Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-1999-0535
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
Microsoft Windows Nt
Microsoft Windows 2000
755
VMScore
CVE-1999-0562
The registry in Windows NT can be accessed remotely by users who are not administrators.
Microsoft Windows Nt
Microsoft Windows 2000
1 EDB exploit
615
VMScore
CVE-2006-6296
The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via an RPC request tha...
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
641
VMScore
CVE-2005-0545
Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue...
Microsoft Windows Xp
Microsoft Windows 2000
445
VMScore
CVE-1999-0582
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
Microsoft Windows Nt
Microsoft Windows 2000
828
VMScore
CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Microsoft Windows Nt
Microsoft Windows 2000
735
VMScore
CVE-2006-5758
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local use...
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
614
VMScore
CVE-2010-0237
The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."
Microsoft Windows 2000
Microsoft Windows Xp
668
VMScore
CVE-2001-0860
Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
Microsoft Windows 2000
Microsoft Windows Xp
840
VMScore
CVE-1999-0506
A Windows NT domain user or administrator account has a default, null, blank, or missing password.
Microsoft Windows Nt
Microsoft Windows 2000
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »