Microsoft Site Server 3.0 prior to SP4 installs a default user, LDAP_Anonymous, with a default password of LdapPassword_1, which allows remote attackers the "Log on locally" privilege.
Max CVSS
7.5
EPSS Score
8.12%
Published
2002-12-31
Updated
2017-07-11
Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands.
Max CVSS
7.5
EPSS Score
0.59%
Published
2000-02-18
Updated
2018-10-12
IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability.
Max CVSS
6.4
EPSS Score
0.89%
Published
1999-12-21
Updated
2018-10-12
Direct Mailer feature in Microsoft Site Server 3.0 saves user domain names and passwords in plaintext in the TMLBQueue network share, which has insecure default permissions, allowing remote attackers to read the passwords and gain privileges.
Max CVSS
7.5
EPSS Score
0.44%
Published
1999-12-31
Updated
2017-10-10

CVE-1999-1011

Public exploit
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
68.33%
Published
1999-07-19
Updated
2018-10-15
MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely.
Max CVSS
7.2
EPSS Score
0.05%
Published
1999-01-30
Updated
2016-10-18
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!