Page 54 of 317 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. • https://exchange.xforce.ibmcloud.com/vulnerabilities/228 •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. • http://osvdb.org/59333 http://technet.microsoft.com/en-us/library/cc722469.aspx http://www.microsoft.com/technet/archive/winntas/deploy/confeat/06wntpcc.mspx?mfr=true https://exchange.xforce.ibmcloud.com/vulnerabilities/1291 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. • https://www.cve.org/CVERecord?id=CVE-1999-0285 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. • https://www.cve.org/CVERecord?id=CVE-1999-0581 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0570 •