Microsoft

Windows Nt

263 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Published 16.02.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Pe...

  • EPSS 1.17%
  • Published 16.02.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnera...

  • EPSS 36.28%
  • Published 12.02.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password...

  • EPSS 0.13%
  • Published 12.02.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The Winsock2ProtocolCatalogMutex mutex in Windows NT 4.0 has inappropriate Everyone/Full Control permissions, which allows local users to modify the permissions to "No Access" and disable Winsock network connectivity to cause a denial of service, aka...

Exploit
  • EPSS 38.35%
  • Published 09.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker hos...

Exploit
  • EPSS 73.78%
  • Published 09.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.

Exploit
  • EPSS 10.23%
  • Published 09.01.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.

  • EPSS 20.47%
  • Published 31.12.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.

  • EPSS 53.36%
  • Published 19.12.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon ...

  • EPSS 27.1%
  • Published 14.12.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on...