Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 19372 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-1999-0777 1 Microsoft 2 Commercial Internet System, Internet Information Server 2024-02-04 7.5 HIGH N/A
IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions.
CVE-1999-1104 1 Microsoft 1 Windows 95 2024-02-04 4.6 MEDIUM N/A
Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords.
CVE-2000-0673 1 Microsoft 2 Windows 2000, Windows Nt 2024-02-04 5.0 MEDIUM N/A
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
CVE-1999-0253 1 Microsoft 2 Internet Information Server, Internet Information Services 2024-02-04 7.5 HIGH N/A
IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL.
CVE-2003-0809 1 Microsoft 2 Ie, Internet Explorer 2024-02-04 7.5 HIGH N/A
Internet Explorer 5.01 through 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote attackers to execute arbitrary code via an HTML e-mail message or web page.
CVE-1999-0886 1 Microsoft 1 Windows Nt 2024-02-04 9.0 HIGH N/A
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
CVE-2000-1003 1 Microsoft 3 Windows 95, Windows 98, Windows 98se 2024-02-04 2.6 LOW N/A
NETBIOS client in Windows 95 and Windows 98 allows a remote attacker to cause a denial of service by changing a file sharing service to return an unknown driver type, which causes the client to crash.
CVE-2000-1088 1 Microsoft 2 Data Engine, Sql Server 2024-02-04 4.6 MEDIUM N/A
The xp_SetSQLSecurity function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
CVE-1999-1157 1 Microsoft 1 Windows Nt 2024-02-04 5.0 MEDIUM N/A
Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
CVE-2000-1086 1 Microsoft 2 Data Engine, Sql Server 2024-02-04 4.6 MEDIUM N/A
The xp_printstatements function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
CVE-2000-0126 1 Microsoft 1 Internet Information Server 2024-02-04 5.0 MEDIUM N/A
Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.
CVE-2000-1113 1 Microsoft 1 Windows Media Player 2024-02-04 7.5 HIGH N/A
Buffer overflow in Microsoft Windows Media Player allows remote attackers to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.
CVE-2003-0344 1 Microsoft 2 Ie, Internet Explorer 2024-02-04 7.5 HIGH N/A
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
CVE-2000-1079 1 Microsoft 4 Windows 2000, Windows 95, Windows 98 and 1 more 2024-02-04 7.5 HIGH N/A
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
CVE-2002-1716 1 Microsoft 1 Office 2024-02-04 5.0 MEDIUM N/A
The Host() function in the Microsoft spreadsheet component on Microsoft Office XP allows remote attackers to create arbitrary files using the SaveAs capability.
CVE-2000-0503 1 Microsoft 1 Internet Explorer 2024-02-04 2.6 LOW N/A
The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote attacker to violate the cross frame security policy via the NavigateComplete2 event.
CVE-2002-1141 1 Microsoft 1 Services 2024-02-04 5.0 MEDIUM N/A
An input validation error in the Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service via malformed fragmented RPC client packets, aka "Denial of service by sending an invalid RPC request."
CVE-1999-1087 1 Microsoft 1 Internet Explorer 2024-02-04 7.5 HIGH N/A
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.
CVE-2002-0698 1 Microsoft 1 Exchange Server 2024-02-04 7.5 HIGH N/A
Buffer overflow in Internet Mail Connector (IMC) for Microsoft Exchange Server 5.5 allows remote attackers to execute arbitrary code via an EHLO request from a system with a long name as obtained through a reverse DNS lookup, which triggers the overflow in IMC's hello response.
CVE-2004-1306 1 Microsoft 4 Windows 2000, Windows 2003 Server, Windows Nt and 1 more 2024-02-04 5.1 MEDIUM N/A
Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.