This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_nt:4.0:sp6:enterprise_server
Detail
VendorMicrosoftFirst view 2000-12-31
ProductWindows NtLast view 2008-10-20
Version4.0TypeOs
Editionenterprise_server 
Language 
Updatesp6 
 
CPE Productcpe:/o:microsoft:windows_nt

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
7.12008-10-20CVE-2008-4609NetworkMediumNone Requ...
9.32006-06-13CVE-2006-2379NetworkMediumNone Requ...
52006-05-09CVE-2006-1184NetworkLowNone Requ...
7.52006-05-09CVE-2006-0034NetworkLowNone Requ...
9.32006-01-10CVE-2006-0010NetworkMediumNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
52005-05-02CVE-2005-1184NetworkLowNone Requ...
102005-05-02CVE-2005-0050NetworkLowNone Requ...
7.52005-04-27CVE-2005-0416NetworkLowNone Requ...
102005-01-10CVE-2004-1080NetworkLowNone Requ...
102005-01-10CVE-2004-0901NetworkLowNone Requ...
102005-01-10CVE-2004-0900NetworkLowNone Requ...
52005-01-10CVE-2004-0899NetworkLowNone Requ...
7.22005-01-10CVE-2004-0893LocalLowNone Requ...
102005-01-10CVE-2004-0571NetworkLowNone Requ...
102005-01-10CVE-2004-0568NetworkLowNone Requ...
5.12004-12-31CVE-2004-1306NetworkHighNone Requ...
52004-12-23CVE-2004-1361NetworkLowNone Requ...
52004-12-23CVE-2004-1305NetworkLowNone Requ...
102004-08-06CVE-2004-0201NetworkLowNone Requ...
9.32004-03-03CVE-2003-0825NetworkMediumNone Requ...
5.12003-11-17CVE-2003-0813NetworkHighNone Requ...
7.52003-11-17CVE-2003-0717NetworkLowNone Requ...
7.52003-11-17CVE-2003-0711NetworkLowNone Requ...
7.52003-11-17CVE-2003-0660NetworkLowNone Requ...

CWE : Common Weakness Enumeration

%idName
50% (3)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (2)CWE-20Improper Input Validation
16% (1)CWE-16Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-21Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-27Leveraging Race Conditions via Symbolic Links
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-59Session Credential Falsification through Prediction
Hide | Show 5 More...
idName
CAPEC-60Reusing Session IDs (aka Session Replay)
CAPEC-75Manipulating Writeable Configuration Files
CAPEC-76Manipulating Input to File System Calls
CAPEC-89Pharming
CAPEC-111JSON Hijacking (aka JavaScript Hijacking)

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:63Windows 2000 Remote Access Service Phonebook Buffer Overflow
oval:org.mitre.oval:def:61Windows NT Remote Access Service Phonebook Buffer Overflow
oval:org.mitre.oval:def:374HTML Help ActiveX Control Buffer Overflow
oval:org.mitre.oval:def:403Code Execution via Compiled HTML Help File
oval:org.mitre.oval:def:582MSJava Applet CODEBASE File Access Vulnerability
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:59Microsoft Windows RPC Denial of Service
oval:org.mitre.oval:def:103Windows RPC Locator Service Buffer Overflow
oval:org.mitre.oval:def:795DEPRECATED: Windows Script Engine Heap Overflow (Test 3)
oval:org.mitre.oval:def:794DEPRECATED: Windows Script Engine Heap Overflow (Test 2)
oval:org.mitre.oval:def:200DEPRECATED: Windows Script Engine Heap Overflow (Test 1)
oval:org.mitre.oval:def:134Windows Script Engine Heap Overflow (Test 4)
oval:org.mitre.oval:def:779Windows XP Kernel Debugger-based Buffer Overflow (Test 2)
oval:org.mitre.oval:def:3145Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:262Windows 2000 Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2265Windows NT Terminal Server Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:2022Windows NT Kernel Debugger-based Buffer Overflow
oval:org.mitre.oval:def:142Suppressed OVAL142, covered by OVAL2022
oval:org.mitre.oval:def:1264Windows XP Kernel Debugger-based Buffer Overflow (Test 1)
oval:org.mitre.oval:def:3391Windows XP SMB Buffer Overflow
oval:org.mitre.oval:def:146Windows NT SMB Buffer Overflow
oval:org.mitre.oval:def:118Windows 2000 SMB Buffer Overflow
oval:org.mitre.oval:def:296Windows 2000 RPCSS DCOM Buffer Overflow (Blaster, Test 2)
oval:org.mitre.oval:def:2343Windows XP RPCSS DCOM Buffer Overflow (Blaster, Test 2)
oval:org.mitre.oval:def:194Windows NT RPCSS DCOM Buffer Overflow (Blaster, Test 2)
oval:org.mitre.oval:def:319Windows NT getCanonicalPath Heap Corruption Denial of Service

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
62144F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St...
61133Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC...
59482Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation...
58614McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio...
58321Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati...
Hide | Show 20 More...
idDescription
58189Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC...
57993Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem...
57795Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State...
57794Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl...
57793Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta...
50286Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot...
26433Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
25336Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Req...
25335Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServ...
21598Microsoft Windows 2000 NetBIOS Port Crafted TCP Packet
20188Microsoft Windows Crafted SMB SMBnegprots Request DOS
19187Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poiso...
18829Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
16610Multiple Vendor TCP Implementation Malformed Ack Number "Keep Alive"...
16430Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Lengt...
14475Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
13599Microsoft Windows License Logging Service Overflow
13418Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
13417Microsoft Virtual Machine COM Object Arbitrary Code Execution
13415Microsoft Windows 2000 System Root Folder Search Path Permission Weakness

