Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 2000 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2120
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated malicious users to execute arbitrary code via a large number of "\" (backslash) characters in a registry...
Microsoft Windows Xp
Microsoft Windows 2000
2 EDB exploits
1 Github repository
NA
CVE-2006-5586
The Graphics Rendering Engine in Microsoft Windows 2000 SP4 and XP SP2 allows local users to gain privileges via "invalid application window sizes" in layered application windows, aka the "GDI Invalid Window Size Elevation of Privilege Vulnerability."
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
NA
CVE-2006-5758
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local use...
Microsoft Windows 2000
Microsoft Windows Xp
3 EDB exploits
NA
CVE-1999-0572
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
Microsoft Windows Nt
Microsoft Windows 2000
NA
CVE-2006-6723
The Workstation service in Microsoft Windows 2000 SP4 and XP SP2 allows remote malicious users to cause a denial of service (memory consumption) via a large maxlen value in an NetrWkstaUserEnum RPC request.
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
NA
CVE-2006-6296
The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via an RPC request tha...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2001-0860
Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
Microsoft Windows 2000
Microsoft Windows Xp
NA
CVE-2005-0048
Microsoft Windows XP SP2 and previous versions, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vul...
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
NA
CVE-2002-2132
Windows File Protection (WFP) in Windows 2000 and XP does not remove old security catalog .CAT files, which could allow local users to replace new files with vulnerable old files that have valid hash codes.
Microsoft Windows 2000
Microsoft Windows Xp
NA
CVE-2008-5112
The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote malicious users to enumerate valid usernames via...
Microsoft Windows Server 2003
Microsoft Windows 2000 -
1 EDB exploit
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »