Microsoft

Windows Nt

263 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Published 03.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of service (crash in lsass.exe) by running the NT4ALL exploit program in 'SPECIAL' mode.

Exploit
  • EPSS 0.83%
  • Published 27.07.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handli...

Exploit
  • EPSS 38.49%
  • Published 21.07.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.

Exploit
  • EPSS 20.36%
  • Published 07.07.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets ...

  • EPSS 11.96%
  • Published 02.07.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests.

  • EPSS 1.37%
  • Published 18.06.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.

Exploit
  • EPSS 0.47%
  • Published 03.05.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Format string vulnerability in DbgPrint function, used in debug messages for some Windows NT drivers (possibly when called through DebugMessage), may allow local users to gain privileges.

  • EPSS 1.41%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

NTLM Security Support Provider (NTLMSSP) service does not properly check the function number in an LPC request, which could allow local users to gain administrator level access.

  • EPSS 19.07%
  • Published 12.03.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Memory leak in PPTP server in Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.

Exploit
  • EPSS 1.25%
  • Published 16.02.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.