Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows-nt 2000 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2001-1288
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
505
VMScore
CVE-1999-0819
NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
505
VMScore
CVE-2001-0663
Terminal Server in Windows NT and Windows 2000 allows remote malicious users to cause a denial of service via a sequence of invalid Remote Desktop Protocol (RDP) packets.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
725
VMScore
CVE-2002-0367
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
505
VMScore
CVE-2003-0227
The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote malicious users to cause a denial of service in Internet Information Server (IIS) and execu...
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
1 EDB exploit
1000
VMScore
CVE-2000-1089
Buffer overflow in Microsoft Phone Book Service allows local users to execute arbitrary commands, aka the "Phone Book Service Buffer Overflow" vulnerability.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2 EDB exploits
445
VMScore
CVE-2000-0544
Windows NT and Windows 2000 hosts allow a remote malicious user to cause a denial of service via malformed DCE/RPC SMBwriteX requests that contain an invalid data length.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
409
VMScore
CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relat...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
445
VMScore
CVE-2005-2150
Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote malicious users to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
409
VMScore
CVE-2002-1184
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow malicious users to gain privileges as o...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
remote code execution
CVE-2024-37080
CVE-2024-5182
CVE-2024-4390
CVE-2024-6100
brute force
CVE-2021-47581
file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »