Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 95 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2000-0168
Microsoft Windows 9x operating systems allow an malicious user to cause a denial of service via a pathname that includes file device names, aka the "DOS Device in Path Name" vulnerability.
Microsoft Windows 98se
Microsoft Windows 95
Microsoft Windows 98
1 EDB exploit
505
VMScore
CVE-2000-0073
Buffer overflow in Microsoft Rich Text Format (RTF) reader allows malicious users to cause a denial of service via a malformed control word.
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 98
1 EDB exploit
505
VMScore
CVE-1999-0015
Teardrop IP denial of service.
Hp Hp-ux 10.01
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 9.04
Hp Hp-ux 9.05
Microsoft Windows Nt 4.0
Hp Hp-ux 11.00
Hp Hp-ux 9.00
Microsoft Windows Nt 3.5.1
Netbsd Netbsd 1.2
Netbsd Netbsd 1.2.1
Hp Hp-ux 10
Hp Hp-ux 9.01
Hp Hp-ux 9.03
Sun Sunos 4.1.3u1
Sun Sunos 4.1.4
Hp Hp-ux 10.24
Hp Hp-ux 10.30
Hp Hp-ux 9.07
Microsoft Windows 95 0.0a
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
1 EDB exploit
465
VMScore
CVE-1999-0975
The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.
Microsoft Windows 98
Microsoft Windows 95
Microsoft Windows Nt 4.0
1 EDB exploit
454
VMScore
CVE-1999-1128
Internet Explorer 3.01 on Windows 95 allows remote malicious web sites to execute arbitrary commands via a .isp file, which is automatically downloaded and executed without prompting the user.
Microsoft Internet Explorer 3.0.1
445
VMScore
CVE-2002-1325
Microsoft Virtual Machine (VM) build 5.0.3805 and previous versions allows remote malicious users to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability."
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 2000
Microsoft Windows Me
Microsoft Windows 95
Microsoft Windows Xp
445
VMScore
CVE-2002-1258
Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote malicious users to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibl...
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows 95
Microsoft Windows Xp
Microsoft Windows 98
Microsoft Windows 98se
445
VMScore
CVE-2000-1039
Various TCP/IP stacks and network applications allow remote malicious users to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA&...
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Nt 4.0
1 Github repository
445
VMScore
CVE-2000-0980
NMPI (Name Management Protocol on IPX) listener in Microsoft NWLink does not properly filter packets from a broadcast address, which allows remote malicious users to cause a broadcast storm and flood the network.
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 95
Microsoft Windows Me
445
VMScore
CVE-2000-0742
The IPX protocol implementation in Microsoft Windows 95 and 98 allows remote malicious users to cause a denial of service by sending a ping packet with a source IP address that is a broadcast address, aka the "Malformed IPX Ping Packet" vulnerability.
Microsoft Windows 98
Microsoft Windows 95
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »