Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 19306 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-0231 1 Microsoft 2 Data Engine, Sql Server 2024-02-04 5.0 MEDIUM N/A
Microsoft SQL Server 7, 2000, and MSDE allows local or remote authenticated users to cause a denial of service (crash or hang) via a long request to a named pipe.
CVE-2003-0664 1 Microsoft 2 Word, Works 2024-02-04 7.5 HIGH N/A
Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
CVE-2003-0114 1 Microsoft 2 Ie, Internet Explorer 2024-02-04 5.0 MEDIUM N/A
The file upload control in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to automatically upload files from the local system via a web page containing a script to upload the files.
CVE-2004-0502 1 Microsoft 1 Outlook 2024-02-04 5.0 MEDIUM N/A
Outlook 2003, when replying to an e-mail message, stores certain files in a predictable location for the "src" of an img tag of the original message, which allows remote attackers to bypass zone restrictions and exploit other issues that rely on predictable locations, as demonstrated using a shell: URI.
CVE-2001-0348 1 Microsoft 1 Windows 2000 2024-02-04 5.0 MEDIUM N/A
Microsoft Windows 2000 telnet service allows attackers to cause a denial of service (crash) via a long logon command that contains a backspace.
CVE-2003-0666 1 Microsoft 1 Wordperfect Converter 2024-02-04 7.5 HIGH N/A
Buffer overflow in Microsoft Wordperfect Converter allows remote attackers to execute arbitrary code via modified data offset and data size parameters in a Corel WordPerfect file.
CVE-1999-0372 1 Microsoft 3 Backoffice, Windows 2000, Windows Nt 2024-02-04 2.1 LOW N/A
The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.
CVE-2000-0580 1 Microsoft 1 Windows 2000 2024-02-04 5.0 MEDIUM N/A
Windows 2000 Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros to various TCP and UDP ports, which significantly increases the CPU utilization.
CVE-2000-0211 1 Microsoft 1 Windows Media Services 2024-02-04 5.0 MEDIUM N/A
The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the "Misordered Windows Media Services Handshake" vulnerability.
CVE-1999-0280 1 Microsoft 1 Internet Explorer 2024-02-04 7.5 HIGH N/A
Remote command execution in Microsoft Internet Explorer using .lnk and .url files.
CVE-2002-0020 1 Microsoft 2 Interix, Windows 2000 2024-02-04 7.5 HIGH N/A
Buffer overflow in telnet server in Windows 2000 and Interix 2.2 allows remote attackers to execute arbitrary code via malformed protocol options.
CVE-2002-0136 1 Microsoft 1 Internet Explorer 2024-02-04 5.0 MEDIUM N/A
Microsoft Internet Explorer 5.5 on Windows 98 allows remote web pages to cause a denial of service (hang) via extremely long values for form fields such as INPUT and TEXTAREA, which can be automatically filled via Javascript.
CVE-1999-0593 1 Microsoft 1 Windows Nt 2024-02-04 4.9 MEDIUM N/A
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
CVE-2000-1039 1 Microsoft 5 Windows 95, Windows 98, Windows 98se and 2 more 2024-02-04 5.0 MEDIUM N/A
Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.
CVE-1999-0824 1 Microsoft 1 Windows Nt 2024-02-04 4.6 MEDIUM N/A
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
CVE-2001-1243 1 Microsoft 2 Internet Information Server, Internet Information Services 2024-02-04 5.0 MEDIUM N/A
Scripting.FileSystemObject in asp.dll for Microsoft IIS 4.0 and 5.0 allows local or remote attackers to cause a denial of service (crash) via (1) creating an ASP program that uses Scripting.FileSystemObject to open a file with an MS-DOS device name, or (2) remotely injecting the device name into ASP programs that internally use Scripting.FileSystemObject.
CVE-2001-1518 1 Microsoft 1 Windows 2000 2024-02-04 2.1 LOW N/A
RunAs (runas.exe) in Windows 2000 only creates one session instance at a time, which allows local users to cause a denial of service (RunAs hang) by creating a named pipe session with the authentication server without any request for service. NOTE: the vendor disputes this vulnerability, however the vendor also presents a scenario in which other users could be affected if running on a Terminal Server. Therefore this is a vulnerability.
CVE-2000-0756 1 Microsoft 1 Outlook 2024-02-04 5.0 MEDIUM N/A
Microsoft Outlook 2000 does not properly process long or malformed fields in vCard (.vcf) files, which allows attackers to cause a denial of service.
CVE-2002-0054 1 Microsoft 2 Exchange Server, Windows 2000 2024-02-04 7.5 HIGH N/A
SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials.
CVE-2003-1437 6 Bea, Hp, Ibm and 3 more 8 Weblogic Server, Hp-ux, Aix and 5 more 2024-02-04 2.1 LOW N/A
BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access.