Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2000-0673
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote malicious users to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
1 EDB exploit
187
VMScore
CVE-1999-0585
A Windows NT administrator account has the default name of Administrator.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
187
VMScore
CVE-1999-1363
Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
465
VMScore
CVE-1999-0376
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
1 EDB exploit
725
VMScore
CVE-1999-0382
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing malicious users to run programs with elevated privileges.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
1 EDB exploit
505
VMScore
CVE-2008-0927
dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote malicious users to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be si...
Microsoft Windows-nt 2000
Microsoft Windows-nt 2003
1 EDB exploit
890
VMScore
CVE-2001-0045
The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt Terminal Server
Microsoft Windows Nt 4.0
668
VMScore
CVE-2001-0047
The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
570
VMScore
CVE-1999-1361
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
641
VMScore
CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »