Microsoft

Windows 2000

517 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.37%
  • Veröffentlicht 18.06.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.

  • EPSS 2.05%
  • Veröffentlicht 02.06.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Microsoft Windows 2000 Encrypted File System does not properly destroy backups of files that are encrypted, which allows a local attacker to recover the text of encrypted files.

Exploit
  • EPSS 0.75%
  • Veröffentlicht 24.05.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows 2000 allows local users to cause a denial of service and possibly gain privileges by setting a hardware breakpoint that is handled using global debug registers, which could cause other processes to terminate due to an exception, and allow hij...

  • EPSS 30.74%
  • Veröffentlicht 03.05.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Windows 2000 event viewer snap-in allows attackers to execute arbitrary commands via a malformed field that is improperly handled during the detailed view of event records.

Exploit
  • EPSS 3.19%
  • Veröffentlicht 03.05.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows 98 and Windows 2000 Java clients allow remote attackers to cause a denial of service via a Java applet that opens a large number of UDP sockets, which prevents the host from establishing any additional UDP connections, and possibly causes a c...

Exploit
  • EPSS 2.65%
  • Veröffentlicht 12.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM privileges via a "WM_COPYDATA" message to an invisible window that is running with the privileges of the WINLOGON process.

  • EPSS 0.42%
  • Veröffentlicht 16.02.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Pe...

  • EPSS 36.28%
  • Veröffentlicht 12.02.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password...

  • EPSS 31.09%
  • Veröffentlicht 12.02.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Remote Data Protocol (RDP) in Windows 2000 Terminal Service does not properly handle certain malformed packets, which allows remote attackers to cause a denial of service, aka the "Invalid RDP Data" vulnerability.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 12.02.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The "Configure Your Server" tool in Microsoft 2000 domain controllers installs a blank password for the Directory Service Restore Mode, which allows attackers with physical access to the controller to install malicious programs, aka the "Directory Se...