Page 14 of 78 results (0.003 seconds)

CVSS: 5.0EPSS: 96%CPEs: 1EXPL: 2

IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability. • https://www.exploit-db.com/exploits/20151 https://www.exploit-db.com/exploits/20152 http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=5212 http://www.securityfocus.com/bid/1578 http://www.securityfocus.com/templates/archive.pike?list=1&msg=080D5336D882D211B56B0060080F2CD696A7C9%40beta.mia.cz https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-058 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A927 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Vulnerabilities in IIS 4.0 and 5.0 do not properly protect against cross-site scripting (CSS) attacks. They allow a malicious web site operator to embed scripts in a link to a trusted site, which are returned without quoting in an error message back to the client. The client then executes those scripts in the same context as the trusted site, aka the "IIS Cross-Site Scripting" vulnerabilities. • http://www.securityfocus.com/bid/1594 http://www.securityfocus.com/bid/1595 http://www.securityfocus.com/templates/archive.pike?list=1&msg=39A12BD6.E811BF4F%40nat.bg https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-060 •

CVSS: 5.0EPSS: 77%CPEs: 2EXPL: 1

IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability. • https://www.exploit-db.com/exploits/20089 http://www.securityfocus.com/bid/1488 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/5104 •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

An administrative script from IIS 3.0, later included in IIS 4.0 and 5.0, allows remote attackers to cause a denial of service by accessing the script without a particular argument, aka the "Absent Directory Browser Argument" vulnerability. • http://marc.info/?l=bugtraq&m=96390444022878&w=2 http://www.securityfocus.com/bid/1476 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-044 https://exchange.xforce.ibmcloud.com/vulnerabilities/4951 •

CVSS: 2.6EPSS: 0%CPEs: 4EXPL: 5

IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined. Collect any leaked internal IPs by requesting commonly redirected locations from IIS. CVE-2000-0649 references IIS 5.1 (win2k, XP) and older. However, in newer servers such as IIS 7+, this occurs when the alternateHostName is not set or misconfigured. Also collects internal IPs leaked from the PROPFIND method in certain IIS versions. • https://www.exploit-db.com/exploits/20096 https://github.com/rafaelh/CVE-2000-0649 https://github.com/Downgraderz/PoC-CVE-2000-0649 http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0025.html http://www.securityfocus.com/bid/1499 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •