
CVE-2000-1149
https://notcve.org/view.php?id=CVE-2000-1149
09 Jan 2001 — Buffer overflow in RegAPI.DLL used by Windows NT 4.0 Terminal Server allows remote attackers to execute arbitrary commands via a long username, aka the "Terminal Server Login Buffer Overflow" vulnerability. • http://www.securityfocus.com/archive/1/143991 •

CVE-2000-1227
https://notcve.org/view.php?id=CVE-2000-1227
31 Dec 2000 — Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back. • http://www.securityfocus.com/archive/1/63322 •

CVE-2000-1039
https://notcve.org/view.php?id=CVE-2000-1039
19 Dec 2000 — Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction tha... • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html •

CVE-1999-1579
https://notcve.org/view.php?id=CVE-1999-1579
14 Dec 2000 — The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B242366 •

CVE-2000-0885
https://notcve.org/view.php?id=CVE-2000-0885
29 Nov 2000 — Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-083 •

CVE-2000-0858
https://notcve.org/view.php?id=CVE-2000-0858
14 Nov 2000 — Vulnerability in Microsoft Windows NT 4.0 allows remote attackers to cause a denial of service in IIS by sending it a series of malformed requests which cause INETINFO.EXE to fail, aka the "Invalid URL" vulnerability. • http://archives.neohapsis.com/archives/vendor/2000-q3/0065.html •

CVE-2000-1079
https://notcve.org/view.php?id=CVE-2000-1079
29 Aug 2000 — Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0116.html •

CVE-2000-0673 – Microsoft Windows NT 4.0/2000 - NetBIOS Name Conflict
https://notcve.org/view.php?id=CVE-2000-0673
27 Jul 2000 — The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. • https://www.exploit-db.com/exploits/20106 •

CVE-2000-0663
https://notcve.org/view.php?id=CVE-2000-0663
25 Jul 2000 — The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=269049 •

CVE-2000-0377 – Microsoft Windows NT 4.0 - Remote Registry Request Denial of Service
https://notcve.org/view.php?id=CVE-2000-0377
08 Jun 2000 — The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability. • https://www.exploit-db.com/exploits/20005 •