CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
IP forwarding is enabled on a machine which is not a router or firewall. |
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input. |
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. |
Windows NT automatically logs in an administrator upon rebooting. |
A system-critical Windows NT file or directory has inappropriate permissions. |
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. |
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. |
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. |
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. |
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. |
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc. |
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. |
Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command. |
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file. |
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. |
Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. |
A remote attacker can disable the virus warning mechanism in Microsoft Excel 97. |
Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request. |
An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header. |
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. |