CVE-2000-0121 – Microsoft Windows NT 4.0 - Recycle Bin Pre-created Folder
https://notcve.org/view.php?id=CVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability. • https://www.exploit-db.com/exploits/19739 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248399 http://www.securityfocus.com/bid/963 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-007 •
CVE-1999-0595
https://notcve.org/view.php?id=CVE-1999-0595
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. • https://exchange.xforce.ibmcloud.com/vulnerabilities/216 •
CVE-2000-0070
https://notcve.org/view.php?id=CVE-2000-0070
NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869 http://www.bindview.com/security/advisory/adv_NtImpersonate.html http://www.securityfocus.com/bid/934 http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003 •
CVE-1999-0701
https://notcve.org/view.php?id=CVE-1999-0701
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039 http://www.securityfocus.com/bid/626 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036 • CWE-16: Configuration •
CVE-1999-0980 – Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5/SP6 - 'Services.exe' Denial of Service
https://notcve.org/view.php?id=CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request. • https://www.exploit-db.com/exploits/19577 https://www.exploit-db.com/exploits/19578 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246045 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-055 •