Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
730
VMScore
CVE-2003-0659
Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
2 EDB exploits
725
VMScore
CVE-2005-2827
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Win...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
725
VMScore
CVE-2004-0210
The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Avaya Modular Messaging Message Storage Server S3400
1 EDB exploit
725
VMScore
CVE-2003-0910
The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local malicious users to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that poi...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
725
VMScore
CVE-2003-1407
Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command.
Microsoft Windows Nt 4.0
1 EDB exploit
725
VMScore
CVE-2002-0367
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
725
VMScore
CVE-2000-0155
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local malicious users to specify an alternate program to execute when other users access a drive.
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
725
VMScore
CVE-1999-0899
The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
Microsoft Windows Nt 4.0
1 EDB exploit
725
VMScore
CVE-1999-0382
The screen saver in Windows NT does not verify that its security context has been changed properly, allowing malicious users to run programs with elevated privileges.
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
1 EDB exploit
694
VMScore
CVE-1999-0995
Windows NT Local Security Authority (LSA) allows remote malicious users to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »