Page 120 of 637 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0112.html http://www.securityfocus.com/bid/1198 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixed Object Access" vulnerability. • http://www.securityfocus.com/bid/1145 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-026 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability. • http://archives.neohapsis.com/archives/bugtraq/2000-04/0147.html http://www.securityfocus.com/bid/1135 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-027 •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. • http://www.kb.cert.org/vuls/id/458659 https://exchange.xforce.ibmcloud.com/vulnerabilities/4280 • CWE-346: Origin Validation Error •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The unattended installation of Windows 2000 with the OEMPreinstall option sets insecure permissions for the All Users and Default Users directories. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0027.html http://www.securityfocus.com/bid/1758 https://exchange.xforce.ibmcloud.com/vulnerabilities/4278 •