U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:workstation:*:x64:*
  • CPE Name Search: true
There are 204 matching records.
Displaying matches 181 through 200.
Vuln ID Summary CVSS Severity
CVE-1999-0016

Land IP denial of service.

Published: December 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-1217

The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.

Published: July 25, 1997; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-1999-0074

Listening TCP ports are sequentially allocated, allowing spoofing attacks.

Published: July 01, 1997; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 6.4 MEDIUM
CVE-1999-0153

Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.

Published: July 01, 1997; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0275

Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.

Published: June 10, 1997; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0227

Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service.

Published: June 01, 1997; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0612

A version of finger is running that exposes valid user information to any entity on the network.

Published: March 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 0.0 LOW
CVE-1999-0228

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

Published: February 07, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0249

Windows NT RSHSVC program allows remote users to execute arbitrary commands.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-0274

Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0496

A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-0499

NETBIOS share information may be published through SNMP registry keys in NT.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0503

A Windows NT local user or administrator account has a guessable password.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-0504

A Windows NT local user or administrator account has a default, null, blank, or missing password.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0511

IP forwarding is enabled on a machine which is not a router or firewall.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0519

A NETBIOS/SMB share password is the default, null, or missing.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0534

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-1999-0535

A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0562

The registry in Windows NT can be accessed remotely by users who are not administrators.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0572

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

Published: January 01, 1997; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH