cpe:2.3:o:microsoft:windows_nt:3.5.1:sp5:alpha:*:*:*:*:*
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.
Max CVSS
9.3
EPSS Score
62.34%
Published
2006-01-10
Updated
2019-04-30
Memory leak in PPTP server in Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.
Max CVSS
5.0
EPSS Score
2.58%
Published
2001-03-12
Updated
2018-10-12
NTLM Security Support Provider (NTLMSSP) service does not properly check the function number in an LPC request, which could allow local users to gain administrator level access.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-03-12
Updated
2018-10-12
RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Max CVSS
7.5
EPSS Score
2.80%
Published
1999-12-31
Updated
2017-10-10
Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.
Max CVSS
2.1
EPSS Score
0.05%
Published
1999-12-31
Updated
2008-09-05
Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.
Max CVSS
2.1
EPSS Score
0.05%
Published
1999-12-31
Updated
2008-09-05
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
Max CVSS
6.4
EPSS Score
0.50%
Published
1998-05-09
Updated
2016-10-18
Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
Max CVSS
5.0
EPSS Score
0.28%
Published
1999-12-31
Updated
2017-10-10
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-01-20
Updated
2022-08-17
A system does not present an appropriate legal message or warning to a user who is accessing it.
Max CVSS
10.0
EPSS Score
0.30%
Published
2000-06-01
Updated
2022-08-17
A Windows NT administrator account has the default name of Administrator.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-07-01
Updated
2022-08-17
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
Max CVSS
7.5
EPSS Score
0.38%
Published
1999-01-05
Updated
2022-08-17
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges.
Max CVSS
7.2
EPSS Score
0.05%
Published
1999-03-12
Updated
2018-10-12
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-02-20
Updated
2018-10-12
NT users can gain debug-level access on a system process using the Sechole exploit.
Max CVSS
7.2
EPSS Score
0.05%
Published
1998-08-01
Updated
2018-10-12
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Max CVSS
5.0
EPSS Score
7.50%
Published
1997-01-01
Updated
2018-08-13
Teardrop IP denial of service.
Max CVSS
5.0
EPSS Score
0.13%
Published
1997-12-16
Updated
2018-05-03
17 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!