Page 13 of 78 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

A misconfiguration in IIS 5.0 with Index Server enabled and the Index property set allows remote attackers to list directories in the web root via a Web Distributed Authoring and Versioning (WebDAV) search. • https://www.exploit-db.com/exploits/20269 http://www.atstake.com/research/advisories/2000/a100400-1.txt http://www.microsoft.com/technet/support/kb.asp?ID=272079 http://www.securityfocus.com/bid/1756 https://exchange.xforce.ibmcloud.com/vulnerabilities/5335 •

CVSS: 7.5EPSS: 96%CPEs: 2EXPL: 1

IIS 5.0 allows remote attackers to execute arbitrary commands via a malformed request for an executable file whose name is appended with operating system commands, aka the "Web Server File Request Parsing" vulnerability. • https://www.exploit-db.com/exploits/20384 http://www.securityfocus.com/bid/1912 http://www.securityfocus.com/templates/archive.pike?mid=143604&list=1&fromthread=0&end=2000-11-11&threads=0&start=2000-11-05& https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-086 https://exchange.xforce.ibmcloud.com/vulnerabilities/5470 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A191 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

IIS 4.0 and 5.0 .ASP pages send the same Session ID cookie for secure and insecure web sessions, which could allow remote attackers to hijack the secure web session of the user if that user moves to an insecure session, aka the "Session ID Cookie Marking" vulnerability. • http://www.acrossecurity.com/aspr/ASPR-2000-07-22-1-PUB.txt http://www.osvdb.org/7265 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-080 https://exchange.xforce.ibmcloud.com/vulnerabilities/5396 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Variant of the "IIS Cross-Site Scripting" vulnerability as originally discussed in MS:MS00-060 (CVE-2000-0746) allows a malicious web site operator to embed scripts in a link to a trusted site, which are returned without quoting in an error message back to the client. The client then executes those scripts in the same context as the trusted site. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-060 •

CVSS: 6.4EPSS: 1%CPEs: 2EXPL: 0

IIS 4.0 and 5.0 does not properly restrict access to certain types of files when their parent folders have less restrictive permissions, which could allow remote attackers to bypass access restrictions to some files, aka the "File Permission Canonicalization" vulnerability. • http://www.securityfocus.com/bid/1565 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-057 •