cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-1999-1593,https://securityvulnerability.io/vulnerability/CVE-1999-1593,,"Windows Internet Naming Service (WINS) allows remote attackers to cause a denial of service (connectivity loss) or steal credentials via a 1Ch registration that causes WINS to change the domain controller to point to a malicious server. NOTE: this problem may be limited when Windows 95/98 clients are used, or if the primary domain controller becomes unavailable.",Microsoft,"Windows 2000,Windows 95,Windows 98",,,0.028960000723600388,false,false,false,false,,false,false,2009-01-15T01:30:00.000Z,0 CVE-2006-1313,https://securityvulnerability.io/vulnerability/CVE-2006-1313,,"Microsoft JScript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and 5.6 on Windows XP, Server 2003, Windows 98 and Windows Me, will ""release objects early"" in certain cases, which results in memory corruption and allows remote attackers to execute arbitrary code.",Microsoft,"Windows 2003 Server,Windows Xp,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.9253600239753723,false,false,false,false,,false,false,2006-06-13T19:00:00.000Z,0 CVE-2006-2376,https://securityvulnerability.io/vulnerability/CVE-2006-2376,,Integer overflow in the PolyPolygon function in Graphics Rendering Engine on Microsoft Windows 98 and Me allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) or EMF image with a sum of entries in the vertext counts array and number of polygons that triggers a heap-based buffer overflow.,Microsoft,"Windows 98se,Windows Me,Windows 98",,,0.5831400156021118,false,false,false,false,,false,false,2006-06-13T18:00:00.000Z,0 CVE-2006-0012,https://securityvulnerability.io/vulnerability/CVE-2006-0012,,"Unspecified vulnerability in Windows Explorer in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via attack vectors involving COM objects and ""crafted files and directories,"" aka the ""Windows Shell Vulnerability.""",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.7500799894332886,false,false,false,false,,false,false,2006-04-12T00:00:00.000Z,0 CVE-2006-0010,https://securityvulnerability.io/vulnerability/CVE-2006-0010,,"Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.8386200070381165,false,false,false,false,,false,false,2006-01-10T22:00:00.000Z,0 CVE-2006-0020,https://securityvulnerability.io/vulnerability/CVE-2006-0020,,"An unspecified Microsoft WMF parsing application, as used in Internet Explorer 5.01 SP4 on Windows 2000 SP4, and 5.5 SP2 on Windows Millennium, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute code via a crafted WMF file with a manipulated WMF header size, possibly involving an integer overflow, a different vulnerability than CVE-2005-4560, and aka ""WMF Image Parsing Memory Corruption Vulnerability.""",Microsoft,"Windows 98se,Windows Xp,Windows 2003 Server,Windows Me,Windows 2000,Windows 98",,,0.14955000579357147,false,false,false,false,,false,false,2006-01-10T21:00:00.000Z,0 CVE-2006-0143,https://securityvulnerability.io/vulnerability/CVE-2006-0143,,Microsoft Windows Graphics Rendering Engine (GRE) allows remote attackers to corrupt memory and cause a denial of service (crash) via a WMF file containing (1) ExtCreateRegion or (2) ExtEscape function calls with arguments with inconsistent lengths.,Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.9005600214004517,false,false,false,false,,false,false,2006-01-09T20:00:00.000Z,0 CVE-2005-0058,https://securityvulnerability.io/vulnerability/CVE-2005-0058,,"Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to elevate privileges or execute arbitrary code via a crafted message.",Microsoft,"Windows 2000,Windows 98se,Windows 2003 Server,Windows Me,Windows 98,Windows Xp",,,0.06094999983906746,false,false,false,false,,false,false,2005-08-10T04:00:00.000Z,0 CVE-2005-2388,https://securityvulnerability.io/vulnerability/CVE-2005-2388,,"Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows attackers to execute arbitrary code.",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98,Windows 95",,,0.0017500000540167093,false,false,false,false,,false,false,2005-07-27T04:00:00.000Z,0 CVE-2005-1208,https://securityvulnerability.io/vulnerability/CVE-2005-1208,,"Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a ""ms-its:"" URL in Internet Explorer.",Microsoft,"Windows 2003 Server,Windows Xp,Windows 2000,Windows 98",,,0.5703399777412415,false,false,false,false,,false,false,2005-06-14T04:00:00.000Z,0 CVE-2005-1212,https://securityvulnerability.io/vulnerability/CVE-2005-1212,,"Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.",Microsoft,"Windows 2003 Server,Windows 2000 Terminal Services,Windows Xp,Windows 2000,Windows Me,Windows 98se,Windows 98",,,0.09691999852657318,false,false,false,false,,false,false,2005-06-14T04:00:00.000Z,0 