Vulnerabilities > Microsoft > Windows 2000
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2000-08-29 | CVE-2000-1079 | Unspecified vulnerability in Microsoft products Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. | 7.5 |
2000-07-27 | CVE-2000-0673 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. | 5.0 |
2000-07-25 | CVE-2000-0663 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. | 4.6 |
2000-07-01 | CVE-1999-0585 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT A Windows NT administrator account has the default name of Administrator. | 2.1 |
2000-06-15 | CVE-2000-0475 | Unspecified vulnerability in Microsoft Windows 2000 Windows 2000 allows a local user process to access another user's desktop within the same windows station, aka the "Desktop Separation" vulnerability. | 4.6 |
2000-06-05 | CVE-2000-0544 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT Windows NT and Windows 2000 hosts allow a remote attacker to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length. | 5.0 |
2000-06-01 | CVE-2000-0487 | Unspecified vulnerability in Microsoft Windows 2000 The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability. | 3.6 |
2000-06-01 | CVE-1999-0590 | A system does not present an appropriate legal message or warning to a user who is accessing it. | 10.0 |
2000-05-25 | CVE-2000-0404 | Unspecified vulnerability in Microsoft products The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability. | 5.0 |
2000-05-19 | CVE-2000-0305 | Resource Management Errors vulnerability in multiple products Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. | 7.8 |