Vulnerabilities > Microsoft

DATE CVE VULNERABILITY TITLE RISK
2000-10-20 CVE-2000-0710 Denial Of Service vulnerability in Microsoft FrontPage Server Extensions MS-DOS Device Name
The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name.
network
low complexity
microsoft
5.0
2000-10-20 CVE-2000-0709 Denial Of Service vulnerability in Microsoft FrontPage Server Extensions MS-DOS Device Name
The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
network
low complexity
microsoft
5.0
2000-08-29 CVE-2000-1079 Unspecified vulnerability in Microsoft products
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
network
low complexity
microsoft
7.5
2000-07-27 CVE-2000-0673 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
network
low complexity
microsoft
5.0
2000-07-25 CVE-2000-0663 Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
local
low complexity
microsoft
4.6
2000-07-20 CVE-2000-0653 Unspecified vulnerability in Microsoft Outlook Express
Microsoft Outlook Express allows remote attackers to monitor a user's email by creating a persistent browser link to the Outlook Express windows, aka the "Persistent Mail-Browser Link" vulnerability.
network
low complexity
microsoft
5.0
2000-07-20 CVE-2000-0621 Unspecified vulnerability in Microsoft Outlook and Outlook Express
Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability.
network
low complexity
microsoft
7.5
2000-07-18 CVE-2000-0567 Unspecified vulnerability in Microsoft Outlook and Outlook Express
Buffer overflow in Microsoft Outlook and Outlook Express allows remote attackers to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability.
network
low complexity
microsoft
5.0
2000-07-17 CVE-2000-0630 Unspecified vulnerability in Microsoft products
IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability.
network
low complexity
microsoft
5.0
2000-07-14 CVE-2000-0631 Unspecified vulnerability in Microsoft products
An administrative script from IIS 3.0, later included in IIS 4.0 and 5.0, allows remote attackers to cause a denial of service by accessing the script without a particular argument, aka the "Absent Directory Browser Argument" vulnerability.
network
low complexity
microsoft
5.0