Page 5 of 39 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

IIS 4.0 and Site Server 3.0 allow remote attackers to read source code for ASP files if the file is in a virtual directory whose name includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the "Virtual Directory Naming" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238606 http://www.osvdb.org/8098 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-058 •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246401 http://www.acrossecurity.com/aspr/ASPR-1999-11-10-1-PUB.txt https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-061 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 1

When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page". • https://www.exploit-db.com/exploits/19361 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233335 http://www.securityfocus.com/bid/477 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-022 https://exchange.xforce.ibmcloud.com/vulnerabilities/2302 • CWE-16: Configuration •

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ244613 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-053 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers. • https://www.exploit-db.com/exploits/19457 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238349 http://www.ciac.org/ciac/bulletins/j-058.shtml http://www.securityfocus.com/bid/579 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029 • CWE-20: Improper Input Validation •