Filters

Microsoft Windows NT"Shatter" style vulnerability in the Window Management application programming interface (API) for M…

2.1
First published (updated )

Microsoft Windows NTThe DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attacke…

2.6
First published (updated )

BEA Weblogic ServerBEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keyst…

2.1
First published (updated )

Microsoft Windows NTThe screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has alread…

2.1
First published (updated )

Microsoft Windows NTNT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permiss…

3.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTWindows NT 4.0 SP 6a allows a local user with write access to winnt/system32 to cause a denial of se…

2.1
First published (updated )

Microsoft Windows NTWindows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a …

2.1
First published (updated )

Microsoft Windows NTThe default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dm…

2.1
First published (updated )

Microsoft Terminal ServerMicrosoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denia…

2.1
First published (updated )

Microsoft Windows NTBuffer Overflow

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTThe rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive infor…

2.1
First published (updated )

Microsoft Windows NTA Windows NT administrator account has the default name of Administrator.

2.1
First published (updated )

Microsoft Windows NTThe Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by…

3.6
First published (updated )

Microsoft Windows NTA Windows NT system does not clear the system page file during shutdown, which might allow sensitive…

2.1
First published (updated )

Microsoft Windows NTGINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard o…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTWindows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program …

2.1
First published (updated )

Microsoft Windows NTWindows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode ad…

2.1
First published (updated )

Microsoft Windows NTWin32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by c…

2.1
First published (updated )

Microsoft Windows NTWindows NT 4.0 allows local users to cause a denial of service via a user mode application that clos…

2.1
First published (updated )

Microsoft Windows NTOffice Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherite…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTA remote attacker can disable the virus warning mechanism in Microsoft Excel 97.

2.6
First published (updated )

Microsoft Windows NTInfoleak

2.1
First published (updated )

GNU fingerdA version of finger is running that exposes valid user information to any entity on the network.

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203