Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-1254
Windows 95, 98, and NT 4.0 allow remote malicious users to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt
NA
CVE-1999-0444
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
Microsoft Windows Nt
Microsoft Windows 95
Microsoft Windows 98
NA
CVE-2002-1712
Microsoft Windows 2000 allows remote malicious users to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
5.5
CVSSv3
CVE-2002-0725
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local malicious users to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
NA
CVE-1999-0819
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-2000-0544
Windows NT and Windows 2000 hosts allow a remote malicious user to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
NA
CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relat...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
NA
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
NA
CVE-2001-1288
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
NA
CVE-2005-2827
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Win...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »