Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
10
CVSSv2
CVE-1999-0119
Windows NT 4.0 beta allows users to read and delete shares.
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-1999-1316
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an malicious user to guess.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote malicious users to cause a denial of service via a malformed argument in a resource enumeration request.
Microsoft Windows Nt 4.0
2 EDB exploits
7.5
CVSSv2
CVE-2004-0569
The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote malicious users to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.
Microsoft Windows Nt 4.0
9
CVSSv2
CVE-1999-0886
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
Microsoft Windows Nt 4.0
1 EDB exploit
7.2
CVSSv2
CVE-1999-0898
Buffer overflows in Windows NT 4.0 print spooler allow remote malicious users to gain privileges or cause a denial of service via a malformed spooler request.
Microsoft Windows Nt 4.0
7.2
CVSSv2
CVE-1999-0899
The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
Microsoft Windows Nt 4.0
1 EDB exploit
2.1
CVSSv2
CVE-1999-1360
Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1387
Windows NT 4.0 SP2 allows remote malicious users to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »