Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows nt vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0582
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
Microsoft Windows Nt
Microsoft Windows 2000
7.2
CVSSv2
CVE-2001-0016
NTLM Security Support Provider (NTLMSSP) service does not properly check the function number in an LPC request, which could allow local users to gain administrator level access.
Microsoft Windows Nt
10
CVSSv2
CVE-1999-0570
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
Microsoft Windows Nt
4.6
CVSSv2
CVE-1999-0578
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
Microsoft Windows Nt
10
CVSSv2
CVE-1999-0581
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
Microsoft Windows Nt
5
CVSSv2
CVE-2001-0017
Memory leak in PPTP server in Windows NT 4.0 allows remote malicious users to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.
Microsoft Windows Nt
5
CVSSv2
CVE-1999-1157
Tcpip.sys in Windows NT 4.0 before SP4 allows remote malicious users to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
Microsoft Windows Nt
7.5
CVSSv2
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
5
CVSSv2
CVE-1999-1463
Windows NT 4.0 before SP3 allows remote malicious users to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
Microsoft Windows Nt
4.6
CVSSv2
CVE-1999-1217
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Microsoft Windows Nt
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »