Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows-nt vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
5
CVSSv2
CVE-1999-1463
Windows NT 4.0 before SP3 allows remote malicious users to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
Microsoft Windows Nt
7.8
CVSSv2
CVE-1999-0728
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2000-0377
The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability.
Microsoft Windows Nt 4.0
2 EDB exploits
5
CVSSv2
CVE-2000-0403
The CIFS Computer Browser service on Windows NT 4.0 allows a remote malicious user to cause a denial of service by sending a large number of host announcement requests to the master browse tables, aka the "HostAnnouncement Flooding" or "HostAnnouncement Frame"...
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0969
The Windows NT RPC service allows remote malicious users to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote malicious users to cause a denial of service via a malformed argument in a resource enumeration request.
Microsoft Windows Nt 4.0
2 EDB exploits
7.8
CVSSv2
CVE-1999-0995
Windows NT Local Security Authority (LSA) allows remote malicious users to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Microsoft Windows Nt 4.0
4.6
CVSSv2
CVE-1999-1084
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
Microsoft Windows Nt 4.0
1 EDB exploit
7.2
CVSSv2
CVE-1999-0701
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »