Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-1999-0585
A Windows NT administrator account has the default name of Administrator.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2.1
CVSSv2
CVE-1999-0595
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
10
CVSSv2
CVE-2001-0045
The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt Terminal Server
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-2001-0047
The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
5
CVSSv2
CVE-2008-0927
dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote malicious users to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be si...
Microsoft Windows-nt 2000
Microsoft Windows-nt 2003
1 EDB exploit
7.2
CVSSv2
CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
4.6
CVSSv2
CVE-1999-0376
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0382
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing malicious users to run programs with elevated privileges.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
1 EDB exploit
6.4
CVSSv2
CVE-1999-1361
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-1999-1363
Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »