Page 3 of 16 results (0.016 seconds)

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ244613 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-053 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers. • https://www.exploit-db.com/exploits/19457 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238349 http://www.ciac.org/ciac/bulletins/j-058.shtml http://www.securityfocus.com/bid/579 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 68%CPEs: 7EXPL: 2

The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/19425 https://www.exploit-db.com/exploits/19424 http://www.ciac.org/ciac/bulletins/j-054.shtml http://www.osvdb.org/272 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-004 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-025 https://www.securityfocus.com/bid/529 - • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

A configuration problem in the Ad Server Sample directory (AdSamples) in Microsoft Site Server 3.0 allows an attacker to obtain the SITE.CSC file, which exposes sensitive SQL database information. • https://www.exploit-db.com/exploits/19208 http://marc.info/?l=bugtraq&m=92647407227303&w=2 http://www.securityfocus.com/bid/256 https://exchange.xforce.ibmcloud.com/vulnerabilities/2270 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely. • https://www.exploit-db.com/exploits/20305 http://marc.info/?l=bugtraq&m=91763097004101&w=2 •