Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows-nt 2000 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Microsoft Windows Nt
Microsoft Windows 2000
7.2
CVSSv2
CVE-1999-0249
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Microsoft Windows Nt
Microsoft Windows 2000
1 Github repository
10
CVSSv2
CVE-2002-0018
In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote malicious users to gain Domain Administrator privileges on t...
Microsoft Windows 2000
Microsoft Windows Nt
7.5
CVSSv2
CVE-1999-0499
NETBIOS share information may be published through SNMP registry keys in NT.
Microsoft Windows Nt
Microsoft Windows 2000
7.2
CVSSv2
CVE-1999-0503
A Windows NT local user or administrator account has a guessable password.
Microsoft Windows Nt
Microsoft Windows 2000
7.5
CVSSv2
CVE-1999-0504
A Windows NT local user or administrator account has a default, null, blank, or missing password.
Microsoft Windows Nt
Microsoft Windows 2000
1 EDB exploit
7.2
CVSSv2
CVE-1999-0505
A Windows NT domain user or administrator account has a guessable password.
Microsoft Windows Nt
Microsoft Windows 2000
4.6
CVSSv2
CVE-2000-0197
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2000-0328
Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote malicious users to perform spoofing and session hijacking.
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2000-0089
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »