Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2000-0129
Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows malicious users to cause a denial of service by performing a LIST command on a malformed .lnk file.
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
7.2
CVSSv2
CVE-2002-0366
Buffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
7.5
CVSSv2
CVE-2003-0345
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows Xp
5
CVSSv2
CVE-1999-0288
The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote malicious users to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets.
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-2000-0377
The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability.
Microsoft Windows Nt 4.0
2 EDB exploits
10
CVSSv2
CVE-1999-0119
Windows NT 4.0 beta allows users to read and delete shares.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0994
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an malicious user to crack passwords.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1127
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote malicious users to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1222
Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.
Microsoft Windows Nt 4.0
6.9
CVSSv2
CVE-2007-1973
Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »