Microsoft

Site Server

16 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 18.97%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Site Server 3.0 prior to SP4 installs a default user, LDAP_Anonymous, with a default password of LdapPassword_1, which allows remote attackers the "Log on locally" privilege.

Exploit
  • EPSS 3.17%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to forms...

  • EPSS 14.97%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

cphost.dll in Microsoft Site Server 3.0 allows remote attackers to cause a denial of service (disk consumption) via an HTTP POST of a file with a long TargetURL parameter, which causes Site Server to abort and leaves the uploaded file in c:\temp.

  • EPSS 83.62%
  • Published 30.03.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

IIS 4.0 and 5.0 does not properly perform ISAPI extension processing if a virtual directory is mapped to a UNC share, which allows remote attackers to read the source code of ASP and other files, aka the "Virtualized UNC Share" vulnerability.

  • EPSS 8.39%
  • Published 18.02.2000 05:00:00
  • Last modified 03.04.2025 01:03:51

Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands.

  • EPSS 0.92%
  • Published 31.12.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

Direct Mailer feature in Microsoft Site Server 3.0 saves user domain names and passwords in plaintext in the TMLBQueue network share, which has insecure default permissions, allowing remote attackers to read the passwords and gain privileges.

  • EPSS 35.59%
  • Published 31.12.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files.

  • EPSS 12.05%
  • Published 21.12.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability.

  • EPSS 46.05%
  • Published 21.12.1999 05:00:00
  • Last modified 03.04.2025 01:03:51

IIS 4.0 and Site Server 3.0 allow remote attackers to read source code for ASP files if the file is in a virtual directory whose name includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the "Virtual Directory Naming" vulnerability.

  • EPSS 19.63%
  • Published 10.09.1999 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user.