Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-1999-0595
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
505
VMScore
CVE-2000-0673
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote malicious users to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
1 EDB exploit
505
VMScore
CVE-2008-0927
dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote malicious users to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be si...
Microsoft Windows-nt 2000
Microsoft Windows-nt 2003
1 EDB exploit
890
VMScore
CVE-2001-0045
The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt Terminal Server
Microsoft Windows Nt 4.0
668
VMScore
CVE-2001-0047
The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
465
VMScore
CVE-1999-0376
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
1 EDB exploit
725
VMScore
CVE-1999-0382
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing malicious users to run programs with elevated privileges.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
1 EDB exploit
570
VMScore
CVE-1999-1361
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
641
VMScore
CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
187
VMScore
CVE-1999-1363
Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »