Microsoft

Windows 2000

517 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.27%
  • Published 20.10.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability.

  • EPSS 2.93%
  • Published 20.10.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specif...

  • EPSS 33.1%
  • Published 29.08.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast d...

Exploit
  • EPSS 32.49%
  • Published 27.07.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerabi...

  • EPSS 1.07%
  • Published 25.07.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% ...

  • EPSS 1.31%
  • Published 01.07.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

A Windows NT administrator account has the default name of Administrator.

Exploit
  • EPSS 26.16%
  • Published 30.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows 2000 Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros to various TCP and UDP ports, which significantly increases the CPU utilization.

  • EPSS 66.14%
  • Published 30.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows 2000 Telnet Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros, which causes the server to crash.

Exploit
  • EPSS 3.68%
  • Published 15.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows 2000 allows a local user process to access another user's desktop within the same windows station, aka the "Desktop Separation" vulnerability.

  • EPSS 20%
  • Published 05.06.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.