Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows-nt vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0824
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
Microsoft Windows Nt 4.0
7.5
CVSSv3
CVE-1999-1127
Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote malicious users to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.
Microsoft Windows Nt 4.0
NA
CVE-2000-0328
Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote malicious users to perform spoofing and session hijacking.
Microsoft Windows Nt 4.0
NA
CVE-1999-0228
Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.
Microsoft Windows Nt 4.0
NA
CVE-2000-1149
Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote malicious users to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.
Microsoft Windows Nt Terminal Server
7.1
CVSSv3
CVE-2001-0006
The Winsock2ProtocolCatalogMutex mutex in Windows NT 4.0 has inappropriate Everyone/Full Control permissions, which allows local users to modify the permissions to "No Access" and disable Winsock network connectivity to cause a denial of service, aka the "Winsock M...
Microsoft Windows Nt 4.0
1 EDB exploit
NA
CVE-1999-0969
The Windows NT RPC service allows remote malicious users to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
Microsoft Windows Nt 4.0
NA
CVE-1999-0980
Windows NT Service Control Manager (SCM) allows remote malicious users to cause a denial of service via a malformed argument in a resource enumeration request.
Microsoft Windows Nt 4.0
2 EDB exploits
NA
CVE-1999-0995
Windows NT Local Security Authority (LSA) allows remote malicious users to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Microsoft Windows Nt 4.0
NA
CVE-1999-0701
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Microsoft Windows Nt 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »