CVE-1999-0505
https://notcve.org/view.php?id=CVE-1999-0505
A Windows NT domain user or administrator account has a guessable password. • https://www.cve.org/CVERecord?id=CVE-1999-0505 •
CVE-1999-0546
https://notcve.org/view.php?id=CVE-1999-0546
The Windows NT guest account is enabled. • https://www.cve.org/CVERecord?id=CVE-1999-0546 •
CVE-1999-0506
https://notcve.org/view.php?id=CVE-1999-0506
A Windows NT domain user or administrator account has a default, null, blank, or missing password. • https://www.cve.org/CVERecord?id=CVE-1999-0506 •
CVE-1999-0969
https://notcve.org/view.php?id=CVE-1999-0969
The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014 •
CVE-1999-0344
https://notcve.org/view.php?id=CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 • CWE-264: Permissions, Privileges, and Access Controls •