Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 vulnerabilities and exploits
(subscribe to this query)
785
VMScore
CVE-2000-0305
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote malicious user to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
Be Beos 5.0
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Terminal Server
1 EDB exploit
215
VMScore
CVE-2000-0129
Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows malicious users to cause a denial of service by performing a LIST command on a malformed .lnk file.
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
725
VMScore
CVE-2000-0155
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local malicious users to specify an alternate program to execute when other users access a drive.
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
505
VMScore
CVE-2000-0073
Buffer overflow in Microsoft Rich Text Format (RTF) reader allows malicious users to cause a denial of service via a malformed control word.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 98
1 EDB exploit
828
VMScore
CVE-2009-0087
Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and the Word 6 text converter in Microsoft Office Word 2000 SP3 and 2002 SP3; allows remote malicious users to execute arbitrary code via ...
Microsoft Office Word 2000
Microsoft Office Word 2002
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000 -
505
VMScore
CVE-2000-0673
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote malicious users to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Nt Terminal Server
1 EDB exploit
668
VMScore
CVE-2005-1987
Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote malicious users to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Cont...
Microsoft Exchange Server 2000
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2003 -
Microsoft Windows Xp -
Microsoft Windows Server 2003 Sp1
Microsoft Windows 2000 -
1000
VMScore
CVE-2004-0574
The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote malicious users to execute arbitrary code via XPAT patterns, possibly related to improper...
Microsoft Exchange Server 2000
Microsoft Exchange Server 2003
Microsoft Windows 2000 -
Microsoft Windows Nt 4.0
Microsoft Windows Server 2003 R2
1 EDB exploit
445
VMScore
CVE-2000-0742
The IPX protocol implementation in Microsoft Windows 95 and 98 allows remote malicious users to cause a denial of service by sending a ping packet with a source IP address that is a broadcast address, aka the "Malformed IPX Ping Packet" vulnerability.
Microsoft Windows 98
Microsoft Windows 95
445
VMScore
CVE-2000-0612
Windows 95 and Windows 98 do not properly process spoofed ARP packets, which allows remote malicious users to overwrite static entries in the cache table.
Microsoft Windows 95
Microsoft Windows 98
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »