Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6723
The Workstation service in Microsoft Windows 2000 SP4 and XP SP2 allows remote malicious users to cause a denial of service (memory consumption) via a large maxlen value in an NetrWkstaUserEnum RPC request.
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
NA
CVE-2002-0823
Buffer overflow in Winhlp32.exe allows remote malicious users to execute arbitrary code via an HTML document that calls the HTML Help ActiveX control (HHCtrl.ocx) with a long pathname in the Item parameter.
Microsoft Windows Help
Microsoft Windows 2000
1 EDB exploit
NA
CVE-1999-0562
The registry in Windows NT can be accessed remotely by users who are not administrators.
Microsoft Windows 2000
Microsoft Windows Nt
1 EDB exploit
NA
CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Microsoft Windows Nt
Microsoft Windows 2000
NA
CVE-1999-0582
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
Microsoft Windows Nt
Microsoft Windows 2000
NA
CVE-1999-0249
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Microsoft Windows Nt
Microsoft Windows 2000
NA
CVE-2008-5112
The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote malicious users to enumerate valid usernames via...
Microsoft Windows Server 2003
Microsoft Windows 2000 -
1 EDB exploit
1 Github repository
NA
CVE-2006-2334
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent malicious users to create files that cannot be accessed through t...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote malicious users to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the Net...
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
NA
CVE-2006-5758
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local use...
Microsoft Windows 2000
Microsoft Windows Xp
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »