Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 sp4 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2006-5758
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local use...
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
9.3
CVSSv2
CVE-2009-1924
Integer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 allows remote WINS replication partners to execute arbitrary code via crafted data structures in a packet, aka "WINS Integer Overflow Vulnerability."
Microsoft Windows 2003 Server -
Microsoft Windows 2000
9.3
CVSSv2
CVE-2009-4312
Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to execute arbitrary code via crafted media content, as reported to Microsoft by Dave Lenoe of Adobe.
Microsoft Windows 2003 Server
Microsoft Windows Xp -
Microsoft Windows 2000
Microsoft Windows Xp
7.2
CVSSv2
CVE-2008-1451
The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."
Microsoft Windows 2003 Server -
Microsoft Windows 2000 -
5
CVSSv2
CVE-2005-2150
Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote malicious users to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
2.1
CVSSv2
CVE-2006-2334
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent malicious users to create files that cannot be accessed through t...
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
2.1
CVSSv2
CVE-2006-2374
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow dev...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 2003 Server -
2 EDB exploits
10
CVSSv2
CVE-2006-2373
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and ...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows Server 2003 -
2 EDB exploits
9.3
CVSSv2
CVE-2009-4311
Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to execute arbitrary code via crafted media content, as reported to Microsoft by Paul Byrne of NGS Software. NOTE: this might overlap CVE-...
Microsoft Windows 2003 Server
Microsoft Windows Xp -
Microsoft Windows 2000
Microsoft Windows Xp
9.3
CVSSv2
CVE-2010-0028
Integer overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability."
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows 2000
Microsoft Windows Server 2003
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »