Page 13 of 73 results (0.008 seconds)

CVSS: 6.4EPSS: 1%CPEs: 2EXPL: 0

IIS 4.0 and 5.0 does not properly restrict access to certain types of files when their parent folders have less restrictive permissions, which could allow remote attackers to bypass access restrictions to some files, aka the "File Permission Canonicalization" vulnerability. • http://www.securityfocus.com/bid/1565 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-057 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Vulnerabilities in IIS 4.0 and 5.0 do not properly protect against cross-site scripting (CSS) attacks. They allow a malicious web site operator to embed scripts in a link to a trusted site, which are returned without quoting in an error message back to the client. The client then executes those scripts in the same context as the trusted site, aka the "IIS Cross-Site Scripting" vulnerabilities. • http://www.securityfocus.com/bid/1594 http://www.securityfocus.com/bid/1595 http://www.securityfocus.com/templates/archive.pike?list=1&msg=39A12BD6.E811BF4F%40nat.bg https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-060 •

CVSS: 5.0EPSS: 77%CPEs: 2EXPL: 1

IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability. • https://www.exploit-db.com/exploits/20089 http://www.securityfocus.com/bid/1488 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/5104 •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

An administrative script from IIS 3.0, later included in IIS 4.0 and 5.0, allows remote attackers to cause a denial of service by accessing the script without a particular argument, aka the "Absent Directory Browser Argument" vulnerability. • http://marc.info/?l=bugtraq&m=96390444022878&w=2 http://www.securityfocus.com/bid/1476 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/4951 •

CVSS: 2.6EPSS: 0%CPEs: 4EXPL: 5

IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined. Collect any leaked internal IPs by requesting commonly redirected locations from IIS. CVE-2000-0649 references IIS 5.1 (win2k, XP) and older. However, in newer servers such as IIS 7+, this occurs when the alternateHostName is not set or misconfigured. Also collects internal IPs leaked from the PROPFIND method in certain IIS versions. • https://www.exploit-db.com/exploits/20096 https://github.com/rafaelh/CVE-2000-0649 https://github.com/Downgraderz/PoC-CVE-2000-0649 http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0025.html http://www.securityfocus.com/bid/1499 https://support.microsoft.com/en-us/help/218180/internet-information-server-returns-ip-address-in-http-header-content https://support.microsoft.com/en-us/topic/fix-the-internal-ip-address-of-an-iis-7-0-server-is-revealed-if-an-http-request-that-does& • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •