Количество 306 528
Количество 306 528

CVE-1999-0585
A Windows NT administrator account has the default name of Administrator.

CVE-1999-0584
A Windows NT file system is not NTFS.

CVE-1999-0583
There is a one-way or two-way trust relationship between Windows NT domains.

CVE-1999-0582
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.

CVE-1999-0581
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.

CVE-1999-0580
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.

CVE-1999-0579
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.

CVE-1999-0578
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.

CVE-1999-0577
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.

CVE-1999-0576
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.

CVE-1999-0575
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.

CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

CVE-1999-0571
A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.

CVE-1999-0570
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.

CVE-1999-0569
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.

CVE-1999-0568
rpc.admind in Solaris is not running in a secure mode.

CVE-1999-0566
An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.

CVE-1999-0565
A Sendmail alias allows input to be piped to a program.

CVE-1999-0564
An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.

CVE-1999-0562
The registry in Windows NT can be accessed remotely by users who are not administrators.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-1999-0585 A Windows NT administrator account has the default name of Administrator. | CVSS2: 2.1 | 1% Низкий | около 25 лет назад |
![]() | CVE-1999-0584 A Windows NT file system is not NTFS. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0583 There is a one-way or two-way trust relationship between Windows NT domains. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0582 A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc. | CVSS2: 5 | 8% Низкий | больше 28 лет назад |
![]() | CVE-1999-0581 The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. | CVSS2: 10 | 4% Низкий | больше 26 лет назад |
![]() | CVE-1999-0580 The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0579 A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. | CVSS2: 10 | 13% Средний | больше 26 лет назад |
![]() | CVE-1999-0578 A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | CVSS2: 4.6 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0577 A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories. | CVSS2: 10 | 13% Средний | больше 26 лет назад |
![]() | CVE-1999-0576 A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. | CVSS2: 7.5 | 7% Низкий | больше 28 лет назад |
![]() | CVE-1999-0575 A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking. | CVSS2: 7.5 | 9% Низкий | больше 28 лет назад |
![]() | CVE-1999-0572 .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. | CVSS2: 9.3 | 9% Низкий | больше 28 лет назад |
![]() | CVE-1999-0571 A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0570 Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. | CVSS2: 10 | 12% Средний | больше 26 лет назад |
![]() | CVE-1999-0569 A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0568 rpc.admind in Solaris is not running in a secure mode. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0566 An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities. | CVSS2: 5 | 1% Низкий | около 28 лет назад |
![]() | CVE-1999-0565 A Sendmail alias allows input to be piped to a program. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0564 An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled. | CVSS2: 10 | 0% Низкий | больше 26 лет назад |
![]() | CVE-1999-0562 The registry in Windows NT can be accessed remotely by users who are not administrators. | CVSS2: 7.5 | 9% Низкий | больше 28 лет назад |
Уязвимостей на страницу