CVE Tracker
96,095 total CVEsLive vulnerability feed from the National Vulnerability Database
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
The registry in Windows NT can be accessed remotely by users who are not administrators.
A router's routing tables can be obtained from arbitrary hosts.
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.
IP traceroute is allowed from arbitrary hosts.
An NIS domain name is easily guessable.
A NETBIOS/SMB share password is the default, null, or missing.
A NETBIOS/SMB share password is guessable.
An SNMP community name is the default (e.g. public), null, or missing.
IP forwarding is enabled on a machine which is not a router or firewall.
A router or firewall allows source routed packets from arbitrary hosts.
A Windows NT local user or administrator account has a default, null, blank, or missing password.
A Windows NT local user or administrator account has a guessable password.
NETBIOS share information may be published through SNMP registry keys in NT.
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.
ICMP redirect messages may crash or lock up a host.
IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL.
Buffer overflow in listserv allows arbitrary command execution.
Denial of service in talk program allows remote attackers to disrupt a user's display.
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Showing 95876-95900 of 96,095 CVEs