Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2001-0238
Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and previous versions allows remote malicious users to bypass Security Zone restrictions via WebDAV requests.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows Me
668
VMScore
CVE-2001-0047
The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
668
VMScore
CVE-2000-1149
Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote malicious users to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.
Microsoft Windows Nt Terminal Server
668
VMScore
CVE-2000-0885
Buffer overflows in Microsoft Network Monitor (Netmon) allow remote malicious users to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing&qu...
Microsoft Systems Management Server 1.2
Microsoft Systems Management Server 2.0
Microsoft Windows 2000
Microsoft Windows Nt 4.0
668
VMScore
CVE-2000-1079
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote malicious users to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 95
668
VMScore
CVE-2000-1218
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote malicious users to poison the DNS cache.
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 98 -
Microsoft Windows 98se -
668
VMScore
CVE-1999-1316
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an malicious user to guess.
Microsoft Windows Nt 4.0
668
VMScore
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
668
VMScore
CVE-1999-0909
Multihomed Windows systems allow a remote malicious user to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Microsoft Terminal Server
Microsoft Windows Nt 4.0
Microsoft Windows 98se
Microsoft Windows 95 0a
Microsoft Windows 95 0b
668
VMScore
CVE-1999-0366
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »