VARIoT IoT vulnerabilities database
VAR-199901-0162 | CVE-1999-0449 | Microsoft IIS of ExAir Service disruption at the sample site (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. An IIS4 sample site "ExAir" has three ASP pages, that if called directly without having the sample site dlls running, will cause the server CPU to increase to 100%. These pages include:
Exair - root/search/advsearch.asp
Exair - root/search/query.asp
Exair -root/search/search.asp
VAR-199901-0163 | CVE-1999-0450 | Microsoft IIS of ISAPI By extension Web Vulnerability where the root directory path information is leaked |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). Microsoft IIS Is ISAPI Mapped to extension by extension idq And .pl Files that do not actually exist GET Upon receiving the request, With error message Web A vulnerability exists that displays the absolute path of the root directory.You may get important information about your system.
This can happen if the file is referenced as the target of the GET or passed in a variable to a script that looks for the file.
Example:
CGI Error The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are: Can't open perl script "C:\InetPub\scripts\ bogus.pl": No such file or directory
VAR-199901-0178 | CVE-1999-1544 | Microsoft IIS Buffer overflow vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Buffer overflow in FTP server in Microsoft IIS 3.0 and 4.0 allows local and sometimes remote attackers to cause a denial of service via a long NLST (ls) command. IIS is prone to a denial-of-service vulnerability
VAR-199912-0172 | CVE-1999-1591 | Microsoft VisualInterDev 6.0 - IIS4 No authentication management vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Microsoft Internet Information Services (IIS) server 4.0 SP4, without certain hotfixes released for SP4, does not require authentication credentials under certain conditions, which allows remote attackers to bypass authentication requirements, as demonstrated by connecting via Microsoft Visual InterDev 6.0. Microsoft Visual InterDev 6.0 client is prone to vulnerability that permits attackers to gain unauthorized access to the affected application.
Reportedly, a Visual InterDev 6.0 client may be able to connect to an IIS4 Web Server and manage the website without requiring any user auhentication.
This issue may be associated with security permissions applied by FrontPage tools. It is unclear exactly what is allowing this to happen or under what combination of Service Pack / hotfix this may occur
VAR-199901-0177 | CVE-1999-1538 | Microsoft IIS 4.0 Remotely Web management ism.dll Files can be exploited by brute force vulnerabilities |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sensitive server information, including the Administrator's password. Web-based administration for IIS 4.0 is, by default, limited to the local loopback address, 127.0.0.1. In instances where IIS4.0 was installed as an upgrade to IIS 2.0 or 3.0, a legacy ISAPI DLL (ISM.DLL) is left in the /scripts/iisadmin directory. An attacker may call this DLL via the following syntax:
http://www.server.com/scripts/iisadmin/ism.dll?http/dir
This URL prompts the user for a username/password to access the remote administration console
VAR-199901-0048 | CVE-1999-0063 | Cisco IOS syslog Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. Vulnerabilities exist in Cisco IOS 12.0 and other releases
VAR-199901-0195 | No CVE | Cisco IOS Syslog Crash |
CVSS V2: - CVSS V3: - Severity: - |
Cisco devices running classic IOS are reported prone to a denial of service vulnerability. The issue occurs when a vulnerable device receives and processes a UDP packet on UDP port 514 for syslog. This issue results in a crash or hang requiring a reboot.
Vulnerable IOS software may be found on the following Cisco devices:
- Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 8xx, ubr9xx, 1xxx, 25xx, 26xx, 30xx, 36xx, 38xx, 40xx, 45xx, 47xx, AS52xx, AS53xx, AS58xx, 64xx, 70xx, 72xx (including the ubr72xx), 75xx, and 12xxx series.
-Recent versions of LS1010 ATM switch.
-Catalyst 2900XL LAN switch.
-Cisco DitributedDirector.
VAR-199901-0009 | CVE-1999-1170 | Progress Software IPswitch IMail Security hole |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc. Progress Software IPswitch IMail is an email server of Progress Software Company in the United States. A security vulnerability exists in Progress Software IPswitch IMail
VAR-202104-2088 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201902-0941 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201312-0597 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201312-0601 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201302-0422 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201008-0396 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201108-0312 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-202012-1631 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-202109-1968 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-202110-1907 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-202011-1582 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-201109-0404 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |