CVE-2001-0146
https://notcve.org/view.php?id=CVE-2001-0146
IIS 5.0 and Microsoft Exchange 2000 allow remote attackers to cause a denial of service (memory allocation error) by repeatedly sending a series of specially formatted URL's. • http://www.kb.cert.org/vuls/id/796584 http://www.securityfocus.com/bid/2440 http://www.securityfocus.com/bid/2441 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-014 https://exchange.xforce.ibmcloud.com/vulnerabilities/6171 https://exchange.xforce.ibmcloud.com/vulnerabilities/6172 •
CVE-2001-0004
https://notcve.org/view.php?id=CVE-2001-0004
IIS 5.0 and 4.0 allows remote attackers to read the source code for executable web server programs by appending "%3F+.htr" to the requested URL, which causes the files to be parsed by the .HTR ISAPI extension, aka a variant of the "File Fragment Reading via .HTR" vulnerability. • http://marc.info/?l=bugtraq&m=97897954625305&w=2 http://www.securityfocus.com/bid/2313 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/5903 •
CVE-2001-0096
https://notcve.org/view.php?id=CVE-2001-0096
FrontPage Server Extensions (FPSE) in IIS 4.0 and 5.0 allows remote attackers to cause a denial of service via a malformed form, aka the "Malformed Web Form Submission" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-100 https://exchange.xforce.ibmcloud.com/vulnerabilities/5823 •
CVE-2000-1090
https://notcve.org/view.php?id=CVE-2000-1090
Microsoft IIS for Far East editions 4.0 and 5.0 allows remote attackers to read source code for parsed pages via a malformed URL that uses the lead-byte of a double-byte character. • http://www.nsfocus.com/english/homepage/sa_08.htm http://www.securityfocus.com/bid/2100 https://exchange.xforce.ibmcloud.com/vulnerabilities/5729 •
CVE-2000-0886 – Microsoft IIS 4.0/5.0 - Executable File Parsing
https://notcve.org/view.php?id=CVE-2000-0886
IIS 5.0 allows remote attackers to execute arbitrary commands via a malformed request for an executable file whose name is appended with operating system commands, aka the "Web Server File Request Parsing" vulnerability. • https://www.exploit-db.com/exploits/20384 http://www.securityfocus.com/bid/1912 http://www.securityfocus.com/templates/archive.pike?mid=143604&list=1&fromthread=0&end=2000-11-11&threads=0&start=2000-11-05& https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-086 https://exchange.xforce.ibmcloud.com/vulnerabilities/5470 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A191 •