Vulnerabilities > Microsoft > Windows 2000

DATE CVE VULNERABILITY TITLE RISK
2000-08-29 CVE-2000-1079 Unspecified vulnerability in Microsoft products
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
network
low complexity
microsoft
7.5
2000-07-27 CVE-2000-0673 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
network
low complexity
microsoft
5.0
2000-07-25 CVE-2000-0663 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
local
low complexity
microsoft
4.6
2000-07-01 CVE-1999-0585 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
A Windows NT administrator account has the default name of Administrator.
local
low complexity
microsoft
2.1
2000-06-15 CVE-2000-0475 Unspecified vulnerability in Microsoft Windows 2000
Windows 2000 allows a local user process to access another user's desktop within the same windows station, aka the "Desktop Separation" vulnerability.
local
low complexity
microsoft
4.6
2000-06-05 CVE-2000-0544 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
network
low complexity
microsoft
5.0
2000-06-01 CVE-2000-0487 Unspecified vulnerability in Microsoft Windows 2000
The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability.
local
low complexity
microsoft
3.6
2000-06-01 CVE-1999-0590 A system does not present an appropriate legal message or warning to a user who is accessing it.
network
low complexity
microsoft linux apple
critical
10.0
2000-05-25 CVE-2000-0404 Unspecified vulnerability in Microsoft products
The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.
network
low complexity
microsoft
5.0
2000-05-19 CVE-2000-0305 Resource Management Errors vulnerability in multiple products
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
network
low complexity
be microsoft CWE-399
7.8