Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1257
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote malicious users to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 95
Microsoft Windows Xp
7.5
CVSSv2
CVE-2002-1260
The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and previous versions allow remote malicious users to bypass security checks and access database contents via an untrusted Java applet.
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
5
CVSSv2
CVE-2002-1258
Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote malicious users to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibl...
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows Xp
Microsoft Windows 98
Microsoft Windows 98se
5
CVSSv2
CVE-2002-1325
Microsoft Virtual Machine (VM) build 5.0.3805 and previous versions allows remote malicious users to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability."
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 2000
Microsoft Windows Me
Microsoft Windows 95
Microsoft Windows Xp
7.8
CVSSv2
CVE-2000-0305
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote malicious user to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
Be Beos 5.0
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Terminal Server
1 EDB exploit
9.3
CVSSv2
CVE-2009-0087
Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and the Word 6 text converter in Microsoft Office Word 2000 SP3 and 2002 SP3; allows remote malicious users to execute arbitrary code via ...
Microsoft Office Word 2000
Microsoft Office Word 2002
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000 -
5
CVSSv2
CVE-2000-0742
The IPX protocol implementation in Microsoft Windows 95 and 98 allows remote malicious users to cause a denial of service by sending a ping packet with a source IP address that is a broadcast address, aka the "Malformed IPX Ping Packet" vulnerability.
Microsoft Windows 98
Microsoft Windows 95
7.6
CVSSv2
CVE-2000-0330
The networking software in Windows 95 and Windows 98 allows remote malicious users to execute commands via a long file name string, aka the "File Access URL" vulnerability.
Microsoft Windows 95
Microsoft Windows 98
2 EDB exploits
5
CVSSv2
CVE-2000-0347
Windows 95 and Windows 98 allow a remote malicious user to cause a denial of service via a NetBIOS session request packet with a NULL source name.
Microsoft Windows 98
Microsoft Windows 95
1 EDB exploit
5
CVSSv2
CVE-2000-0612
Windows 95 and Windows 98 do not properly process spoofed ARP packets, which allows remote malicious users to overwrite static entries in the cache table.
Microsoft Windows 95
Microsoft Windows 98
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »