Vulnerabilities > Microsoft > Windows 2000 > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2001-06-27 | CVE-2001-0241 | Buffer Overflow vulnerability in Microsoft IIS 5.0 .printer ISAPI Extension Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0. | 10.0 |
2001-05-03 | CVE-2001-0147 | Unspecified vulnerability in Microsoft Windows 2000 Buffer overflow in Windows 2000 event viewer snap-in allows attackers to execute arbitrary commands via a malformed field that is improperly handled during the detailed view of event records. | 10.0 |
2001-01-09 | CVE-2000-1089 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability. | 10.0 |
2000-12-11 | CVE-2000-1034 | Unspecified vulnerability in Microsoft Windows 2000 Buffer overflow in the System Monitor ActiveX control in Windows 2000 allows remote attackers to execute arbitrary commands via a long LogFileName parameter in HTML source code, aka the "ActiveX Parameter Validation" vulnerability. | 10.0 |
2000-06-01 | CVE-1999-0590 | A system does not present an appropriate legal message or warning to a user who is accessing it. | 10.0 |
2000-04-14 | CVE-2000-1218 | Origin Validation Error vulnerability in Microsoft products The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. | 9.8 |
1997-01-01 | CVE-1999-0535 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. | 10.0 |
1997-01-01 | CVE-1999-0572 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. | 9.3 |