Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows-nt vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0900
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote malicious users to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability....
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2003-0525
The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows malicious users to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM ...
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0288
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote malicious users to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-1999-1132
Windows NT 4.0 allows remote malicious users to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1222
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2000-0328
Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote malicious users to perform spoofing and session hijacking.
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-1999-0366
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Microsoft Windows Nt 4.0
10
CVSSv2
CVE-1999-0489
MSHTML.DLL in Internet Explorer 5.0 allows a remote malicious user to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013.
Microsoft Windows Nt 4.0
7.2
CVSSv2
CVE-1999-0496
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1127
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote malicious users to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »