This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_nt:4.0:sp4:server
Detail
VendorMicrosoftFirst view 2000-12-31
ProductWindows NtLast view2009-01-14
Version4.0TypeOs
Editionserver 
Language 
Updatesp4 
 
CPE Productcpe:/o:microsoft:windows_nt

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
7.62009-01-14CVE-1999-1593NetworkHighNone Requ...
7.12008-10-20CVE-2008-4609NetworkMediumNone Requ...
9.32006-06-13CVE-2006-2379NetworkMediumNone Requ...
52006-05-09CVE-2006-1184NetworkLowNone Requ...
7.52006-05-09CVE-2006-0034NetworkLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
5.12006-04-03CVE-2006-1591NetworkHighNone Requ...
9.32006-01-10CVE-2006-0010NetworkMediumNone Requ...
52005-05-02CVE-2005-1184NetworkLowNone Requ...
102005-05-02CVE-2005-0050NetworkLowNone Requ...
7.52005-05-02CVE-2005-0045NetworkLowNone Requ...
7.52005-04-27CVE-2005-0416NetworkLowNone Requ...
102005-01-10CVE-2004-1080NetworkLowNone Requ...
102005-01-10CVE-2004-0901NetworkLowNone Requ...
102005-01-10CVE-2004-0900NetworkLowNone Requ...
52005-01-10CVE-2004-0899NetworkLowNone Requ...
7.22005-01-10CVE-2004-0893LocalLowNone Requ...
102005-01-10CVE-2004-0571NetworkLowNone Requ...
102005-01-10CVE-2004-0568NetworkLowNone Requ...
5.12004-12-31CVE-2004-1306NetworkHighNone Requ...
52004-12-23CVE-2004-1361NetworkLowNone Requ...
52004-12-23CVE-2004-1305NetworkLowNone Requ...
102004-08-06CVE-2004-0201NetworkLowNone Requ...
9.32004-03-03CVE-2003-0825NetworkMediumNone Requ...
7.52004-03-03CVE-2003-0818NetworkLowNone Requ...

CWE : Common Weakness Enumeration

%idName
37% (3)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
25% (2)CWE-20Improper Input Validation
12% (1)CWE-264Permissions, Privileges, and Access Controls
12% (1)CWE-59Improper Link Resolution Before File Access ('Link Following')
12% (1)CWE-16Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-21Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-27Leveraging Race Conditions via Symbolic Links
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-59Session Credential Falsification through Prediction
Hide | Show 5 More...
idName
CAPEC-60Reusing Session IDs (aka Session Replay)
CAPEC-75Manipulating Writeable Configuration Files
CAPEC-76Manipulating Input to File System Calls
CAPEC-89Pharming
CAPEC-111JSON Hijacking (aka JavaScript Hijacking)

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:900Windows XP RPCSS DCOM Buffer Overflow (Blaster)
oval:org.mitre.oval:def:894Server 2003 RPCSS DCOM Buffer Overflow
oval:org.mitre.oval:def:893Windows 2000 RPCSS DCOM Buffer Overflow (Blaster, Test 3)
oval:org.mitre.oval:def:3483NetBT Name Service Information Access Vulnerability
oval:org.mitre.oval:def:268Windows XP Messenger Service Buffer Overflow
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:213Windows 2000 Messenger Service Buffer Overflow
oval:org.mitre.oval:def:539MS Word 6.0 Font Conversion Vulnerability (64-bit XP)
oval:org.mitre.oval:def:4749Suppressed: Duplicate of OVAL3882
oval:org.mitre.oval:def:3882MS Word 6.0 Font Conversion Vulnerability (32-bit XP)
oval:org.mitre.oval:def:4576MS Word 6.0 Font Conversion Vulnerability (NT Terminal Server)
oval:org.mitre.oval:def:4076Suppressed: Duplicate of OVAL1655
oval:org.mitre.oval:def:1655MS Word 6.0 Font Conversion Vulnerability (Server 2003)
oval:org.mitre.oval:def:3310MS Word 6.0 Font Conversion Vulnerability (NT 4.0)
oval:org.mitre.oval:def:1241MS Word 6.0 Font Conversion Vulnerability (Windows 2000)
oval:org.mitre.oval:def:4043SMB Code Execution Vulnerability (Windows 2000)
oval:org.mitre.oval:def:1889SMB Code Execution Vulnerability (XP,SP1)
oval:org.mitre.oval:def:1847SMB Code Execution Vulnerability (Server 2003 / 64-bit XP)
oval:org.mitre.oval:def:1606SMB Code Execution Vulnerability (32-bit XP)
oval:org.mitre.oval:def:582MSJava Applet CODEBASE File Access Vulnerability
oval:org.mitre.oval:def:189Network Share Provider Buffer Overflow
oval:org.mitre.oval:def:779Windows XP Kernel Debugger-based Buffer Overflow (Test 2)
oval:org.mitre.oval:def:3145Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:262Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2265Windows NT Terminal Server Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2022Windows NT Kernel Debugger-based Buffer Overflow

SAINT Exploits

DescriptionLink
Windows RPC DCOM interface buffer overflowMore info here
Microsoft WINS replication service pointer corruptionMore info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
62144F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St...
61133Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC...
60273Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass ...
59732Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Fo...
59482Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation...
Hide | Show 20 More...
idDescription
58614McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio...
58321Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati...
58189Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC...
57993Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem...
57795Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State...
57794Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl...
57793Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta...
53309Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
50286Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot...
26433Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
25336Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Req...
25335Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServ...
24802Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
21598Microsoft Windows 2000 NetBIOS Port Crafted TCP Packet
20188Microsoft Windows Crafted SMB SMBnegprots Request DOS
19187Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poiso...
18829Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
16610Multiple Vendor TCP Implementation Malformed Ack Number "Keep Alive"...
16430Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Lengt...
14475Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow

ExploitDB Exploits

idDescription
21746MS Windows 2000/NT 4/XP Network Share Provider SMB Request Buffer Overflow (1)
1065MS Windows (SMB) Transaction Response Handling Exploit (MS05-011)

OpenVAS Exploits

idDescription
2010-07-08Name : Microsoft Windows GDI Multiple Vulnerabilities (925902)
File : nvt/ms07-017.nasl
2009-11-16Name : Microsoft RPC Interface Buffer Overrun (KB824146)
File : nvt/msrpc_dcom2.nasl
2009-09-10Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-03-16Name : Microsoft MS03-034 security check
File : nvt/remote-MS03-034.nasl
2005-11-03Name : Flaw in Microsoft VM Could Allow Code Execution (810030)
File : nvt/smb_nt_ms02-052.nasl
Hide | Show 8 More...
idDescription
2005-11-03Name : Unchecked Buffer in Windows Help(Q323255)
File : nvt/smb_nt_ms02-055.nasl
2005-11-03Name : Vulnerability in Authenticode Verification Could Allow Remote Code Execution ...
File : nvt/smb_nt_ms03-041.nasl
2005-11-03Name : Buffer Overflow in Windows Troubleshooter ActiveX Control (826232)
File : nvt/smb_nt_ms03-042.nasl
2005-11-03Name : Buffer Overrun in Messenger Service (828035)
File : nvt/smb_nt_ms03-043.nasl
2005-11-03Name : Buffer Overrun in the ListBox and in the ComboBox (824141)
File : nvt/smb_nt_ms03-045.nasl
2005-11-03Name : IIS FrontPage DoS II
File : nvt/frontpage_overflow.nasl
2005-11-03Name : MS RPC Services null pointer reference DoS
File : nvt/msrpc-spike27.nasl
2005-11-03Name : Microsoft RPC Interface Buffer Overrun (823980)
File : nvt/msrpc_dcom.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2005-A-0001Multiple Vulnerabilities in Microsoft Windows
Severity : Category I - VMSKEY : V0005996

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9759 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9758 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9757 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9756 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object...
RuleID : 9755 - Type : NETBIOS - Revision : 7
Hide | Show 20 More...
DateDescription
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9754 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9753 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal...
RuleID : 9752 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9751 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9750 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9749 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9748 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9747 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9746 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9745 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9744 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att...
RuleID : 9743 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9742 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9741 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9740 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9739 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9738 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9737 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9736 - Type : NETBIOS - Revision : 5
2014-01-10SMB ISystemActivator CoGetInstanceFromFile WriteAndX unicode andx object call...
RuleID : 9735 - Type : NETBIOS - Revision : 7

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO
2010-09-01Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO
2009-09-08Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d...
File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO
2007-03-16Name : Arbitrary code can be executed on the remote host.
File : smb_kb828741.nasl - Type : ACT_GATHER_INFO
2006-06-13Name : It is possible to execute code on the remote host.
File : smb_nt_ms06-032.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2006-05-10Name : A vulnerability in MSDTC could allow remote code execution.
File : smb_kb913580.nasl - Type : ACT_GATHER_INFO
2006-05-09Name : It is possible to crash the remote MSDTC service.
File : smb_nt_ms06-018.nasl - Type : ACT_GATHER_INFO
2006-01-10Name : Arbitrary code can be executed on the remote host by sending a malformed file...
File : smb_nt_ms06-002.nasl - Type : ACT_GATHER_INFO
2006-01-03Name : Arbitrary code can be executed on the remote host through the DHCP service.
File : smb_kb885249.nasl - Type : ACT_GATHER_INFO
2005-02-08Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms05-010.nasl - Type : ACT_GATHER_INFO
2005-02-08Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms05-011.nasl - Type : ACT_GATHER_INFO
2005-02-03Name : Random portions of memory may be disclosed thru the NetBIOS name service.
File : smb_nt_ms03-034.nasl - Type : ACT_GATHER_INFO
2005-01-11Name : Arbitrary code can be executed on the remote host through the web or email cl...
File : smb_nt_ms05-002.nasl - Type : ACT_GATHER_INFO
2004-12-15Name : Arbitrary code can be executed on the remote host.
File : wins_replication_overflow.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host through WordPad.
File : smb_nt_ms04-041.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host via the DHCP service.
File : smb_nt_ms04-042.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host through HyperTerminal.
File : smb_nt_ms04-043.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Local users can elevate their privileges on the remote host.
File : smb_nt_ms04-044.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host via the WINS service.
File : smb_nt_ms04-045.nasl - Type : ACT_GATHER_INFO
2004-12-06Name : Arbitrary code can be executed on the remote host.
File : wins_overflow.nasl - Type : ACT_GATHER_INFO
2004-07-13Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms04-023.nasl - Type : ACT_GATHER_INFO
2004-04-13Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms04-012.nasl - Type : ACT_GATHER_INFO
2004-02-18Name : The remote host has multiple integer overflow vulnerabilities.
File : mail_asn1_decoding.nasl - Type : ACT_GATHER_INFO
2004-02-15Name : The remote Windows host is affected by a memory corruption vulnerability.
File : http_asn1_decoding.nasl - Type : ACT_GATHER_INFO
2004-02-13Name : Arbitrary code can be executed on the remote host.
File : windows_asn1_vuln_ntlm.nasl - Type : ACT_GATHER_INFO