Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 - vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv2
CVE-2006-6296
The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via an RPC request tha...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
7.5
CVSSv2
CVE-2001-0860
Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
Microsoft Windows 2000
Microsoft Windows Xp
6.9
CVSSv2
CVE-2010-0237
The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."
Microsoft Windows 2000
Microsoft Windows Xp
7.5
CVSSv2
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote malicious users to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the Net...
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
5
CVSSv2
CVE-2008-5112
The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote malicious users to enumerate valid usernames via...
Microsoft Windows Server 2003
Microsoft Windows 2000 -
1 EDB exploit
1 Github repository
6.5
CVSSv2
CVE-2005-2120
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated malicious users to execute arbitrary code via a large number of "\" (backslash) characters in a registry...
Microsoft Windows Xp
Microsoft Windows 2000
2 EDB exploits
1 Github repository
2.6
CVSSv2
CVE-2001-0324
Windows 98 and Windows 2000 Java clients allow remote malicious users to cause a denial of service via a Java applet that opens a large number of UDP sockets, which prevents the host from establishing any additional UDP connections, and possibly causes a crash.
Microsoft Windows 2000
Microsoft Windows 98
1 EDB exploit
7.5
CVSSv2
CVE-1999-0504
A Windows NT local user or administrator account has a default, null, blank, or missing password.
Microsoft Windows Nt
Microsoft Windows 2000
1 EDB exploit
7.2
CVSSv2
CVE-1999-0505
A Windows NT domain user or administrator account has a guessable password.
Microsoft Windows Nt
Microsoft Windows 2000
7.2
CVSSv2
CVE-1999-0506
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
Microsoft Windows Nt
Microsoft Windows 2000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »