Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-05-12
Updated
2019-04-30
Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp.
Max CVSS
4.3
EPSS Score
1.53%
Published
2002-12-31
Updated
2016-10-18
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow attackers to gain privileges as other users via Trojan horse programs.
Max CVSS
4.6
EPSS Score
0.05%
Published
2002-11-12
Updated
2019-04-30
The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vulnerabilities.
Max CVSS
4.6
EPSS Score
0.22%
Published
2001-02-16
Updated
2018-10-12
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-07-25
Updated
2018-10-12
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Max CVSS
4.6
EPSS Score
0.07%
Published
2000-02-14
Updated
2008-09-10
When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-12-31
Updated
2008-09-05
Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device.
Max CVSS
4.6
EPSS Score
0.04%
Published
1999-12-31
Updated
2017-10-10
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Max CVSS
4.6
EPSS Score
0.04%
Published
1997-07-25
Updated
2017-10-10
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-12-31
Updated
2018-10-12
The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-12-10
Updated
2008-09-09
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
Max CVSS
4.6
EPSS Score
0.04%
Published
1999-11-30
Updated
2008-09-09
Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-05-17
Updated
2018-10-12
Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-05-20
Updated
2018-10-12
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
Max CVSS
4.9
EPSS Score
0.29%
Published
1999-01-01
Updated
2017-07-11
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
Max CVSS
4.6
EPSS Score
0.04%
Published
1999-01-01
Updated
2022-08-17
The Windows NT guest account is enabled.
Max CVSS
4.6
EPSS Score
0.04%
Published
1998-10-01
Updated
2022-08-17
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
Max CVSS
4.6
EPSS Score
0.04%
Published
1997-01-01
Updated
2022-08-17
The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.
Max CVSS
4.6
EPSS Score
0.04%
Published
1999-01-01
Updated
2018-10-12
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-02-20
Updated
2018-10-12
20 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!