Vulnerabilities > Microsoft
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-12-29 | CVE-2000-0100 | Unspecified vulnerability in Microsoft Systems Management Server 2.0 The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program. | 7.2 |
1999-12-23 | CVE-2000-0028 | Unspecified vulnerability in Microsoft IE and Internet Explorer Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function. | 2.6 |
1999-12-13 | CVE-1999-0993 | Improper Initialization vulnerability in Microsoft Exchange Server 5.0/5.5 Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed. | 7.5 |
1999-12-10 | CVE-1999-0975 | Unspecified vulnerability in Microsoft Windows 95, Windows 98 and Windows NT The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed. | 4.6 |
1999-12-06 | CVE-1999-0989 | Unspecified vulnerability in Microsoft IE 5/5.0 Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol. | 7.5 |
1999-12-01 | CVE-1999-0819 | Unspecified vulnerability in Microsoft Windows 2000 and Windows NT NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. | 5.0 |
1999-11-30 | CVE-1999-0824 | Unspecified vulnerability in Microsoft Windows NT 4.0 A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users. | 4.6 |
1999-11-17 | CVE-1999-0793 | Unspecified vulnerability in Microsoft Internet Explorer 4.0.1/5.0 Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. | 2.6 |
1999-11-14 | CVE-1999-1110 | Unspecified vulnerability in Microsoft Internet Explorer 5.0 Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client. | 5.0 |
1999-11-12 | CVE-2000-0330 | Unspecified vulnerability in Microsoft Windows 95 and Windows 98 The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via a long file name string, aka the "File Access URL" vulnerability. | 7.6 |