Page 18 of 92 results (0.003 seconds)

CVSS: 5.0EPSS: 92%CPEs: 3EXPL: 0

IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions. • http://marc.info/?l=bugtraq&m=94770020309953&w=2 http://marc.info/?l=bugtraq&m=94780058006791&w=2 •

CVSS: 5.0EPSS: 90%CPEs: 2EXPL: 1

IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL. • https://www.exploit-db.com/exploits/20481 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0154 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension. • https://www.exploit-db.com/exploits/19376 http://www.securityfocus.com/bid/501 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). • https://www.exploit-db.com/exploits/19152 http://www.securityfocus.com/bid/194 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

Denial of service in IIS using long URLs. • https://www.exploit-db.com/exploits/20802 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0281 •