Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2001-0373
The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
445
VMScore
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
409
VMScore
CVE-2002-1184
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow malicious users to gain privileges as o...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1000
VMScore
CVE-2000-1089
Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
2 EDB exploits
445
VMScore
CVE-2000-1227
Windows NT 4.0 and Windows 2000 hosts allow remote malicious users to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
409
VMScore
CVE-2001-0046
The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote malicious users to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vul...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
445
VMScore
CVE-2000-0544
Windows NT and Windows 2000 hosts allow a remote malicious user to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
409
VMScore
CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relat...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
510
VMScore
CVE-2002-1712
Microsoft Windows 2000 allows remote malicious users to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
187
VMScore
CVE-2001-1288
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »