Filters

Jetbox Jetbox Cmsformmail.php in Jetbox CMS 2.1 allows remote attackers to send arbitrary e-mails (spam) via modified…

First published (updated )

Foxit PDF ReaderFoxit Reader 2.0 allows remote attackers to cause a denial of service (application crash) via a craf…

First published (updated )

Microsoft Windows NTRace Condition

First published (updated )

Mathsoft MathcadMathcad 12 through 13.1 allows local users to bypass the security features by directly accessing or …

First published (updated )

Atrium Software Mercur Messaging 2005The IMAP4 service in MERCUR Messaging 2005 before Service Pack 4 allows remote attackers to cause a …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTMicrosoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, …

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Microsoft Windows NTWindows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sess…

First published (updated )

Microsoft Windows NTThe TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service …

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTThe Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP thr…

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Microsoft Windows NTThe DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP l…

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Microsoft Windows NTRace Condition

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTThe NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include r…

First published (updated )

Microsoft Windows NTThe getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap …

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Microsoft Windows NTNull Pointer Dereference

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTMicrosoft Windows 2000 allows remote attackers to cause a denial of service (memory consumption) by …

First published (updated )

Microsoft Site ServerXSS

First published (updated )

Microsoft Windows NTThe system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full…

First published (updated )

Microsoft Windows NTWeak Encryption

First published (updated )

Microsoft Windows NTUnknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows 2000NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local attackers to hide file usage ac…

First published (updated )

Microsoft Windows NTIIS 4.0 allows local users to bypass the "User cannot change password" policy for Windows NT by dire…

First published (updated )

Microsoft Windows NTTerminal Server in Windows NT and Windows 2000 allows remote attackers to cause a denial of service …

First published (updated )

Microsoft Windows NTRPC endpoint mapper in Windows NT 4.0 allows remote attackers to cause a denial of service (loss of …

First published (updated )

Microsoft Exchange ServerMemory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a de…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTWindows NT allows remote attackers to list all users in a domain by obtaining the domain SID with th…

First published (updated )

Microsoft Exchange ServerInput Validation

First published (updated )

Microsoft Windows NTMultiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth an…

First published (updated )

Microsoft Windows NTMemory leak in PPTP server in Windows NT 4.0 allows remote attackers to cause a denial of service vi…

First published (updated )

Microsoft Windows NTThe default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attacke…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTWindows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailab…

First published (updated )

Microsoft Windows NTVarious TCP/IP stacks and network applications allow remote attackers to cause a denial of service b…

First published (updated )

Microsoft Windows NTThe Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows…

First published (updated )

Microsoft Internet Information ServerVulnerability in Microsoft Windows NT 4.0 allows remote attackers to cause a denial of service in II…

First published (updated )

Microsoft Windows NTThe NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attacke…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTThe registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 us…

First published (updated )

Microsoft Windows NTThe Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of s…

First published (updated )

Microsoft Windows NTWindows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed…

First published (updated )

Microsoft Windows NTThe CIFS Computer Browser service on Windows NT 4.0 allows a remote attacker to cause a denial of se…

First published (updated )

Microsoft Terminal ServerThe CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Terminal ServerBuffer Overflow

First published (updated )

Microsoft Windows NTThe Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto…

First published (updated )

Microsoft Windows NTWindows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a …

First published (updated )

Microsoft Windows NTWindows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link …

First published (updated )

Microsoft Windows NTNetbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash)…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203