CVE-2000-1218
https://notcve.org/view.php?id=CVE-2000-1218
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. • http://www.kb.cert.org/vuls/id/458659 https://exchange.xforce.ibmcloud.com/vulnerabilities/4280 • CWE-346: Origin Validation Error •
CVE-2000-0259
https://notcve.org/view.php?id=CVE-2000-0259
The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users. • http://www.securityfocus.com/bid/1105 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-024 •
CVE-2000-0232 – Microsoft Windows NT 4.0/2000 - TCP/IP Printing Service Denial of Service
https://notcve.org/view.php?id=CVE-2000-0232
Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denial of service via a malformed TCP/IP print request. • https://www.exploit-db.com/exploits/19827 http://archives.neohapsis.com/archives/bugtraq/2000-03/0306.html http://www.securityfocus.com/bid/1082 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-021 •
CVE-2000-0155 – Microsoft Windows 95/98/NT 4.0 - 'autorun.inf' Code Execution
https://notcve.org/view.php?id=CVE-2000-0155
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive. • https://www.exploit-db.com/exploits/19754 http://www.securityfocus.com/bid/993 http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000701bf79cd%24fdb5a620%244c4342a6%40mightye.org • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2000-0197
https://notcve.org/view.php?id=CVE-2000-0197
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. • http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html http://www.securityfocus.com/bid/1050 •