Page 9 of 102 results (0.005 seconds)

CVSS: 7.3EPSS: 1%CPEs: 3EXPL: 0

20 Oct 2000 — The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder. • http://www.securityfocus.com/bid/1571 •

CVSS: 7.5EPSS: 11%CPEs: 4EXPL: 0

29 Aug 2000 — Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0116.html •

CVSS: 7.5EPSS: 15%CPEs: 2EXPL: 0

29 Jun 2000 — Windows 95 and Windows 98 do not properly process spoofed ARP packets, which allows remote attackers to overwrite static entries in the cache table. • http://www.securityfocus.com/bid/1406 •

CVSS: 7.5EPSS: 13%CPEs: 5EXPL: 0

25 May 2000 — The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=262694 •

CVSS: 7.8EPSS: 36%CPEs: 6EXPL: 1

19 May 2000 — Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. • https://www.exploit-db.com/exploits/214 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 39%CPEs: 2EXPL: 1

02 May 2000 — Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name. • https://www.exploit-db.com/exploits/19889 •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 0

14 Apr 2000 — The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. • http://www.kb.cert.org/vuls/id/458659 • CWE-346: Origin Validation Error •

CVSS: 7.5EPSS: 16%CPEs: 3EXPL: 1

04 Mar 2000 — Microsoft Windows 9x operating systems allow an attacker to cause a denial of service via a pathname that includes file device names, aka the "DOS Device in Path Name" vulnerability. • https://www.exploit-db.com/exploits/19799 •

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 2

18 Feb 2000 — Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive. • https://www.exploit-db.com/exploits/19754 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 10%CPEs: 11EXPL: 0

04 Feb 2000 — A system does not present an appropriate legal message or warning to a user who is accessing it. • http://ciac.llnl.gov/ciac/bulletins/j-043.shtml •