Vulnerabilities > Microsoft

DATE CVE VULNERABILITY TITLE RISK
1999-05-06 CVE-1999-1241 Unspecified vulnerability in Microsoft Internet Explorer 6.0.2900
Internet Explorer, with a security setting below Medium, allows remote attackers to execute arbitrary commands via a malicious web page that uses the FileSystemObject ActiveX object.
network
low complexity
microsoft
critical
10.0
1999-05-04 CVE-1999-1097 Unspecified vulnerability in Microsoft Netmeeting 2.1
Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty.
network
low complexity
microsoft
6.4
1999-05-01 CVE-1999-0487 Unspecified vulnerability in Microsoft Internet Explorer 4.0/5.0
The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.
network
high complexity
microsoft
2.6
1999-04-21 CVE-1999-0490 Unspecified vulnerability in Microsoft Internet Explorer 4.0/5.0
MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to learn information about a local user's files via an IMG SRC tag.
network
low complexity
microsoft
7.5
1999-04-21 CVE-1999-0488 Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1/5.0
Internet Explorer 4.0 and 5.0 allows a remote attacker to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability.
network
low complexity
microsoft
7.5
1999-04-12 CVE-1999-0444 Unspecified vulnerability in Microsoft Windows 95, Windows 98 and Windows NT
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
network
low complexity
microsoft
5.0
1999-04-09 CVE-1999-0468 Unspecified vulnerability in Microsoft Internet Explorer 5.0
Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.
network
high complexity
microsoft
2.6
1999-04-01 CVE-1999-0469 Unspecified vulnerability in Microsoft Internet Explorer 5.0
Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.
network
low complexity
microsoft
5.0
1999-03-23 CVE-1999-1397 Remote Registry vulnerability in Microsoft Index Server 2.0
Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed.
network
low complexity
microsoft
7.5
1999-03-23 CVE-1999-1370 Unspecified vulnerability in Microsoft Internet Explorer 5.0
The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs.
local
low complexity
microsoft
7.2