Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-0519
A NETBIOS/SMB share password is the default, null, or missing.
Microsoft Outlook 2000
Microsoft Windows Nt
Microsoft Windows 2000
Microsoft Windows 95
5
CVSSv2
CVE-2001-0003
Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows malicious users to obtain NTLM credentials and possibly obtain the password, aka the "Web Clie...
Microsoft Office 2000
Microsoft Windows Me
Microsoft Windows Nt
Microsoft Windows 2000
4.6
CVSSv2
CVE-2003-0112
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000 Terminal Services
5
CVSSv2
CVE-2002-1561
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote malicious users to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference.
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2000
4 EDB exploits
7.5
CVSSv2
CVE-2007-1692
The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote malicious users to intercept web traffic by registering a proxy server using WINS or DNS, then responding to WPAD requests, as dem...
Microsoft Windows 2000
Microsoft Windows 2003 Server 2000
Microsoft Windows 2003 Server R2
5
CVSSv2
CVE-2002-0055
SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote malicious users to cause a denial of service via a command with a malformed data transfer (BDAT) request.
Microsoft Exchange Server 2000
Microsoft Windows 2000 -
Microsoft Windows Xp
5
CVSSv2
CVE-2002-0864
The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote malicious users to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remo...
Microsoft .net Windows Server Beta3
Microsoft Windows 2000 Terminal Services
Microsoft Windows Xp
Microsoft Windows 2000
5
CVSSv2
CVE-2001-0543
Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote malicious users to cause a denial of service (memory exhaustion) via a large number of malformed posts.
Microsoft Exchange Server 2000
Microsoft Windows 2000
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2000-1039
Various TCP/IP stacks and network applications allow remote malicious users to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA&...
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Nt 4.0
1 Github repository
7.5
CVSSv2
CVE-2000-1218
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote malicious users to poison the DNS cache.
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 98 -
Microsoft Windows 98se -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »