Filtered by vendor Microsoft
Subscriptions
Total
20184 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0700 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | N/A |
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file. | ||||
CVE-1999-0682 | 1 Microsoft | 1 Exchange Server | 2024-11-20 | N/A |
Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. | ||||
CVE-1999-0681 | 1 Microsoft | 2 Frontpage, Personal Web Server | 2024-11-20 | N/A |
Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL. | ||||
CVE-1999-0680 | 1 Microsoft | 1 Terminal Server | 2024-11-20 | N/A |
Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service. | ||||
CVE-1999-0670 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | N/A |
Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. | ||||
CVE-1999-0669 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | N/A |
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | ||||
CVE-1999-0668 | 1 Microsoft | 1 Internet Explorer | 2024-11-20 | N/A |
The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | ||||
CVE-1999-0612 | 2 Gnu, Microsoft | 4 Finger Service, Fingerd, Windows 2000 and 1 more | 2024-11-20 | N/A |
A version of finger is running that exposes valid user information to any entity on the network. | ||||
CVE-1999-0595 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | N/A |
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded. | ||||
CVE-1999-0593 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. | ||||
CVE-1999-0590 | 3 Apple, Linux, Microsoft | 6 Macos, Linux Kernel, Windows 2000 and 3 more | 2024-11-20 | N/A |
A system does not present an appropriate legal message or warning to a user who is accessing it. | ||||
CVE-1999-0585 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | N/A |
A Windows NT administrator account has the default name of Administrator. | ||||
CVE-1999-0582 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | N/A |
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc. | ||||
CVE-1999-0581 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions. | ||||
CVE-1999-0579 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys. | ||||
CVE-1999-0578 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | ||||
CVE-1999-0577 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories. | ||||
CVE-1999-0576 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories. | ||||
CVE-1999-0575 | 1 Microsoft | 1 Windows Nt | 2024-11-20 | N/A |
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking. | ||||
CVE-1999-0572 | 1 Microsoft | 2 Windows 2000, Windows Nt | 2024-11-20 | N/A |
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. |