Microsoft

Windows 2000

517 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 73.78%
  • Veröffentlicht 09.01.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.

Exploit
  • EPSS 24.01%
  • Veröffentlicht 09.01.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Telnet Service for Windows 2000 Professional does not properly terminate incomplete connection attempts, which allows remote attackers to cause a denial of service by connecting to the server and not providing any input.

  • EPSS 20.47%
  • Veröffentlicht 31.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.

  • EPSS 53.36%
  • Veröffentlicht 19.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon ...

Exploit
  • EPSS 4.88%
  • Veröffentlicht 19.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Input Method Editor (IME) in the Simplified Chinese version of Windows 2000 does not disable access to privileged functionality that should normally be restricted, which allows local users to gain privileges, aka the "Simplified Chinese IME State...

Exploit
  • EPSS 21.2%
  • Veröffentlicht 11.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the System Monitor ActiveX control in Windows 2000 allows remote attackers to execute arbitrary commands via a long LogFileName parameter in HTML source code, aka the "ActiveX Parameter Validation" vulnerability.

  • EPSS 1.97%
  • Veröffentlicht 21.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unli...

Exploit
  • EPSS 45.51%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet C...

Exploit
  • EPSS 5.55%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the Still Image Service in Windows 2000 allows local users to gain additional privileges via a long WM_USER message, aka the "Still Image Service Privilege Escalation" vulnerability.

Exploit
  • EPSS 3.11%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Service Control Manager (SCM) in Windows 2000 creates predictable named pipes, which allows a local user with console access to gain administrator privileges, aka the "Service Control Manager Named Pipe Impersonation" vulnerability.