Keyword: troj_iis.alien
44797 Total Search   |   Showing Results : 41 - 60
Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. The said vulnerabilities allow remote code execution on affected systems FTP Service on IIS 5.0, or
(daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability." Microsoft IIS 5.0,Microsoft IIS
\Microsoft\ Windows\CurrentVersion\Setup\ Oc Manager\TemporaryData\7a0:11da580\ iis HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Updates\UpdateExeVolatile HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Updates
modify files. microsoft iis 5.0,microsoft iis 5.1,microsoft iis 6.0 Apply associated Trend Micro DPI Rules. 1003508| 1003508 - Microsoft IIS Unicode Requests To WebDAV Authentication Bypass Vulnerability
CVE-2005-2678 Microsoft IIS 5.1 and 6 allows remote attackers to spoof the SERVER_NAME variable to bypass security checks and conduct various attacks via a GET request with an http://localhost URI,
on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122. Microsoft IIS 5.0,Microsoft IIS 5.1,Microsoft IIS 6.0 Trend
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Setup\ Oc Manager\TemporaryData\610:106208\ iis HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Updates\UpdateExeVolatile HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Updates
modify files. microsoft iis 5.0,microsoft iis 5.1,microsoft iis 6.0 Apply associated Trend Micro DPI Rules. 1000128| 1000128 - HTTP Protocol Decoding
LIST) command that uses wildcards, leading to memory corruption, aka "IIS FTP Service RCE and DoS Vulnerability." Microsoft IIS 6.0,Microsoft IIS 5.0 Apply associated Trend Micro DPI Rules. 1003698
CVE-2000-0071 cve: IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions. Microsoft IIS 3.0,Microsoft IIS
arbitrary code. Microsoft IIS 4.0,Microsoft IIS 5.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
CVE-2000-0457 ISM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr
CVE-2000-0630 IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a .htr to the URL, a variant of the "File Fragment Reading via .HTR"
CVE-2001-0004 IIS 5.0 and 4.0 allows remote attackers to read the source code for executable web server programs by appending "%3F .htr" to the requested URL, which causes the files
CVE-1999-0278 In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. Microsoft IIS 3.0,Microsoft IIS 4.0,Microsoft Windows NT 4.0 Trend
CVE-2002-1908 Microsoft IIS 5.0 and 5.1 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with a Host header that contains a large number of
CVE-2000-0413 The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a
CVE-1999-1538 When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice. Microsoft IIS 4.0,Microsoft IIS 5.0