Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt 4.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-1999-1364
Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2004-0899
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote malicious users to cause a denial of service (application crash) via a malformed DHCP...
Microsoft Windows Nt 4.0
10
CVSSv2
CVE-2004-0900
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote malicious users to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability....
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2002-0421
IIS 4.0 allows local users to bypass the "User cannot change password" policy for Windows NT by directly calling .htr password changing programs in the /iisadmpwd directory, including (1) aexp2.htr, (2) aexp2b.htr, (3) aexp3.htr , or (4) aexp4.htr.
Microsoft Windows Nt 4.0
3.6
CVSSv2
CVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.
Microsoft Windows Nt 4.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-0070
NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request."
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2000-0089
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.
Microsoft Windows Nt 4.0
4.6
CVSSv2
CVE-2000-0197
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-1999-0224
Denial of service in Windows NT messenger service through a long username.
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-1999-0225
Windows NT 4.0 allows remote malicious users to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size.
Microsoft Windows Nt 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »