CVE-2000-0858
https://notcve.org/view.php?id=CVE-2000-0858
Vulnerability in Microsoft Windows NT 4.0 allows remote attackers to cause a denial of service in IIS by sending it a series of malformed requests which cause INETINFO.EXE to fail, aka the "Invalid URL" vulnerability. • http://archives.neohapsis.com/archives/vendor/2000-q3/0065.html http://www.securityfocus.com/archive/1/80413 http://www.securityfocus.com/bid/1642 https://exchange.xforce.ibmcloud.com/vulnerabilities/5202 •
CVE-2000-1079
https://notcve.org/view.php?id=CVE-2000-1079
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0116.html http://www.nai.com/research/covert/advisories/045.asp http://www.securityfocus.com/bid/1620 https://exchange.xforce.ibmcloud.com/vulnerabilities/5168 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1079 •
CVE-2000-0673 – Microsoft Windows NT 4.0/2000 - NetBIOS Name Conflict
https://notcve.org/view.php?id=CVE-2000-0673
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. • https://www.exploit-db.com/exploits/20106 http://www.nai.com/research/covert/advisories/044.asp http://www.securityfocus.com/bid/1514 http://www.securityfocus.com/bid/1515 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-047 https://exchange.xforce.ibmcloud.com/vulnerabilities/5035 •
CVE-2000-0663
https://notcve.org/view.php?id=CVE-2000-0663
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=269049 http://www.securityfocus.com/bid/1507 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-052 https://exchange.xforce.ibmcloud.com/vulnerabilities/5040 •
CVE-2000-0377 – Microsoft Windows NT 4.0 - Remote Registry Request Denial of Service
https://notcve.org/view.php?id=CVE-2000-0377
The Remote Registry server in Windows NT 4.0 allows local authenticated users to cause a denial of service via a malformed request, which causes the winlogon process to fail, aka the "Remote Registry Access Authentication" vulnerability. • https://www.exploit-db.com/exploits/20005 https://www.exploit-db.com/exploits/20006 http://www.microsoft.com/technet/support/kb.asp?ID=264684 http://www.securityfocus.com/bid/1331 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-040 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1021 •