Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-1149
Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote malicious users to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.
Microsoft Windows Nt Terminal Server
7.5
CVSSv2
CVE-2000-0885
Buffer overflows in Microsoft Network Monitor (Netmon) allow remote malicious users to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing&qu...
Microsoft Systems Management Server 1.2
Microsoft Systems Management Server 2.0
Microsoft Windows 2000
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-2000-1079
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote malicious users to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 95
7.5
CVSSv2
CVE-2000-0256
Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
Microsoft Windows Nt 4.0
Microsoft Frontpage
Microsoft Personal Web Server 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2000-1218
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote malicious users to poison the DNS cache.
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 98 -
Microsoft Windows 98se -
7.5
CVSSv2
CVE-1999-1316
Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an malicious user to guess.
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
7.5
CVSSv2
CVE-1999-0909
Multihomed Windows systems allow a remote malicious user to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Microsoft Terminal Server
Microsoft Windows Nt 4.0
Microsoft Windows 98se
Microsoft Windows 95 0a
Microsoft Windows 95 0b
7.5
CVSSv2
CVE-1999-0366
In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-1999-0391
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an malicious user to replay the response and impersonate a user.
Microsoft Terminal Server
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »