Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
890
VMScore
CVE-1999-0119
Windows NT 4.0 beta allows users to read and delete shares.
Microsoft Windows Nt 4.0
668
VMScore
CVE-1999-1316
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an malicious user to guess.
Microsoft Windows Nt 4.0
510
VMScore
CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote malicious users to cause a denial of service via a malformed argument in a resource enumeration request.
Microsoft Windows Nt 4.0
2 EDB exploits
668
VMScore
CVE-2004-0569
The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote malicious users to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.
Microsoft Windows Nt 4.0
905
VMScore
CVE-1999-0886
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
Microsoft Windows Nt 4.0
1 EDB exploit
641
VMScore
CVE-1999-0898
Buffer overflows in Windows NT 4.0 print spooler allow remote malicious users to gain privileges or cause a denial of service via a malformed spooler request.
Microsoft Windows Nt 4.0
725
VMScore
CVE-1999-0899
The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
Microsoft Windows Nt 4.0
1 EDB exploit
187
VMScore
CVE-1999-1360
Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle.
Microsoft Windows Nt 4.0
445
VMScore
CVE-1999-1387
Windows NT 4.0 SP2 allows remote malicious users to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »