Vulnerabilities > Microsoft

DATE CVE VULNERABILITY TITLE RISK
2000-05-17 CVE-2000-0465 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files via the frame, aka the "Frame Domain Verification" vulnerability.
network
high complexity
microsoft
5.1
2000-05-17 CVE-2000-0464 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
network
high complexity
microsoft
7.6
2000-05-13 CVE-2000-0400 Improper Input Validation vulnerability in Microsoft Internet Explorer 5
The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post.
network
low complexity
microsoft CWE-20
7.5
2000-05-12 CVE-2000-0415 Unspecified vulnerability in Microsoft Outlook and Outlook Express
Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name.
network
low complexity
microsoft
5.0
2000-05-11 CVE-2000-0457 Unspecified vulnerability in Microsoft products
ISM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the ".HTR File Fragment Reading" or "File Fragment Reading via .HTR" vulnerability.
network
low complexity
microsoft
7.5
2000-05-11 CVE-2000-0420 Unspecified vulnerability in Microsoft Windows 2000
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
local
low complexity
microsoft
7.2
2000-05-11 CVE-2000-0419 Unspecified vulnerability in Microsoft products
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
network
low complexity
microsoft
7.5
2000-05-11 CVE-2000-0408 Unspecified vulnerability in Microsoft products
IIS 4.05 and 5.0 allow remote attackers to cause a denial of service via a long, complex URL that appears to contain a large number of file extensions, aka the "Malformed Extension Data in URL" vulnerability.
network
low complexity
microsoft
5.0
2000-05-10 CVE-2000-0304 Unspecified vulnerability in Microsoft products
Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the "Undelimited .HTR Request" vulnerability.
network
low complexity
microsoft
5.0
2000-05-06 CVE-2000-0413 Path Disclosure vulnerability in Microsoft products
The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path.
network
low complexity
microsoft
5.0