Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0544
Windows NT and Windows 2000 hosts allow a remote malicious user to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
NA
CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relat...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
NA
CVE-2001-0373
The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
NA
CVE-2008-5232
Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote malicious users to execute arbitr...
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
1 EDB exploit
NA
CVE-2000-1227
Windows NT 4.0 and Windows 2000 hosts allow remote malicious users to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
NA
CVE-2001-0046
The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote malicious users to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vul...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
NA
CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
5.5
CVSSv3
CVE-2002-0725
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local malicious users to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
NA
CVE-2005-2827
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Win...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2002-0367
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »