CVE-1999-1452
https://notcve.org/view.php?id=CVE-1999-1452
GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt. • http://marc.info/?l=bugtraq&m=91788829326419&w=2 http://marc.info/?l=ntbugtraq&m=91764169410814&w=2 http://marc.info/?l=ntbugtraq&m=91822011021558&w=2 http://support.microsoft.com/support/kb/articles/q214/8/02.asp http://www.securityfocus.com/bid/198 https://exchange.xforce.ibmcloud.com/vulnerabilities/1975 •
CVE-1999-1084 – Microsoft Windows NT 4.0 - User Shell Folders
https://notcve.org/view.php?id=CVE-1999-1084
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. • https://www.exploit-db.com/exploits/19798 http://marc.info/?l=ntbugtraq&m=90222453431604&w=2 http://support.microsoft.com/support/kb/articles/q103/8/61.asp http://www.ciac.org/ciac/bulletins/k-029.shtml http://www.securityfocus.com/bid/1044 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-008 •
CVE-1999-1364
https://notcve.org/view.php?id=CVE-1999-1364
Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. • http://support.microsoft.com/support/kb/articles/q142/6/53.asp http://www.iss.net/security_center/static/7421.php •
CVE-1999-1222
https://notcve.org/view.php?id=CVE-1999-1222
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup. • http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP https://exchange.xforce.ibmcloud.com/vulnerabilities/3893 •
CVE-1999-1294
https://notcve.org/view.php?id=CVE-1999-1294
Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission. • http://support.microsoft.com/support/kb/articles/q146/6/04.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/562 •