Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows nt vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0344
NT users can gain debug-level access on a system process using the Sechole exploit.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
4.6
CVSSv2
CVE-1999-0376
Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs.
Microsoft Windows Nt 4.0
Microsoft Windows Nt 3.5.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0382
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing malicious users to run programs with elevated privileges.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-2008-0927
dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote malicious users to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be si...
Microsoft Windows-nt 2000
Microsoft Windows-nt 2003
1 EDB exploit
10
CVSSv2
CVE-2001-0045
The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.
Microsoft Windows Nt Terminal Server
Microsoft Windows Nt 4.0
9
CVSSv2
CVE-2008-1456
Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an...
Microsoft Windows-nt Xp
Microsoft Windows 2000
Microsoft Windows-nt 2008
Microsoft Windows Xp
Microsoft Windows-nt Vista
Microsoft Windows Vista -
Microsoft Windows 2003 Server
9
CVSSv2
CVE-2008-1457
The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription reque...
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows Vista -
Microsoft Windows-nt Xp
Microsoft Windows 2000
Microsoft Windows-nt 2008
Microsoft Windows-nt Vista
2.1
CVSSv2
CVE-1999-0595
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2.1
CVSSv2
CVE-1999-0585
A Windows NT administrator account has the default name of Administrator.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
5
CVSSv2
CVE-2000-0673
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote malicious users to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4956
validation
CVE-2024-35221
remote attackers
CVE-2023-30309
CVE-2024-36112
CVE-2024-23109
CVE-2023-43850
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »