Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2010-0237
The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."
Microsoft Windows 2000
Microsoft Windows Xp
505
VMScore
CVE-2005-2307
netman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function, aka "Network Connection Manager Vulnerability."
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
668
VMScore
CVE-2001-0860
Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
Microsoft Windows 2000
Microsoft Windows Xp
668
VMScore
CVE-2002-1932
Microsoft Windows XP and Windows 2000, when configured to send administrative alerts and the "Do not overwrite events (clear log manually)" option is set, does not notify the administrator when the log reaches its maximum size, which allows local users and remote malici...
Microsoft Windows Xp
Microsoft Windows 2000
615
VMScore
CVE-2006-6296
The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via an RPC request tha...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
828
VMScore
CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Microsoft Windows Nt
Microsoft Windows 2000
785
VMScore
CVE-2005-3644
PNP_GetDeviceList (upnp_getdevicelist) in UPnP for Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via a DCE RPC request that specifies a large out...
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
660
VMScore
CVE-2005-2120
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated malicious users to execute arbitrary code via a large number of "\" (backslash) characters in a registry...
Microsoft Windows Xp
Microsoft Windows 2000
2 EDB exploits
1 Github repository
785
VMScore
CVE-2006-6723
The Workstation service in Microsoft Windows 2000 SP4 and XP SP2 allows remote malicious users to cause a denial of service (memory consumption) via a large maxlen value in an NetrWkstaUserEnum RPC request.
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
1000
VMScore
CVE-2006-4691
Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote malicious users to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »