Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Nt Subscriptions
Total 286 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0577 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
CVE-1999-0562 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
The registry in Windows NT can be accessed remotely by users who are not administrators.
CVE-1999-0496 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
CVE-1999-0503 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT local user or administrator account has a guessable password.
CVE-1999-0534 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
CVE-1999-0549 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT automatically logs in an administrator upon rebooting.
CVE-1999-0572 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
CVE-1999-0578 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
CVE-1999-0581 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
CVE-1999-0595 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
CVE-1999-0612 2 Gnu, Microsoft 4 Finger Service, Fingerd, Windows 2000 and 1 more 2025-04-03 N/A
A version of finger is running that exposes valid user information to any entity on the network.
CVE-1999-0886 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
CVE-1999-0700 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
CVE-1999-0717 1 Microsoft 5 Excel, Windows 2000, Windows 95 and 2 more 2025-04-03 N/A
A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
CVE-1999-0819 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
CVE-1999-0874 1 Microsoft 3 Internet Information Server, Windows 2000, Windows Nt 2025-04-03 N/A
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
CVE-1999-0898 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.
CVE-1999-0909 1 Microsoft 4 Terminal Server, Windows 95, Windows 98se and 1 more 2025-04-03 N/A
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
CVE-1999-0918 1 Microsoft 4 Windows 2000, Windows 95, Windows 98 and 1 more 2025-04-03 N/A
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
CVE-1999-0969 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.