Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
Max CVSS
5.0
EPSS Score
2.38%
Published
2000-12-31
Updated
2019-04-30
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
Max CVSS
9.8
EPSS Score
0.64%
Published
2000-04-14
Updated
2024-02-08
Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unlimited number of login attempts, aka the "Domain Account Lockout" vulnerability.
Max CVSS
4.6
EPSS Score
0.23%
Published
2000-11-21
Updated
2019-04-30
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
Max CVSS
7.5
EPSS Score
1.76%
Published
2000-08-29
Updated
2017-12-19
Buffer overflow in the System Monitor ActiveX control in Windows 2000 allows remote attackers to execute arbitrary commands via a long LogFileName parameter in HTML source code, aka the "ActiveX Parameter Validation" vulnerability.
Max CVSS
10.0
EPSS Score
0.11%
Published
2000-12-11
Updated
2018-10-12
The Input Method Editor (IME) in the Simplified Chinese version of Windows 2000 does not disable access to privileged functionality that should normally be restricted, which allows local users to gain privileges, aka the "Simplified Chinese IME State Recognition" vulnerability.
Max CVSS
4.6
EPSS Score
0.05%
Published
2000-12-19
Updated
2018-10-12
Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates.
Max CVSS
7.5
EPSS Score
43.61%
Published
2000-12-19
Updated
2019-04-30
Buffer overflow in the Still Image Service in Windows 2000 allows local users to gain additional privileges via a long WM_USER message, aka the "Still Image Service Privilege Escalation" vulnerability.
Max CVSS
4.6
EPSS Score
0.10%
Published
2000-11-14
Updated
2018-10-12
The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability.
Max CVSS
7.5
EPSS Score
2.67%
Published
2000-11-14
Updated
2018-10-12
The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-10-20
Updated
2018-10-12
The Service Control Manager (SCM) in Windows 2000 creates predictable named pipes, which allows a local user with console access to gain administrator privileges, aka the "Service Control Manager Named Pipe Impersonation" vulnerability.
Max CVSS
4.6
EPSS Score
0.05%
Published
2000-10-20
Updated
2018-10-12
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
Max CVSS
5.0
EPSS Score
5.91%
Published
2000-07-27
Updated
2018-10-12
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-07-25
Updated
2018-10-12
Windows 2000 Telnet Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros, which causes the server to crash.
Max CVSS
5.0
EPSS Score
13.37%
Published
2000-06-30
Updated
2008-09-10
Windows 2000 Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros to various TCP and UDP ports, which significantly increases the CPU utilization.
Max CVSS
5.0
EPSS Score
1.33%
Published
2000-06-30
Updated
2008-09-10
Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
Max CVSS
5.0
EPSS Score
0.29%
Published
2000-06-05
Updated
2008-09-10
The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability.
Max CVSS
3.6
EPSS Score
0.08%
Published
2000-06-01
Updated
2018-10-12
Windows 2000 allows a local user process to access another user's desktop within the same windows station, aka the "Desktop Separation" vulnerability.
Max CVSS
4.6
EPSS Score
0.05%
Published
2000-06-15
Updated
2018-10-12
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
Max CVSS
7.2
EPSS Score
0.05%
Published
2000-05-11
Updated
2008-09-10
NTMail 5.x allows network users to bypass the NTMail proxy restrictions by redirecting their requests to NTMail's web configuration server.
Max CVSS
5.0
EPSS Score
1.10%
Published
2000-05-11
Updated
2008-09-10
The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.
Max CVSS
5.0
EPSS Score
1.58%
Published
2000-05-25
Updated
2018-10-12
Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.
Max CVSS
5.0
EPSS Score
0.05%
Published
2000-04-20
Updated
2018-10-12
The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixed Object Access" vulnerability.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-04-20
Updated
2018-10-12
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
Max CVSS
7.8
EPSS Score
1.45%
Published
2000-05-19
Updated
2018-10-12
31 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!