Vulnerabilities
Vulnerable Software
Microsoft:  >> Windows Nt  >> 3.5.1  Security Vulnerabilities
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
CVSS Score
10.0
EPSS Score
0.134
Published
1999-01-01
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
CVSS Score
4.6
EPSS Score
0.003
Published
1999-01-01
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
CVSS Score
10.0
EPSS Score
0.134
Published
1999-01-01
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
CVSS Score
10.0
EPSS Score
0.04
Published
1999-01-01
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
CVSS Score
4.9
EPSS Score
0.005
Published
1999-01-01
A Windows NT domain user or administrator account has a guessable password.
CVSS Score
7.2
EPSS Score
0.007
Published
1998-10-01
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
CVSS Score
7.2
EPSS Score
0.076
Published
1998-10-01
The Windows NT guest account is enabled.
CVSS Score
4.6
EPSS Score
0.005
Published
1998-10-01
NT users can gain debug-level access on a system process using the Sechole exploit.
CVSS Score
7.2
EPSS Score
0.004
Published
1998-08-01
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
CVSS Score
6.4
EPSS Score
0.052
Published
1998-05-09


Contact Us

Shodan ® - All rights reserved