Filtered by vendor Microsoft
Subscribe
Total
19962 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-1999-1455 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 7.5 HIGH | N/A |
RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. | |||||
CVE-1999-1453 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 2.6 LOW | N/A |
Internet Explorer 4 allows remote attackers (malicious web site operators) to read the contents of the clipboard via the Internet WebBrowser ActiveX object. | |||||
CVE-1999-1452 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 2.1 LOW | N/A |
GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt. | |||||
CVE-1999-1451 | 1 Microsoft | 2 Internet Information Server, Site Server | 2024-11-20 | 5.0 MEDIUM | N/A |
The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files. | |||||
CVE-1999-1447 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 5.0 MEDIUM | N/A |
Internet Explorer 4.0 allows remote attackers to cause a denial of service (crash) via HTML code that contains a long CLASSID parameter in an OBJECT tag. | |||||
CVE-1999-1446 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 2.1 LOW | N/A |
Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the "Clear History" option, and are not visible when the user browses the folders because of tailored displays. | |||||
CVE-1999-1431 | 1 Microsoft | 1 Zero Administration Kit | 2024-11-20 | 4.6 MEDIUM | N/A |
ZAK in Appstation mode allows users to bypass the "Run only allowed apps" policy by starting Explorer from Office 97 applications (such as Word), installing software into the TEMP directory, and changing the name to that for an allowed application, such as Winword.exe. | |||||
CVE-1999-1397 | 1 Microsoft | 1 Index Server | 2024-11-20 | 7.5 HIGH | N/A |
Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed. | |||||
CVE-1999-1387 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 5.0 MEDIUM | N/A |
Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25. | |||||
CVE-1999-1376 | 1 Microsoft | 1 Internet Information Server | 2024-11-20 | 10.0 HIGH | N/A |
Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. | |||||
CVE-1999-1375 | 1 Microsoft | 1 Internet Information Server | 2024-11-20 | 5.0 MEDIUM | N/A |
FileSystemObject (FSO) in the showfile.asp Active Server Page (ASP) allows remote attackers to read arbitrary files by specifying the name in the file parameter. | |||||
CVE-1999-1370 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 7.2 HIGH | N/A |
The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs. | |||||
CVE-1999-1367 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | 4.6 MEDIUM | N/A |
Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users. | |||||
CVE-1999-1365 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 7.2 HIGH | N/A |
Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default. | |||||
CVE-1999-1364 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 2.1 LOW | N/A |
Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. | |||||
CVE-1999-1363 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 2.1 LOW | N/A |
Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool. | |||||
CVE-1999-1362 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 2.1 LOW | N/A |
Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters. | |||||
CVE-1999-1361 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 6.4 MEDIUM | N/A |
Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages. | |||||
CVE-1999-1360 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 2.1 LOW | N/A |
Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle. | |||||
CVE-1999-1359 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | 7.5 HIGH | N/A |
When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies. |