Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows nt vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0179
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Microsoft Windows Nt 3.5.1
Microsoft Windows 95
9.3
CVSSv2
CVE-2008-1435
Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote malicious users to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka "Windows Saved Search Vulnerability."
Microsoft Windows-nt 2008
Microsoft Windows Vista
5
CVSSv2
CVE-2001-1452
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote malicious users to poison the DNS cache via spoofed DNS responses.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
5
CVSSv2
CVE-2002-1712
Microsoft Windows 2000 allows remote malicious users to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
4.6
CVSSv2
CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relat...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2001-1288
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
7.2
CVSSv2
CVE-2002-0367
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-2000-1227
Windows NT 4.0 and Windows 2000 hosts allow remote malicious users to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
4.6
CVSSv2
CVE-2001-0046
The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote malicious users to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vul...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »