Microsoft

Windows Nt

263 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.17%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt.

  • EPSS 6.78%
  • Veröffentlicht 31.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an au...

  • EPSS 19.39%
  • Veröffentlicht 16.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.

  • EPSS 27.9%
  • Veröffentlicht 16.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."

  • EPSS 0.25%
  • Veröffentlicht 10.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.

  • EPSS 66.93%
  • Veröffentlicht 01.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.

  • EPSS 0.27%
  • Veröffentlicht 30.11.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.

  • EPSS 5.51%
  • Veröffentlicht 18.11.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.

  • EPSS 56.81%
  • Veröffentlicht 17.11.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word.

  • EPSS 3.81%
  • Veröffentlicht 04.11.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.