Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows-nt vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0593
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
Microsoft Windows Nt
NA
CVE-1999-0226
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
Microsoft Windows Nt -
NA
CVE-1999-0987
Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
Microsoft Windows Nt
NA
CVE-1999-0140
Denial of service in RAS/PPTP on NT systems.
Microsoft Windows Nt
1 EDB exploit
NA
CVE-1999-0275
Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.
Microsoft Windows Nt
NA
CVE-1999-0285
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.
Microsoft Windows Nt
NA
CVE-1999-1217
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Microsoft Windows Nt
NA
CVE-1999-0815
Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote malicious users to conduct a denial of service (memory exhaustion) via a large number of queries.
Microsoft Windows Nt
NA
CVE-1999-1365
Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing...
Microsoft Windows Nt
NA
CVE-1999-1455
RSH service utility RSHSVC in Windows NT 3.5 up to and including 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host.
Microsoft Windows Nt
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »