Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 vulnerabilities and exploits
(subscribe to this query)
0.371
EPSS
CVE-2000-0581
Windows 2000 Telnet Server allows remote malicious users to cause a denial of service by sending a continuous stream of binary zeros, which causes the server to crash.
Microsoft Windows 2000
Microsoft Windows 2000 2000.0.2195
Microsoft Windows 2000 2000.2031
Microsoft Windows 2000 2000.2072
1 EDB exploit
0.190
EPSS
CVE-2000-0580
Windows 2000 Server allows remote malicious users to cause a denial of service by sending a continuous stream of binary zeros to various TCP and UDP ports, which significantly increases the CPU utilization.
Microsoft Windows 2000
Microsoft Windows 2000 2000.0.2195
Microsoft Windows 2000 2000.2072
1 EDB exploit
0.212
EPSS
CVE-2003-0003
Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.
Microsoft Windows 2000 Terminal Services -
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows Xp -
2 EDB exploits
0.086
EPSS
CVE-1999-0519
A NETBIOS/SMB share password is the default, null, or missing.
Microsoft Outlook 2000
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows Nt
0.161
EPSS
CVE-2001-0003
Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows malicious users to obtain NTLM credentials and possibly obtain the password, aka the "Web Clie...
Microsoft Office 2000
Microsoft Windows 2000
Microsoft Windows Me
Microsoft Windows Nt
0.803
EPSS
CVE-2002-1214
Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote malicious users to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Xp
0.204
EPSS
CVE-2002-1256
The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows malicious users to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detecti...
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Xp
0.035
EPSS
CVE-2003-0112
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
0.582
EPSS
CVE-2002-1561
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote malicious users to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
4 EDB exploits
0.009
EPSS
CVE-2003-0496
Microsoft SQL Server before Windows 2000 SP4 allows local users to gain privileges as the SQL Server user by calling the xp_fileexist extended stored procedure with a named pipe as an argument instead of a normal file.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
2 EDB exploits
Preferred Score:
EPSS
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
physical
picture gallery
CVE-2025-30352
administrator privileges
gdpr tools
CVE-2025-26007
CVE-2025-24514
CVE-2025-26581
CVE-2025-1098
wp multistore locator
CVE-2025-26986
nous ouvert utile et simple
command injection
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »