Vulnerabilities > Microsoft
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-01-01 | CVE-1999-0284 | Classic Buffer Overflow vulnerability in multiple products Denial of service to NT mail servers including Ipswitch, Mdaemon, and Exchange through a buffer overflow in the SMTP HELO command. | 7.5 |
1997-12-23 | CVE-1999-1581 | Unspecified vulnerability in Microsoft Windows NT 4.0 Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded. | 5.0 |
1997-12-16 | CVE-1999-0104 | A later variation on the Teardrop IP denial of service attack, a.k.a. | 5.0 |
1997-12-16 | CVE-1999-0015 | Teardrop IP denial of service. | 5.0 |
1997-12-01 | CVE-1999-0016 | Land IP denial of service. | 5.0 |
1997-11-01 | CVE-1999-0967 | Unspecified vulnerability in Microsoft products Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol. | 10.0 |
1997-10-01 | CVE-1999-0294 | Unspecified vulnerability in Microsoft Wins All records in a WINS database can be deleted through SNMP for a denial of service. | 5.0 |
1997-09-01 | CVE-1999-0191 | Unspecified vulnerability in Microsoft Internet Information Server 3.0 IIS newdsn.exe CGI script allows remote users to overwrite files. | 6.4 |
1997-08-05 | CVE-1999-1446 | Unspecified vulnerability in Microsoft Internet Explorer 3.0 Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the "Clear History" option, and are not visible when the user browses the folders because of tailored displays. | 2.1 |
1997-07-25 | CVE-1999-1217 | Unspecified vulnerability in Microsoft Windows NT The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories. | 4.6 |