Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-2150
Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote malicious users to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
445
VMScore
CVE-1999-0179
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Microsoft Windows Nt 3.5.1
Microsoft Windows 95
445
VMScore
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
641
VMScore
CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
725
VMScore
CVE-2003-0910
The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local malicious users to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that poi...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
187
VMScore
CVE-2002-2028
The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing.
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
739
VMScore
CVE-2008-1453
The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate malicious users to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.
Microsoft Windows Xp
Microsoft Windows-nt Xp
Microsoft Windows Vista
725
VMScore
CVE-2000-0155
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local malicious users to specify an alternate program to execute when other users access a drive.
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
668
VMScore
CVE-2003-0345
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows Xp
755
VMScore
CVE-2002-1183
Microsoft Windows 98 and Windows NT 4.0 do not properly verify the Basic Constraints of digital certificates, allowing remote malicious users to execute code, aka "New Variant of Certificate Validation Flaw Could Enable Identity Spoofing" (CAN-2002-0862).
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows Nt 4.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »