Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_nt
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 253 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1999-08-24 | CVE-2000-0328 | Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking. | Windows_nt | N/A | ||
1999-09-17 | CVE-1999-0886 | The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager. | Windows_nt | N/A | ||
1999-09-20 | CVE-1999-0909 | Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability. | Terminal_server, Windows_95, Windows_98se, Windows_nt | N/A | ||
1999-11-04 | CVE-1999-0899 | The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. | Windows_nt | N/A | ||
1999-11-04 | CVE-1999-0898 | Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. | Windows_nt | N/A | ||
1999-11-17 | CVE-2000-0073 | Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word. | Windows_2000, Windows_98, Windows_nt | N/A | ||
1999-11-18 | CVE-1999-0987 | Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name. | Windows_nt | N/A | ||
1999-12-16 | CVE-1999-0995 | Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request." | Windows_nt | N/A | ||
1999-12-16 | CVE-1999-0994 | Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords. | Windows_nt | N/A | ||
2000-01-12 | CVE-2000-0070 | NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." | Windows_nt | N/A |