Page 2 of 21 results (0.005 seconds)

CVSS: 10.0EPSS: 88%CPEs: 1EXPL: 0

Microsoft Internet Security and Acceleration (ISA) Server 2004 logs unusual ASCII characters in the Host header, including the tab, which allows remote attackers to manipulate portions of the log file and possibly leverage this for other attacks. Microsoft Internet Security y Acceleration (ISA) Server 2004 guarda en ficheros de log caracteres ASCII no usuales en la cabecera Host, lo cual permite a atacantes remotos manipular partes del fichero de log y posiblemente utilizar esto para otros ataques. • http://www.securityfocus.com/archive/1/432947/30/5190/threaded http://www.securityfocus.com/archive/1/433074/30/5190/threaded http://www.securityfocus.com/archive/1/433141/30/5160/threaded http://www.securityfocus.com/archive/1/433350/30/5100/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26233 •

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 0

Microsoft Internet Security and Acceleration (ISA) Server 2004 allows remote attackers to bypass file extension filters via a request with a trailing "#" character. NOTE: as of 20060715, this could not be reproduced by third parties. Microsoft Internet Security and Acceleration (ISA) Server 2004 permite a atacantes remotos evitar los filtros de extensiones de ficheros mediante una petición con un carácter "#" al final. NOTA: desde 20060715, esto no ha podido ser reproducido por terceras partes. • http://securitytracker.com/id?1016506 http://www.securityfocus.com/archive/1/440105/100/0/threaded http://www.securityfocus.com/archive/1/440247/100/0/threaded http://www.securityfocus.com/archive/1/440299/100/0/threaded http://www.securityfocus.com/archive/1/440446/100/0/threaded http://www.securityfocus.com/archive/1/440558/100/0/threaded http://www.securityfocus.com/bid/18994 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Microsoft ISA Server 2004 allows remote attackers to bypass certain filtering rules, including ones for (1) ICMP and (2) TCP, via IPv6 packets. NOTE: An established researcher has disputed this issue, saying that "Neither ISA Server 2004 nor Windows 2003 Basic Firewall support IPv6 filtering ... This is different network protocol. • http://www.securityfocus.com/archive/1/429816/100/0/threaded http://www.securityfocus.com/archive/1/429846/100/0/threaded http://www.securityfocus.com/archive/1/430281/100/0/threaded http://www.securityfocus.com/archive/1/430684/100/0/threaded •

CVSS: 7.5EPSS: 22%CPEs: 1EXPL: 0

Microsoft ISA Server 2000 allows remote attackers to poison the ISA cache or bypass content restriction policies via a malformed HTTP request packet containing multiple Content-Length headers. • http://secunia.com/advisories/15693 http://securitytracker.com/id?1014193 http://www.securityfocus.com/bid/13956 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1145 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Microsoft ISA Server 2000 allows remote attackers to connect to services utilizing the NetBIOS protocol via a NetBIOS connection with an ISA Server that uses the NetBIOS (all) predefined packet filter. • http://secunia.com/advisories/15693 http://securitytracker.com/id?1014193 http://www.kb.cert.org/vuls/id/367077 http://www.securityfocus.com/bid/13954 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A468 •