| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry. |
| Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. |
| Windows NT 4.0 beta allows users to read and delete shares. |
| Listening TCP ports are sequentially allocated, allowing spoofing attacks. |
| .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. |
| Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. |
| Denial of service through Winpopup using large user names. |
| The registry in Windows NT can be accessed remotely by users who are not administrators. |
| A system-critical Windows NT file or directory has inappropriate permissions. |
| The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets. |
| Denial of service in Windows NT messenger service through a long username. |
| Windows NT automatically logs in an administrator upon rebooting. |
| The Windows NT guest account is enabled. |
| Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. |
| A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness. |
| The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed. |
| A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input. |
| In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. |
| Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT. |
| A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2. |