Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows nt vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0582
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
Microsoft Windows Nt
Microsoft Windows 2000
NA
CVE-2001-0016
NTLM Security Support Provider (NTLMSSP) service does not properly check the function number in an LPC request, which could allow local users to gain administrator level access.
Microsoft Windows Nt
NA
CVE-1999-0570
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
Microsoft Windows Nt
NA
CVE-1999-0578
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
Microsoft Windows Nt
NA
CVE-1999-0581
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
Microsoft Windows Nt
NA
CVE-2001-0017
Memory leak in PPTP server in Windows NT 4.0 allows remote malicious users to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.
Microsoft Windows Nt
NA
CVE-1999-1157
Tcpip.sys in Windows NT 4.0 before SP4 allows remote malicious users to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
Microsoft Windows Nt
NA
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
NA
CVE-1999-1463
Windows NT 4.0 before SP3 allows remote malicious users to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
Microsoft Windows Nt
NA
CVE-1999-1217
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Microsoft Windows Nt
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »