Vulnerabilities > Microsoft > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2000-06-27 | CVE-2000-0596 | Unspecified vulnerability in Microsoft Internet Explorer 4.0.1/5 Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote attackers to execute arbitrary commands, aka the "IE Script" vulnerability. | 7.5 |
2000-05-19 | CVE-2000-0305 | Resource Management Errors vulnerability in multiple products Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. | 7.8 |
2000-05-17 | CVE-2000-0464 | Unspecified vulnerability in Microsoft Internet Explorer Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability. | 7.6 |
2000-05-13 | CVE-2000-0400 | Improper Input Validation vulnerability in Microsoft Internet Explorer 5 The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post. | 7.5 |
2000-05-11 | CVE-2000-0457 | Unspecified vulnerability in Microsoft products ISM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the ".HTR File Fragment Reading" or "File Fragment Reading via .HTR" vulnerability. | 7.5 |
2000-05-11 | CVE-2000-0420 | Unspecified vulnerability in Microsoft Windows 2000 The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data. | 7.2 |
2000-05-11 | CVE-2000-0419 | Unspecified vulnerability in Microsoft products The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability. | 7.5 |
2000-04-19 | CVE-2000-0256 | Buffer Overflow vulnerability in Microsoft Frontpage, Personal web Server and Windows NT Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability. | 7.5 |
2000-04-14 | CVE-2000-1218 | Unspecified vulnerability in Microsoft products The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. | 7.5 |
2000-04-14 | CVE-2000-0260 | Unspecified vulnerability in Microsoft Frontpage and Visual Interdev Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link View Server-Side Component" vulnerability. | 7.5 |