Microsoft

Windows 2000

517 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 11.86%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

IP forwarding is enabled on a machine which is not a router or firewall.

  • EPSS 17.87%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

A NETBIOS/SMB share password is the default, null, or missing.

  • EPSS 0.59%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota,...

  • EPSS 17.26%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.

  • EPSS 33.01%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

The registry in Windows NT can be accessed remotely by users who are not administrators.

  • EPSS 13.47%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

  • EPSS 19.63%
  • Published 01.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.