CVE-2005-1214,https://securityvulnerability.io/vulnerability/CVE-2005-1214,,Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.,Microsoft,"Windows 2003 Server,Windows 2000 Terminal Services,Windows Xp,Windows 2000,Windows Me,Windows 98se,Windows 98",,,0.7012699842453003,false,false,false,false,,false,false,2005-06-14T04:00:00.000Z,0 CVE-2005-0063,https://securityvulnerability.io/vulnerability/CVE-2005-0063,,"The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.9254999756813049,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-0059,https://securityvulnerability.io/vulnerability/CVE-2005-0059,,Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.,Microsoft,"Windows Xp,Windows 2000,Windows 98se,Windows 98",,,0.9676700234413147,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-0057,https://securityvulnerability.io/vulnerability/CVE-2005-0057,,"The Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an ""unchecked buffer"" in the library, possibly due to a buffer overflow.",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.783490002155304,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-0061,https://securityvulnerability.io/vulnerability/CVE-2005-0061,,"The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.0004400000034365803,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-0060,https://securityvulnerability.io/vulnerability/CVE-2005-0060,,"Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.00046999999904073775,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-1191,https://securityvulnerability.io/vulnerability/CVE-2005-1191,,"The Web View DLL (webvw.dll), as used in Windows Explorer on Windows 2000 systems, does not properly filter an apostrophe (""'"") in the author name in a document, which allows attackers to execute arbitrary script via extra attributes when Web View constructs a mailto: link for the preview pane when the user selects the file.",Microsoft,"Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.030220000073313713,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2005-0416,https://securityvulnerability.io/vulnerability/CVE-2005-0416,,"The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote attackers to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based buffer overflow.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.7343299984931946,false,false,false,false,,false,false,2005-04-27T04:00:00.000Z,0 CVE-2004-0790,https://securityvulnerability.io/vulnerability/CVE-2004-0790,,"Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the ""blind connection-reset attack."" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.",Microsoft,"Windows Xp,Sunos,Windows 98se,Solaris,Windows 2003 Server,Windows Me,Windows 2000,Windows 98",,,0.9623299837112427,false,false,false,false,,false,false,2005-04-12T04:00:00.000Z,0 CVE-2004-0901,https://securityvulnerability.io/vulnerability/CVE-2004-0901,,"Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka ""Font Conversion Vulnerability,"" a different vulnerability than CVE-2004-0571.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.5161299705505371,false,false,false,false,,false,false,2005-01-10T05:00:00.000Z,0 CVE-2004-0571,https://securityvulnerability.io/vulnerability/CVE-2004-0571,,"Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka ""Table Conversion Vulnerability,"" a different vulnerability than CVE-2004-0901.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.1545799970626831,false,false,false,false,,false,false,2005-01-10T05:00:00.000Z,0 CVE-2004-1305,https://securityvulnerability.io/vulnerability/CVE-2004-1305,,"The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Symposium Tapi Service Provider,Symposium Express Call Center,Media Processing Server,Windows 2000,Symposium Network Control Center,Windows 98se,Symposium Web Client,Symposium Call Center Server,Ip Softphone 2050,Windows Me,Media Communication Server 5100,Periphonics,Symposium Web Centre Portal,Windows 98,Media Communication Server 5200,Symposium Agent",,,0.32304999232292175,false,false,false,false,,false,false,2004-12-23T05:00:00.000Z,0 CVE-2004-1319,https://securityvulnerability.io/vulnerability/CVE-2004-1319,,"The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by ""AbusiveParent"" in Internet Explorer 6.0.2900.2180.",Microsoft,"Windows Xp,Optivity Telephony Manager,Windows 2003 Server,Windows 2000,Windows 98se,Ip Softphone 2050,Windows Me,Windows 98,Mobile Voice Client 2050",,,0.0712599977850914,false,false,false,false,,false,false,2004-12-15T05:00:00.000Z,0 CVE-2004-0206,https://securityvulnerability.io/vulnerability/CVE-2004-0206,,"Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an ""unchecked buffer,"" possibly a buffer overflow.",Microsoft,"Windows Nt,Windows 2000,Windows 2003 Server,Windows 98,Windows Xp",,,0.596750020980835,false,false,false,false,,false,false,2004-11-03T05:00:00.000Z,0