Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2007-1973
Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.
Microsoft Windows Nt 4.0
NA
CVE-2007-1206
The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which allows local users to gain priv...
Microsoft Windows 2000
Microsoft Windows 2003 Server Gold
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp
NA
CVE-2006-3439
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
5 EDB exploits
NA
CVE-2006-3942
The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote malicious users to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL der...
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
1 EDB exploit
NA
CVE-2006-3880
Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote malicious users to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in c...
Microsoft Windows 2003 Server Datacenter Edition 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Enterprise Edition 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Enterprise Edition
Microsoft Windows 2003 Server Datacenter Edition
1 EDB exploit
NA
CVE-2006-2379
Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows remote malicious users to execute arbitrary code via unknown vectors related to IP source routing.
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Web
1 EDB exploit
NA
CVE-2006-0034
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote malicious users to execute arbitrary code via a long fifth argument...
Microsoft Distributed Transaction Coordinator
Microsoft Windows 2000
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise
1 Github repository
NA
CVE-2006-1184
Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote malicious users to cause a denial of service (crash) via a BuildContextW request with a large (1) UuidString or (2) GuidIn of a certain length, which ...
Microsoft Distributed Transaction Coordinator
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
1 Github repository
NA
CVE-2006-1591
Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted malicious users to execute arbitrary code via crafted embedded image data in a .hlp file.
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Web
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »