Vulnerabilities > Microsoft
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-12-31 | CVE-1999-1148 | Unspecified vulnerability in Microsoft Internet Information Server FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time. | 5.0 |
1999-12-31 | CVE-1999-1132 | Unspecified vulnerability in Microsoft Windows NT 4.0 Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs. | 5.0 |
1999-12-31 | CVE-1999-1127 | Missing Release of Resource after Effective Lifetime vulnerability in Microsoft Windows NT 4.0 Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability. | 7.5 |
1999-12-31 | CVE-1999-1105 | Unspecified vulnerability in Microsoft Windows 95 Windows 95, when Remote Administration and File Sharing for NetWare Networks is enabled, creates a share (C$) when an administrator logs in remotely, which allows remote attackers to read arbitrary files by mapping the network drive. | 5.0 |
1999-12-31 | CVE-1999-1104 | Unspecified vulnerability in Microsoft Windows 95 Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords. | 4.6 |
1999-12-31 | CVE-1999-1094 | Unspecified vulnerability in Microsoft Internet Explorer Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue." | 7.5 |
1999-12-31 | CVE-1999-1093 | Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1 Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page. | 5.1 |
1999-12-31 | CVE-1999-1087 | Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1 Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server. | 7.5 |
1999-12-31 | CVE-1999-1084 | Unspecified vulnerability in Microsoft Windows NT 4.0 The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. | 4.6 |
1999-12-31 | CVE-1999-1055 | Unspecified vulnerability in Microsoft Excel 97 Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel "CALL Vulnerability." | 7.5 |