Vulnerabilities > Microsoft > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-04-21 | CVE-1999-0488 | Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1/5.0 Internet Explorer 4.0 and 5.0 allows a remote attacker to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability. | 7.5 |
1999-03-23 | CVE-1999-1397 | Remote Registry vulnerability in Microsoft Index Server 2.0 Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed. | 7.5 |
1999-03-23 | CVE-1999-1370 | Unspecified vulnerability in Microsoft Internet Explorer 5.0 The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs. | 7.2 |
1999-03-12 | CVE-1999-0382 | Unspecified vulnerability in Microsoft Windows NT 3.5.1/4.0 The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges. | 7.2 |
1999-02-22 | CVE-1999-0379 | Unspecified vulnerability in Microsoft Backoffice Resource KIT 2.0 Microsoft Taskpads allows remote web sites to execute commands on the visiting user's machine via certain methods that are marked as Safe for Scripting. | 7.5 |
1999-02-19 | CVE-1999-0412 | Unspecified vulnerability in Microsoft products In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension. | 7.5 |
1999-01-30 | CVE-1999-0360 | Unspecified vulnerability in Microsoft Site Server 2.0 MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely. | 7.2 |
1999-01-26 | CVE-1999-0450 | Unspecified vulnerability in Microsoft products In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). | 7.5 |
1999-01-26 | CVE-1999-0449 | Unspecified vulnerability in Microsoft Internet Information Server 4.0 The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. | 7.8 |
1999-01-05 | CVE-1999-0391 | Unspecified vulnerability in Microsoft Terminal Server, Windows 2000 and Windows NT The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user. | 7.5 |