Filtered by vendor Microsoft
Subscribe
Total
19962 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2000-0790 | 1 Microsoft | 3 Windows 2000, Windows 98, Windows 98se | 2024-11-20 | 4.6 MEDIUM | N/A |
The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder. | |||||
CVE-2000-0788 | 1 Microsoft | 2 Access, Word | 2024-11-20 | 10.0 HIGH | N/A |
The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands. | |||||
CVE-2000-0778 | 1 Microsoft | 1 Internet Information Services | 2024-11-20 | 5.0 MEDIUM | N/A |
IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability. | |||||
CVE-2000-0777 | 1 Microsoft | 1 Money | 2024-11-20 | 7.2 HIGH | N/A |
The password protection feature of Microsoft Money can store the password in plaintext, which allows attackers with physical access to the system to obtain the password, aka the "Money Password" vulnerability. | |||||
CVE-2000-0771 | 1 Microsoft | 1 Windows 2000 | 2024-11-20 | 2.1 LOW | N/A |
Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability. | |||||
CVE-2000-0770 | 1 Microsoft | 2 Internet Information Server, Internet Information Services | 2024-11-20 | 6.4 MEDIUM | N/A |
IIS 4.0 and 5.0 does not properly restrict access to certain types of files when their parent folders have less restrictive permissions, which could allow remote attackers to bypass access restrictions to some files, aka the "File Permission Canonicalization" vulnerability. | |||||
CVE-2000-0768 | 1 Microsoft | 2 Ie, Internet Explorer | 2024-11-20 | 2.6 LOW | N/A |
A function in Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a variant of the "Frame Domain Verification" vulnerability. | |||||
CVE-2000-0767 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 2.6 LOW | N/A |
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an attacker to read arbitrary files, aka the "Scriptlet Rendering" vulnerability. | |||||
CVE-2000-0765 | 1 Microsoft | 3 Excel, Powerpoint, Word | 2024-11-20 | 5.1 MEDIUM | N/A |
Buffer overflow in the HTML interpreter in Microsoft Office 2000 allows an attacker to execute arbitrary commands via a long embedded object tag, aka the "Microsoft Office HTML Object Tag" vulnerability. | |||||
CVE-2000-0756 | 1 Microsoft | 1 Outlook | 2024-11-20 | 5.0 MEDIUM | N/A |
Microsoft Outlook 2000 does not properly process long or malformed fields in vCard (.vcf) files, which allows attackers to cause a denial of service. | |||||
CVE-2000-0753 | 1 Microsoft | 1 Outlook | 2024-11-20 | 5.0 MEDIUM | N/A |
The Microsoft Outlook mail client identifies the physical path of the sender's machine within a winmail.dat attachment to Rich Text Format (RTF) files. | |||||
CVE-2000-0746 | 1 Microsoft | 3 Frontpage, Internet Information Server, Internet Information Services | 2024-11-20 | 7.5 HIGH | N/A |
Vulnerabilities in IIS 4.0 and 5.0 do not properly protect against cross-site scripting (CSS) attacks. They allow a malicious web site operator to embed scripts in a link to a trusted site, which are returned without quoting in an error message back to the client. The client then executes those scripts in the same context as the trusted site, aka the "IIS Cross-Site Scripting" vulnerabilities. | |||||
CVE-2000-0742 | 1 Microsoft | 2 Windows 95, Windows 98 | 2024-11-20 | 5.0 MEDIUM | N/A |
The IPX protocol implementation in Microsoft Windows 95 and 98 allows remote attackers to cause a denial of service by sending a ping packet with a source IP address that is a broadcast address, aka the "Malformed IPX Ping Packet" vulnerability. | |||||
CVE-2000-0737 | 1 Microsoft | 1 Windows 2000 | 2024-11-20 | 4.6 MEDIUM | N/A |
The Service Control Manager (SCM) in Windows 2000 creates predictable named pipes, which allows a local user with console access to gain administrator privileges, aka the "Service Control Manager Named Pipe Impersonation" vulnerability. | |||||
CVE-2000-0711 | 2 Microsoft, Netscape | 2 Virtual Machine, Communicator | 2024-11-20 | 7.5 HIGH | N/A |
Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice. | |||||
CVE-2000-0710 | 1 Microsoft | 1 Frontpage | 2024-11-20 | 5.0 MEDIUM | N/A |
The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name. | |||||
CVE-2000-0709 | 1 Microsoft | 1 Frontpage | 2024-11-20 | 5.0 MEDIUM | N/A |
The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name. | |||||
CVE-2000-0673 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | 5.0 MEDIUM | N/A |
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability. | |||||
CVE-2000-0663 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | 4.6 MEDIUM | N/A |
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. | |||||
CVE-2000-0662 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 5.0 MEDIUM | N/A |
Internet Explorer 5.x and Microsoft Outlook allows remote attackers to read arbitrary files by redirecting the contents of an IFRAME using the DHTML Edit Control (DHTMLED). |