Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-1387
Windows NT 4.0 SP2 allows remote malicious users to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.
Microsoft Windows Nt 4.0
NA
CVE-1999-1084
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-2004-0569
The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote malicious users to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.
Microsoft Windows Nt 4.0
NA
CVE-1999-0119
Windows NT 4.0 beta allows users to read and delete shares.
Microsoft Windows Nt 4.0
NA
CVE-1999-0489
MSHTML.DLL in Internet Explorer 5.0 allows a remote malicious user to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013.
Microsoft Windows Nt 4.0
NA
CVE-1999-0701
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Microsoft Windows Nt 4.0
NA
CVE-1999-0728
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
Microsoft Windows Nt 4.0
NA
CVE-2001-1122
Windows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of service (crash in lsass.exe) by running the NT4ALL exploit program in 'SPECIAL' mode.
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-1999-1132
Windows NT 4.0 allows remote malicious users to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.
Microsoft Windows Nt 4.0
NA
CVE-1999-0969
The Windows NT RPC service allows remote malicious users to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Microsoft Windows Nt 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »