Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0819
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
4.6
CVSSv2
CVE-2002-1184
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow malicious users to gain privileges as o...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2001-1288
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2001-0373
The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2002-1712
Microsoft Windows 2000 allows remote malicious users to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
9.3
CVSSv2
CVE-2008-5232
Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote malicious users to execute arbitr...
Microsoft Windows 2000 -
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2001-1452
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote malicious users to poison the DNS cache via spoofed DNS responses.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
5
CVSSv2
CVE-2000-1227
Windows NT 4.0 and Windows 2000 hosts allow remote malicious users to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
7.2
CVSSv2
CVE-2003-0910
The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local malicious users to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that poi...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »