Microsoft

Windows Nt

263 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.61%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.

  • EPSS 0.64%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have pe...

  • EPSS 6.78%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an attacker to guess.

  • EPSS 0.78%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device.

  • EPSS 0.34%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced...

  • EPSS 6.69%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.

  • EPSS 0.37%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.

  • EPSS 0.24%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.

  • EPSS 0.37%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.

  • EPSS 0.37%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.