Page 14 of 70 results (0.001 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder. • http://www.securityfocus.com/bid/1571 http://www.securityfocus.com/templates/archive.pike?list=1&msg=3998370D.732A03F1%40nat.bg https://exchange.xforce.ibmcloud.com/vulnerabilities/5097 •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. • http://www.kb.cert.org/vuls/id/458659 https://exchange.xforce.ibmcloud.com/vulnerabilities/4280 • CWE-346: Origin Validation Error •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Microsoft Windows 9x operating systems allow an attacker to cause a denial of service via a pathname that includes file device names, aka the "DOS Device in Path Name" vulnerability. • https://www.exploit-db.com/exploits/19799 http://www.securityfocus.com/bid/1043 http://www.securityfocus.com/templates/advisory.html?id=2126 http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCENECCAA.labs%40ussrback.com •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238453 http://www.securityfocus.com/bid/646 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 1

DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes. • https://www.exploit-db.com/exploits/19451 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ216141 http://www.securityfocus.com/bid/578 • CWE-16: Configuration •