Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 sp4 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2009-1924
Integer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 allows remote WINS replication partners to execute arbitrary code via crafted data structures in a packet, aka "WINS Integer Overflow Vulnerability."
Microsoft Windows 2003 Server -
Microsoft Windows 2000
828
VMScore
CVE-2008-0083
The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote malicious users to execute arbitrary code via unknown vector...
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000
215
VMScore
CVE-2006-2334
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent malicious users to create files that cannot be accessed through t...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
641
VMScore
CVE-2008-1451
The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."
Microsoft Windows 2003 Server -
Microsoft Windows 2000 -
445
VMScore
CVE-2005-2150
Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote malicious users to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
828
VMScore
CVE-2009-4210
The Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted media content.
Microsoft Windows 2000
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Xp
828
VMScore
CVE-2009-4312
Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to execute arbitrary code via crafted media content, as reported to Microsoft by Dave Lenoe of Adobe.
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000
828
VMScore
CVE-2009-1923
Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote malicious users to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, ...
Microsoft Windows 2003 Server -
Microsoft Windows 2000
220
VMScore
CVE-2006-2374
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow dev...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 2003 Server -
2 EDB exploits
1000
VMScore
CVE-2006-2373
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and ...
Microsoft Windows 2000 -
Microsoft Windows Xp -
Microsoft Windows Server 2003 -
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »