Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows nt vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0373
The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
NA
CVE-2003-0227
The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote malicious users to cause a denial of service in Internet Information Server (IIS) and execu...
Microsoft Windows 2000 -
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-1999-0819
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-1999-0179
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
Microsoft Windows Nt 3.5.1
Microsoft Windows 95
5.5
CVSSv3
CVE-2002-0725
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local malicious users to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
NA
CVE-2002-0367
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-2002-1184
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow malicious users to gain privileges as o...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
NA
CVE-2002-1712
Microsoft Windows 2000 allows remote malicious users to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
NA
CVE-2008-1435
Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote malicious users to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka "Windows Saved Search Vulnerability."
Microsoft Windows-nt 2008
Microsoft Windows Vista
NA
CVE-1999-1291
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote malicious users to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing ...
Microsoft Windows 95
Microsoft Windows Nt 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »