Search Results (287 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-1455 1 Microsoft 1 Windows Nt 2025-04-03 N/A
RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
CVE-2000-0073 1 Microsoft 3 Windows 2000, Windows 98, Windows Nt 2025-04-03 N/A
Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word.
CVE-1999-0119 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT 4.0 beta allows users to read and delete shares.
CVE-1999-0074 4 Freebsd, Linux, Microsoft and 1 more 4 Freebsd, Linux Kernel, Windows Nt and 1 more 2025-04-03 N/A
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
CVE-1999-0980 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.
CVE-1999-0969 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
CVE-1999-0572 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
CVE-1999-0918 1 Microsoft 4 Windows 2000, Windows 95, Windows 98 and 1 more 2025-04-03 N/A
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
CVE-1999-0909 1 Microsoft 4 Terminal Server, Windows 95, Windows 98se and 1 more 2025-04-03 N/A
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
CVE-1999-0562 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
The registry in Windows NT can be accessed remotely by users who are not administrators.
CVE-1999-0228 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.
CVE-1999-0899 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
CVE-1999-0898 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.
CVE-1999-0560 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A system-critical Windows NT file or directory has inappropriate permissions.
CVE-1999-0874 1 Microsoft 3 Internet Information Server, Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
CVE-2000-0673 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
CVE-1999-0824 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
CVE-1999-0549 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT automatically logs in an administrator upon rebooting.
CVE-1999-0227 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service.
CVE-1999-0104 4 Caldera, Hp, Microsoft and 1 more 5 Openlinux, Hp-ux, Windows 95 and 2 more 2025-04-03 N/A
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.