
  • Published 05.01.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.

  • EPSS 11.7%
  • Published 01.01.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.

  • EPSS 13.36%
  • Published 01.01.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.