Metasploit Exploits

idDescription
2004-12-14MS04-045 Microsoft WINS Service Memory Overwrite
2003-07-16MS03-026 Microsoft RPC DCOM Interface Overflow

OpenVAS Exploits

idDescription
2010-07-08Name : Microsoft Windows GDI Multiple Vulnerabilities (925902)
File : nvt/ms07-017.nasl
2009-11-16Name : Microsoft RPC Interface Buffer Overrun (KB824146)
File : nvt/msrpc_dcom2.nasl
2009-09-10Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-03-16Name : Microsoft MS03-034 security check
File : nvt/remote-MS03-034.nasl
2005-11-03Name : Flaw in Microsoft VM Could Allow Code Execution (810030)
File : nvt/smb_nt_ms02-052.nasl
Hide | Show 8 More...
idDescription
2005-11-03Name : Unchecked Buffer in Windows Help(Q323255)
File : nvt/smb_nt_ms02-055.nasl
2005-11-03Name : Vulnerability in Authenticode Verification Could Allow Remote Code Execution ...
File : nvt/smb_nt_ms03-041.nasl
2005-11-03Name : Buffer Overflow in Windows Troubleshooter ActiveX Control (826232)
File : nvt/smb_nt_ms03-042.nasl
2005-11-03Name : Buffer Overrun in Messenger Service (828035)
File : nvt/smb_nt_ms03-043.nasl
2005-11-03Name : Buffer Overrun in the ListBox and in the ComboBox (824141)
File : nvt/smb_nt_ms03-045.nasl
2005-11-03Name : IIS FrontPage DoS II
File : nvt/frontpage_overflow.nasl
2005-11-03Name : MS RPC Services null pointer reference DoS
File : nvt/msrpc-spike27.nasl
2005-11-03Name : Microsoft RPC Interface Buffer Overrun (823980)
File : nvt/msrpc_dcom.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2005-A-0001Multiple Vulnerabilities in Microsoft Windows
Severity : Category I - VMSKEY : V0005996

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9759 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9758 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9757 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9756 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object...
RuleID : 9755 - Type : NETBIOS - Revision : 7
Hide | Show 20 More...
DateDescription
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9754 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9753 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal...
RuleID : 9752 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9751 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9750 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9749 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9748 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9747 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9746 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9745 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9744 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att...
RuleID : 9743 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9742 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9741 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9740 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9739 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9738 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9737 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9736 - Type : NETBIOS - Revision : 5
2014-01-10SMB ISystemActivator CoGetInstanceFromFile WriteAndX unicode andx object call...
RuleID : 9735 - Type : NETBIOS - Revision : 7

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2010-09-01Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO
2009-09-08Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d...
File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO
2007-03-16Name : Arbitrary code can be executed on the remote host.
File : smb_kb828741.nasl - Type : ACT_GATHER_INFO
2006-06-13Name : It is possible to execute code on the remote host.
File : smb_nt_ms06-032.nasl - Type : ACT_GATHER_INFO
2006-05-10Name : A vulnerability in MSDTC could allow remote code execution.
File : smb_kb913580.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2006-05-09Name : It is possible to crash the remote MSDTC service.
File : smb_nt_ms06-018.nasl - Type : ACT_GATHER_INFO
2006-01-10Name : Arbitrary code can be executed on the remote host by sending a malformed file...
File : smb_nt_ms06-002.nasl - Type : ACT_GATHER_INFO
2006-01-03Name : Arbitrary code can be executed on the remote host through the DHCP service.
File : smb_kb885249.nasl - Type : ACT_GATHER_INFO
2005-02-08Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms05-010.nasl - Type : ACT_GATHER_INFO
2005-02-03Name : Random portions of memory may be disclosed thru the NetBIOS name service.
File : smb_nt_ms03-034.nasl - Type : ACT_GATHER_INFO
2005-01-11Name : Arbitrary code can be executed on the remote host through the web or email cl...
File : smb_nt_ms05-002.nasl - Type : ACT_GATHER_INFO
2004-12-15Name : Arbitrary code can be executed on the remote host.
File : wins_replication_overflow.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host through WordPad.
File : smb_nt_ms04-041.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host via the DHCP service.
File : smb_nt_ms04-042.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host through HyperTerminal.
File : smb_nt_ms04-043.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Local users can elevate their privileges on the remote host.
File : smb_nt_ms04-044.nasl - Type : ACT_GATHER_INFO
2004-12-14Name : Arbitrary code can be executed on the remote host via the WINS service.
File : smb_nt_ms04-045.nasl - Type : ACT_GATHER_INFO
2004-12-06Name : Arbitrary code can be executed on the remote host.
File : wins_overflow.nasl - Type : ACT_GATHER_INFO
2004-07-13Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms04-023.nasl - Type : ACT_GATHER_INFO
2004-04-13Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms04-012.nasl - Type : ACT_GATHER_INFO
2004-02-10Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms04-006.nasl - Type : ACT_GATHER_INFO
2003-11-17Name : Arbitrary code can be executed on the remote host through the Help service.
File : smb_nt_ms03-044.nasl - Type : ACT_GATHER_INFO
2003-10-16Name : Arbitrary code can be executed on the remote host.
File : messenger_ms03-043.nasl - Type : ACT_GATHER_INFO
2003-10-15Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms03-041.nasl - Type : ACT_GATHER_INFO
2003-10-15Name : Arbitrary code can be executed on the remote host.
File : smb_nt_ms03-043.nasl - Type : ACT_GATHER_INFO