Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2000 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2001-0015
Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM privileges via a "WM_COPYDATA" message to an invisible window that is running with the privileges of the WINLOGON process.
Microsoft Windows 2000
668
VMScore
CVE-2000-0596
Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote malicious users to execute arbitrary commands, aka the "IE Script" vulnerability.
Microsoft Internet Explorer 5
Microsoft Internet Explorer 4.0.1
890
VMScore
CVE-2007-0040
The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4, Server 2003 SP1 and SP2, Server 2003 x64 Edition and SP2, and Server 2003 for Itanium-based Systems SP1 and SP2 allows remote malicious users to execute arbitrary code via a crafted LDAP request wi...
Microsoft Windows 2003 Server
Microsoft Windows 2000
1000
VMScore
CVE-2003-0347
Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 up to and including 6.3 allows remote malicious users to execute arbitrary code via a document with a long ID parameter.
Microsoft Office 2000
Microsoft Office Xp
Microsoft Visual Basic 6.2
Microsoft Visio 2002
Microsoft Visual Basic 5.0
Microsoft Project 2000
Microsoft Project 2002
Microsoft Visual Basic 6.3
1 EDB exploit
641
VMScore
CVE-2004-0118
The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Microsoft Windows 2000
Microsoft Windows Nt 4.0
187
VMScore
CVE-2002-2028
The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing.
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
796
VMScore
CVE-2000-0884
IIS 4.0 and 5.0 allows remote malicious users to read documents outside of the web root, and possibly execute arbitrary commands, via malformed URLs that contain UNICODE encoded characters, aka the "Web Server Folder Traversal" vulnerability.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
9 EDB exploits
2 Github repositories
755
VMScore
CVE-2000-0457
ISM.DLL in IIS 4.0 and 5.0 allows remote malicious users to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the ".HTR File Fragment Reading" or "File Fragment Reading via .HTR&...
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
1 EDB exploit
828
VMScore
CVE-2007-0028
Microsoft Excel 2000, 2002, 2003, Viewer 2003, Office 2004 for Mac, and Office v.X for Mac does not properly handle certain opcodes, which allows user-assisted remote malicious users to execute arbitrary code via a crafted XLS file, which results in an "Improper Memory Acces...
Microsoft Excel 2000
Microsoft Office 2000
Microsoft Excel 2002
Microsoft Office Xp
Microsoft Office 2003
Microsoft Excel 2003
Microsoft Excel Viewer 2003
Microsoft Works 2004
Microsoft Works 2005
Microsoft Office 2004
Microsoft Office V.x
668
VMScore
CVE-2002-0154
Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote malicious users to cause a denial of service or execute arbitrary code via a database query with certain long arguments.
Microsoft Sql Server 7.0
Microsoft Sql Server 2000
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »