8 results (0.007 seconds)

CVSS: 4.3EPSS: 1%CPEs: 3EXPL: 2

Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp. • https://www.exploit-db.com/exploits/21260 http://marc.info/?l=vulnwatch&m=101235440104716&w=2 http://www.iss.net/security_center/static/8050.php http://www.securityfocus.com/bid/3999 •

CVSS: 7.5EPSS: 5%CPEs: 13EXPL: 0

Microsoft Site Server 3.0 prior to SP4 installs a default user, LDAP_Anonymous, with a default password of LdapPassword_1, which allows remote attackers the "Log on locally" privilege. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0033.html http://online.securityfocus.com/advisories/3843 http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3BQ248840 http://www.securityfocus.com/bid/3998 https://exchange.xforce.ibmcloud.com/vulnerabilities/8048 •

CVSS: 5.0EPSS: 1%CPEs: 16EXPL: 0

cphost.dll in Microsoft Site Server 3.0 allows remote attackers to cause a denial of service (disk consumption) via an HTTP POST of a file with a long TargetURL parameter, which causes Site Server to abort and leaves the uploaded file in c:\temp. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0033.html http://www.iss.net/security_center/static/8053.php http://www.securityfocus.com/bid/4002 •

CVSS: 5.0EPSS: 95%CPEs: 7EXPL: 1

IIS 4.0 and 5.0 does not properly perform ISAPI extension processing if a virtual directory is mapped to a UNC share, which allows remote attackers to read the source code of ASP and other files, aka the "Virtualized UNC Share" vulnerability. • https://www.exploit-db.com/exploits/19824 http://www.microsoft.com/technet/support/kb.asp?ID=249599 http://www.securityfocus.com/bid/1081 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-019 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

IIS 4.0 and Site Server 3.0 allow remote attackers to read source code for ASP files if the file is in a virtual directory whose name includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the "Virtual Directory Naming" vulnerability. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238606 http://www.osvdb.org/8098 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-058 •