By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
Max CVSS
7.5
EPSS Score
1.63%
Published
2001-08-31
Updated
2024-02-08
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Max CVSS
5.0
EPSS Score
1.18%
Published
2001-07-07
Updated
2018-10-30
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.
Max CVSS
5.0
EPSS Score
0.44%
Published
2001-12-20
Updated
2019-04-30
Terminal Server in Windows NT and Windows 2000 allows remote attackers to cause a denial of service via a sequence of invalid Remote Desktop Protocol (RDP) packets.
Max CVSS
5.0
EPSS Score
82.48%
Published
2001-12-06
Updated
2018-10-12
RPC endpoint mapper in Windows NT 4.0 allows remote attackers to cause a denial of service (loss of RPC services) via a malformed request.
Max CVSS
5.0
EPSS Score
89.52%
Published
2001-10-30
Updated
2018-10-12
Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
Max CVSS
5.0
EPSS Score
0.60%
Published
2001-09-20
Updated
2020-04-02
Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.
Max CVSS
5.0
EPSS Score
0.39%
Published
2001-09-20
Updated
2020-04-02
Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.
Max CVSS
7.5
EPSS Score
3.33%
Published
2001-07-21
Updated
2019-04-30
Format string vulnerability in DbgPrint function, used in debug messages for some Windows NT drivers (possibly when called through DebugMessage), may allow local users to gain privileges.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-05-03
Updated
2008-09-05
Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests.
Max CVSS
7.5
EPSS Score
1.30%
Published
2001-07-02
Updated
2018-10-12
The default permissions for the MTS Package Administration registry key in Windows NT 4.0 allows local users to install or modify arbitrary Microsoft Transaction Server (MTS) packages and gain privileges, aka one of the "Registry Permissions" vulnerabilities.
Max CVSS
7.5
EPSS Score
1.36%
Published
2001-02-16
Updated
2018-10-12
The default permissions for the RAS Administration key in Windows NT 4.0 allows local users to execute arbitrary commands by changing the value to point to a malicious DLL, aka one of the "Registry Permissions" vulnerabilities.
Max CVSS
10.0
EPSS Score
0.45%
Published
2001-02-16
Updated
2018-10-12
Memory leak in PPTP server in Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed data packet, aka the "Malformed PPTP Packet Stream" vulnerability.
Max CVSS
5.0
EPSS Score
2.58%
Published
2001-03-12
Updated
2018-10-12
NTLM Security Support Provider (NTLMSSP) service does not properly check the function number in an LPC request, which could allow local users to gain administrator level access.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-03-12
Updated
2018-10-12
The Winsock2ProtocolCatalogMutex mutex in Windows NT 4.0 has inappropriate Everyone/Full Control permissions, which allows local users to modify the permissions to "No Access" and disable Winsock network connectivity to cause a denial of service, aka the "Winsock Mutex" vulnerability.
Max CVSS
7.1
EPSS Score
0.07%
Published
2001-02-12
Updated
2024-01-26
Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulnerability.
Max CVSS
5.0
EPSS Score
0.49%
Published
2001-02-12
Updated
2018-10-12
Windows NT allows remote attackers to list all users in a domain by obtaining the domain SID with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users.
Max CVSS
5.0
EPSS Score
1.57%
Published
2001-08-31
Updated
2017-10-10
Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability.
Max CVSS
7.5
EPSS Score
0.16%
Published
2001-01-09
Updated
2018-10-12

CVE-2000-1089

Public exploit
Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.
Max CVSS
10.0
EPSS Score
96.97%
Published
2001-01-09
Updated
2018-10-12
Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.
Max CVSS
5.0
EPSS Score
1.21%
Published
2001-01-09
Updated
2018-10-12
20 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!