Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1325
Microsoft Virtual Machine (VM) build 5.0.3805 and previous versions allows remote malicious users to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability."
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 2000
Microsoft Windows Me
Microsoft Windows 95
Microsoft Windows Xp
NA
CVE-2001-0879
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows malicious users to cause a denial of service.
Microsoft Sql Server 7.0
Microsoft Sql Server 2000
Microsoft Windows 2000
Microsoft Windows Nt
Microsoft Windows Xp
NA
CVE-2000-0979
File and Print Sharing service in Windows 95, Windows 98, and Windows Me does not properly check the password for a file share, which allows remote malicious users to bypass share access controls by sending a 1-byte password that matches the first character of the real password, ...
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows 95
Microsoft Windows 98
2 EDB exploits
1 Github repository
NA
CVE-2000-0980
NMPI (Name Management Protocol on IPX) listener in Microsoft NWLink does not properly filter packets from a broadcast address, which allows remote malicious users to cause a broadcast storm and flood the network.
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 95
Microsoft Windows Me
NA
CVE-2001-0341
Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote malicious users to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.
Microsoft Frontpage Server Extensions 2000
Microsoft Windows 2000
Microsoft Windows Nt 4.0
2 EDB exploits
NA
CVE-2000-1079
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote malicious users to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 95
NA
CVE-2009-0087
Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and the Word 6 text converter in Microsoft Office Word 2000 SP3 and 2002 SP3; allows remote malicious users to execute arbitrary code via ...
Microsoft Office Word 2000
Microsoft Office Word 2002
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000 -
NA
CVE-2000-0404
The CIFS Computer Browser service allows remote malicious users to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.
Microsoft Terminal Server
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt 4.0
NA
CVE-2005-1987
Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote malicious users to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Cont...
Microsoft Exchange Server 2000
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2003 -
Microsoft Windows Xp -
Microsoft Windows Server 2003 Sp1
Microsoft Windows 2000 -
NA
CVE-2000-1003
NETBIOS client in Windows 95 and Windows 98 allows a remote malicious user to cause a denial of service by changing a file sharing service to return an unknown driver type, which causes the client to crash.
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98se
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »