Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-1999-0496
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
Microsoft Windows Nt 4.0
445
VMScore
CVE-2000-1200
Windows NT allows remote malicious users to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users.
Microsoft Windows Nt 4.0
445
VMScore
CVE-1999-0969
The Windows NT RPC service allows remote malicious users to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Microsoft Windows Nt 4.0
510
VMScore
CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote malicious users to cause a denial of service via a malformed argument in a resource enumeration request.
Microsoft Windows Nt 4.0
2 EDB exploits
445
VMScore
CVE-2004-0899
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote malicious users to cause a denial of service (application crash) via a malformed DHCP...
Microsoft Windows Nt 4.0
890
VMScore
CVE-2004-0900
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote malicious users to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability....
Microsoft Windows Nt 4.0
641
VMScore
CVE-2000-0070
NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request."
Microsoft Windows Nt 4.0
187
VMScore
CVE-2000-0089
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.
Microsoft Windows Nt 4.0
365
VMScore
CVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.
Microsoft Windows Nt 4.0
1 EDB exploit
409
VMScore
CVE-2000-0197
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Microsoft Windows Nt 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »