Page 14 of 91 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241407 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242559 http://www.securityfocus.com/bid/658 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 1

When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page". • https://www.exploit-db.com/exploits/19361 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233335 http://www.securityfocus.com/bid/477 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-022 https://exchange.xforce.ibmcloud.com/vulnerabilities/2302 • CWE-16: Configuration •

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ244613 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-053 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers. • https://www.exploit-db.com/exploits/19457 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238349 http://www.ciac.org/ciac/bulletins/j-058.shtml http://www.securityfocus.com/bid/579 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 68%CPEs: 7EXPL: 2

The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/19425 https://www.exploit-db.com/exploits/19424 http://www.ciac.org/ciac/bulletins/j-054.shtml http://www.osvdb.org/272 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-004 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-025 https://www.securityfocus.com/bid/529 - • CWE-264: Permissions, Privileges, and Access Controls •