Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_2000
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 517 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2008-10-14 | CVE-2008-3479 | Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability." | Windows_2000 | N/A | ||
2008-09-10 | CVE-2008-3008 | Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability." | Windows\-Nt, Windows_2000, Windows_2003_server, Windows_media_encoder, Windows_xp | N/A | ||
2008-08-12 | CVE-2008-2245 | Heap-based buffer overflow in the InternalOpenColorProfile function in mscms.dll in Microsoft Windows Image Color Management System (MSCMS) in the Image Color Management (ICM) component on Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted image file. | Windows_2000, Windows_2003_server, Windows_xp | N/A | ||
2008-08-13 | CVE-2008-1457 | The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request. | Windows\-Nt, Windows_2000, Windows_2003_server, Windows_vista, Windows_xp | N/A | ||
2008-08-13 | CVE-2008-1456 | Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers. | Windows\-Nt, Windows_2000, Windows_2003_server, Windows_vista, Windows_xp | N/A | ||
2008-07-08 | CVE-2008-1454 | Unspecified vulnerability in Microsoft DNS in Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 allows remote attackers to conduct cache poisoning attacks via unknown vectors related to accepting "records from a response that is outside the remote server's authority," aka "DNS Cache Poisoning Vulnerability," a different vulnerability than CVE-2008-1447. | Windows_2000, Windows_server_2003, Windows_server_2008, Windows_xp | N/A | ||
2008-06-12 | CVE-2008-1451 | The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability." | Windows_2000, Windows_2003_server | N/A | ||
2008-04-08 | CVE-2008-1087 | Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability." | Windows\-Nt, Windows_2000, Windows_2003_server, Windows_vista, Windows_xp | N/A | ||
2008-04-08 | CVE-2008-0083 | The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote attackers to execute arbitrary code via unknown vectors. | Windows_2000, Windows_2003_server, Windows_xp | N/A | ||
2012-03-28 | CVE-2007-6753 | Untrusted search path vulnerability in Shell32.dll in Microsoft Windows 2000, Windows XP, Windows Vista, Windows Server 2008, and Windows 7, when using an environment configured with a string such as %APPDATA% or %PROGRAMFILES% in a certain way, allows local users to gain privileges via a Trojan horse DLL under the current working directory, as demonstrated by iTunes and Safari. | Windows_2000, Windows_7, Windows_server_2008, Windows_vista, Windows_xp | N/A |