Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows Nt
Total 286 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-0719 1 Microsoft 7 Netmeeting, Windows 2000, Windows 2003 Server and 4 more 2025-04-03 7.5 HIGH N/A
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
CVE-2005-1184 1 Microsoft 5 Windows 2000, Windows 2003 Server, Windows 98se and 2 more 2025-04-03 5.0 MEDIUM N/A
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.
CVE-1999-1358 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 4.6 MEDIUM N/A
When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only.
CVE-2001-1288 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 2.1 LOW N/A
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
CVE-1999-0226 1 Microsoft 1 Windows Nt 2025-04-03 10.0 HIGH N/A
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
CVE-2000-1149 1 Microsoft 1 Windows Nt 2025-04-03 7.5 HIGH N/A
Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.
CVE-1999-0366 1 Microsoft 1 Windows Nt 2025-04-03 7.5 HIGH N/A
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
CVE-2002-2028 1 Microsoft 3 Windows 2000, Windows Nt, Windows Xp 2025-04-03 2.1 LOW N/A
The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing.
CVE-1999-0344 1 Microsoft 1 Windows Nt 2025-04-03 7.2 HIGH N/A
NT users can gain debug-level access on a system process using the Sechole exploit.
CVE-2003-1469 2 Macromedia, Microsoft 5 Coldfusion, Coldfusion Professional, Windows 2000 and 2 more 2025-04-03 5.0 MEDIUM N/A
The default configuration of ColdFusion MX has the "Enable Robust Exception Information" option selected, which allows remote attackers to obtain the full path of the web server via a direct request to CFIDE/probe.cfm, which leaks the path in an error message.
CVE-1999-0721 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 7.8 HIGH N/A
Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
CVE-2001-0003 1 Microsoft 4 Office, Windows 2000, Windows Me and 1 more 2025-04-03 5.0 MEDIUM N/A
Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulnerability.
CVE-1999-0874 1 Microsoft 3 Internet Information Server, Windows 2000, Windows Nt 2025-04-03 10.0 HIGH N/A
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
CVE-2004-1306 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2025-04-03 5.1 MEDIUM N/A
Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.
CVE-2002-0724 1 Microsoft 3 Windows 2000, Windows Nt, Windows Xp 2025-04-03 7.5 HIGH N/A
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
CVE-2003-0352 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2025-04-03 7.5 HIGH N/A
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
CVE-2002-0151 1 Microsoft 3 Windows 2000, Windows Nt, Windows Xp 2025-04-03 7.2 HIGH N/A
Buffer overflow in Multiple UNC Provider (MUP) in Microsoft Windows operating systems allows local users to cause a denial of service or possibly gain SYSTEM privileges via a long UNC request.
CVE-2003-0659 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2025-04-03 7.2 HIGH N/A
Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.
CVE-1999-0496 1 Microsoft 1 Windows Nt 2025-04-03 7.2 HIGH N/A
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
CVE-2004-0118 1 Microsoft 2 Windows 2000, Windows Nt 2025-04-03 7.2 HIGH N/A
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.