Microsoft

Windows 2000

517 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.58%
  • Published 01.02.2006 02:02:00
  • Last modified 03.04.2025 01:03:51

The VDM (Virtual DOS Machine) emulation environment for MS-DOS applications in Windows 2000, Windows XP SP2, and Windows Server 2003 allows local users to read the first megabyte of memory and possibly obtain sensitive information, as demonstrated by...

  • EPSS 34.08%
  • Published 22.01.2006 20:03:00
  • Last modified 03.04.2025 01:03:51

The 802.11 wireless client in certain operating systems including Windows 2000, Windows XP, and Windows Server 2003 does not warn the user when (1) it establishes an association with a station in ad hoc (aka peer-to-peer) mode or (2) a station in ad ...

  • EPSS 62.69%
  • Published 10.01.2006 22:03:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded...

Exploit
  • EPSS 49.91%
  • Published 10.01.2006 21:03:00
  • Last modified 03.04.2025 01:03:51

An unspecified Microsoft WMF parsing application, as used in Internet Explorer 5.01 SP4 on Windows 2000 SP4, and 5.5 SP2 on Windows Millennium, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute co...

Exploit
  • EPSS 74.76%
  • Published 09.01.2006 20:03:00
  • Last modified 03.04.2025 01:03:51

Microsoft Windows Graphics Rendering Engine (GRE) allows remote attackers to corrupt memory and cause a denial of service (crash) via a WMF file containing (1) ExtCreateRegion or (2) ExtEscape function calls with arguments with inconsistent lengths.

Exploit
  • EPSS 19.89%
  • Published 31.12.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Internet Explorer 6.0 on Windows NT 4.0 SP6a, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, and Windows Server 2003 SP1 allows remote attackers to cause a denial of service (client crash) via a certain combination of a malformed HTML fi...

  • EPSS 3.07%
  • Published 14.12.2005 01:03:00
  • Last modified 03.04.2025 01:03:51

The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the...

Exploit
  • EPSS 0.67%
  • Published 04.12.2005 11:03:00
  • Last modified 03.04.2025 01:03:51

NOTE: this issue has been disputed by third parties. Microsoft Windows XP, 2000, and 2003 allows local users to kill a writable process by using the CreateRemoteThread function with certain arguments on a process that has been opened using the OpenP...

  • EPSS 24.08%
  • Published 01.12.2005 06:03:00
  • Last modified 03.04.2025 01:03:51

The SynAttackProtect protection in Microsoft Windows 2003 before SP1 and Windows 2000 before SP4 with Update Roll-up uses a hash of predictable data, which allows remote attackers to cause a denial of service (CPU consumption) via a flood of SYN pack...

  • EPSS 82.62%
  • Published 29.11.2005 21:03:00
  • Last modified 03.04.2025 01:03:51

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format im...