Page 3 of 46 results (0.007 seconds)

CVSS: 6.8EPSS: 2%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the administrative web pages for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allow remote attackers to execute HTML script as other users through (1) a certain ASP file in the IISHELP virtual directory, or (2) possibly other unknown attack vectors. Múltiples vulnerabilidades de scripting en sitios cruzados (XSS) en las páginas web de administració de Microsoft Internet Information Server (IIS) 4.0 a 5.1 permite a atacantes remotos ejecutar código HTML como otros usuarios. • http://marc.info/?l=bugtraq&m=103651224215736&w=2 http://www.ciac.org/ciac/bulletins/n-011.shtml http://www.iss.net/security_center/static/10501.php http://www.lac.co.jp/security/intelligence/SNSAdvisory/58.html http://www.securityfocus.com/bid/6068 http://www.securityfocus.com/bid/6072 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-062 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A942 https://oval.cise •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

Unknown vulnerability in the hosting process (dllhost.exe) for Microsoft Internet Information Server (IIS) 4.0 through 5.1 allows remote attackers to gain privileges by executing an out of process application that acquires LocalSystem privileges, aka "Out of Process Privilege Elevation." Vulnerabilidad desconocida en el proceso de anfitrión (dllhost.exe) en Microsoft Internet Information Server (IIS) 4.0 a 5.1 permite a atacantes remotos ganar privilegios ejecutando una aplicación fuera de proceso que adquiere privilegios de LocalSystem, también conocida como "Elevación de Privilegios Fuera de Proceso". • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0059.html http://marc.info/?l=bugtraq&m=103642839205574&w=2 http://www.ciac.org/ciac/bulletins/n-011.shtml http://www.iss.net/security_center/static/10502.php http://www.li0n.pe.kr/eng/advisory/ms/iis_impersonation.txt https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-062 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A929 https://oval.cisecurity.org/reposi •

CVSS: 7.5EPSS: 93%CPEs: 2EXPL: 0

Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise." • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0099.html http://marc.info/?l=bugtraq&m=102392069305962&w=2 http://marc.info/?l=ntbugtraq&m=102392308608100&w=2 http://online.securityfocus.com/archive/1/276767 http://www.iss.net/security_center/static/9327.php http://www.kb.cert.org/vuls/id/313819 http://www.securityfocus.com/bid/4855 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-028 https://oval.cisecurity.org/repository/search/ •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 2

Information leaks in IIS 4 through 5.1 allow remote attackers to obtain potentially sensitive information or more easily conduct brute force attacks via responses from the server in which (2) in certain configurations, the server IP address is provided as the realm for Basic authentication, which could reveal real IP addresses that were obscured by NAT, or (3) when NTLM authentication is used, the NetBIOS name of the server and its Windows NT domain are revealed in response to an Authorization request. NOTE: this entry originally contained a vector (1) in which the server reveals whether it supports Basic or NTLM authentication through 401 Access Denied error messages. CVE has REJECTED this vector; it is not a vulnerability because the information is already available through legitimate use, since authentication cannot proceed without specifying a scheme that is supported by both the client and the server. • https://www.exploit-db.com/exploits/21313 http://marc.info/?l=bugtraq&m=101535399100534&w=2 http://www.iss.net/security_center/static/8382.php http://www.securityfocus.com/bid/4235 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message. Vulnerabilidad de secuencias de comandos en sitios cruzados (Cross-site scripting) en Internet Information Server 4.0, 5.0 y 5.1 permite a atacantes remotos ejecutar scripts arbitrarios como otros usuarios del web mediante el mensaje de error usado en una redirección de URL. • http://marc.info/?l=bugtraq&m=101854677802990&w=2 http://www.cert.org/advisories/CA-2002-09.html http://www.cisco.com/warp/public/707/Microsoft-IIS-vulnerabilities-MS02-018.shtml http://www.iss.net/security_center/static/8804.php http://www.kb.cert.org/vuls/id/520707 http://www.osvdb.org/3341 http://www.securityfocus.com/bid/4487 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-018 https://oval.cisecurity.org/repository/search/definition •