Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Nt Subscriptions
Total 286 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0534 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
CVE-1999-0535 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
CVE-1999-0549 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT automatically logs in an administrator upon rebooting.
CVE-1999-0570 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
CVE-1999-0572 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
CVE-1999-0575 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
CVE-1999-0576 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
CVE-1999-0577 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
CVE-1999-0578 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
CVE-1999-0579 1 Microsoft 1 Windows Nt 2025-04-03 N/A
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
CVE-1999-0582 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
CVE-1999-0994 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
CVE-1999-0585 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT administrator account has the default name of Administrator.
CVE-1999-0995 1 Microsoft 1 Windows Nt 2025-04-03 N/A
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
CVE-1999-0590 3 Apple, Linux, Microsoft 6 Macos, Linux Kernel, Windows 2000 and 3 more 2025-04-03 N/A
A system does not present an appropriate legal message or warning to a user who is accessing it.
CVE-1999-0593 1 Microsoft 1 Windows Nt 2025-04-03 N/A
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
CVE-1999-0595 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 N/A
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
CVE-1999-0612 2 Gnu, Microsoft 4 Finger Service, Fingerd, Windows 2000 and 1 more 2025-04-03 N/A
A version of finger is running that exposes valid user information to any entity on the network.
CVE-1999-0016 6 Cisco, Gnu, Hp and 3 more 8 Ios, Inet, Hp-ux and 5 more 2025-04-03 N/A
Land IP denial of service.
CVE-1999-0909 1 Microsoft 4 Terminal Server, Windows 95, Windows 98se and 1 more 2025-04-03 N/A
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.