Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 - vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote malicious users to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the Net...
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
7.2
CVSSv2
CVE-1999-0249
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Microsoft Windows Nt
Microsoft Windows 2000
4.6
CVSSv2
CVE-2002-0034
The Microsoft CONVERT.EXE program, when used on Windows 2000 and Windows XP systems, does not apply the default NTFS permissions when converting a FAT32 file system, which could cause the conversion to produce a file system with less secure permissions than expected.
Microsoft Windows Xp
Microsoft Windows 2000
2.1
CVSSv2
CVE-2002-2132
Windows File Protection (WFP) in Windows 2000 and XP does not remove old security catalog .CAT files, which could allow local users to replace new files with vulnerable old files that have valid hash codes.
Microsoft Windows 2000
Microsoft Windows Xp
7.2
CVSSv2
CVE-2006-5586
The Graphics Rendering Engine in Microsoft Windows 2000 SP4 and XP SP2 allows local users to gain privileges via "invalid application window sizes" in layered application windows, aka the "GDI Invalid Window Size Elevation of Privilege Vulnerability."
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
10
CVSSv2
CVE-2006-4691
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote malicious users to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
5
CVSSv2
CVE-2008-5112
The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote malicious users to enumerate valid usernames via...
Microsoft Windows Server 2003
Microsoft Windows 2000 -
1 EDB exploit
1 Github repository
2.6
CVSSv2
CVE-2001-0324
Windows 98 and Windows 2000 Java clients allow remote malicious users to cause a denial of service via a Java applet that opens a large number of UDP sockets, which prevents the host from establishing any additional UDP connections, and possibly causes a crash.
Microsoft Windows 2000
Microsoft Windows 98
1 EDB exploit
7.5
CVSSv2
CVE-2002-0823
Buffer overflow in Winhlp32.exe allows remote malicious users to execute arbitrary code via an HTML document that calls the HTML Help ActiveX control (HHCtrl.ocx) with a long pathname in the Item parameter.
Microsoft Windows Help
Microsoft Windows 2000
1 EDB exploit
6.9
CVSSv2
CVE-2010-0237
The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."
Microsoft Windows 2000
Microsoft Windows Xp
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »