Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2000 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2008-0087
The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote malicious users to spoof DNS responses.
Microsoft Windows Xp -
Microsoft Windows Vista -
Microsoft Windows 2000 -
Microsoft Windows Server 2003 -
7.5
CVSSv3
CVE-2004-0119
The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote malicious users to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authe...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows Server 2003 -
7.5
CVSSv3
CVE-2001-1515
Macintosh clients, when using NT file system volumes on Windows 2000 SP1, create subdirectories and automatically modify the inherited NTFS permissions, which may cause the directories to have less restrictive permissions than intended.
Microsoft Windows 2000 -
7.5
CVSSv3
CVE-2001-1452
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote malicious users to poison the DNS cache via spoofed DNS responses.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
6.8
CVSSv3
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 prior to 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote malicious users to spoof DNS traffic via a birthday attack th...
Isc Bind 4
Isc Bind 8
Isc Bind 9.2.9
3 EDB exploits
4 Nmap scripts
1 Github repository
5.5
CVSSv3
CVE-2006-2374
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow dev...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 2003 Server -
2 EDB exploits
5.5
CVSSv3
CVE-2002-0725
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local malicious users to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
NA
CVE-2011-5279
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote malicious users to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.
Microsoft Internet Information Services 4.0
Microsoft Internet Information Services 5.0
NA
CVE-2013-3130
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-3660, CVE-2013-3661. Reason: This candidate is a reservation duplicate of CVE-2013-3660 and CVE-2013-3661. Notes: All CVE users should reference CVE-2013-3660 and/or CVE-2013-3661 instead of this candidate. A...
3 EDB exploits
NA
CVE-2013-3661
The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continu...
Microsoft Windows Xp -
Microsoft Windows 7 -
Microsoft Windows 8 -
Microsoft Windows Vista -
Microsoft Windows Server 2008 -
Microsoft Windows Rt -
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 R2
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »