| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT. |
| Windows NT RSHSVC program allows remote users to execute arbitrary commands. |
| Bonk variation of teardrop IP fragmentation denial of service. |
| Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made. |
| Denial of service in Windows NT DNS servers by flooding port 53 with too many characters. |
| Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. |
| NT users can gain debug-level access on a system process using the Sechole exploit. |
| In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value. |
| Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs. |
| Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. |
| MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013. |
| A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin. |
| A Windows NT local user or administrator account has a default, null, blank, or missing password. |
| A Windows NT domain user or administrator account has a default, null, blank, or missing password. |
| A Windows NT domain user or administrator account has a guessable password. |
| IP forwarding is enabled on a machine which is not a router or firewall. |
| A NETBIOS/SMB share password is the default, null, or missing. |
| Windows NT automatically logs in an administrator upon rebooting. |
| A system-critical Windows NT file or directory has inappropriate permissions. |
| A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. |