Vulnerabilities > CVE-1999-0506 - Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 |
Metasploit
description This module will test a SMB login on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access. id MSF:AUXILIARY/SCANNER/SMB/SMB_LOGIN last seen 2020-03-12 modified 2020-03-02 published 2014-08-22 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0506 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/smb/smb_login.rb title SMB Login Check Scanner description This module simply queries the MSSQL instance for a specific user/pass (default is sa with blank). id MSF:AUXILIARY/SCANNER/MSSQL/MSSQL_LOGIN last seen 2020-03-02 modified 2020-02-08 published 2011-03-23 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0506 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/mssql/mssql_login.rb title MSSQL Login Utility description This module will test a VNC server on a range of machines and report successful logins. Currently it supports RFB protocol version 3.3, 3.7, 3.8 and 4.001 using the VNC challenge response authentication method. id MSF:AUXILIARY/SCANNER/VNC/VNC_LOGIN last seen 2020-03-06 modified 2019-06-27 published 2011-09-03 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0506 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/vnc/vnc_login.rb title VNC Authentication Scanner description [About](<https://www.rapid7.com/about> "About Rapid7" ) [For Customers](<https://www.rapid7.com/for-customers> "For Rapid7 Customers" ) [Free Tools](<https://www.rapid7.com/free-tools> "Free Tools from Rapid7" ) [ ![Rapid7](/db/assets/Rapid7_logo-ec0ec3940fca9dddfbcd754380bb2b50.svg) ](<https://www.rapid7.com> "Rapid7" ) * [Home](<https://www.rapid7.com/> "Rapid7.com" ) * Vulnerability & Exploit Database # Vulnerability & Exploit Database id MSF:AUXILIARY/SCANNER/SMB/SMB2_LOGIN last seen 2017-03-30 modified 1970-01-01 published 2017-03-29 references http://cvedetails.com/cve/cve-1999-0506 reliability Normal reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb2_login.rb title CVE-1999-0506 SMB Login Check Scanner
Nessus
NASL family Windows NASL id SMB_BLANK_ADMIN_PASSWORD.NASL description The remote host is running one of the Microsoft Windows operating systems. It was possible to log into it using the administrator account with a blank password. last seen 2020-06-01 modified 2020-06-02 plugin id 26918 published 2007-10-04 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26918 title Microsoft Windows SMB Blank Administrator Password NASL family Windows NASL id SMB_LOGIN_AS_USERS.NASL description This script attempts to log into the remote host using several login / password combinations. last seen 2020-04-30 modified 2000-05-10 plugin id 10404 published 2000-05-10 reporter This script is Copyright (C) 2000-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/10404 title Microsoft Windows SMB Guessable User Credentials