Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft web applications vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0079
Buffer overflow in the chunked encoding transfer mechanism in Internet Information Server (IIS) 4.0 and 5.0 Active Server Pages allows malicious users to cause a denial of service or execute arbitrary code.
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
4 EDB exploits
NA
CVE-2002-0147
Buffer overflow in the ASP data transfer mechanism in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote malicious users to cause a denial of service or execute code, aka "Microsoft-discovered variant of Chunked Encoding buffer overrun."
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
NA
CVE-2002-0148
Cross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other users via an HTTP error page.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
1 EDB exploit
NA
CVE-2002-0149
Buffer overflow in ASP Server-Side Include Function in IIS 4.0, 5.0 and 5.1 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via long file names.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
NA
CVE-2002-0150
Buffer overflow in Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote malicious users to spoof the safety check for HTTP headers and cause a denial of service or execute arbitrary code via HTTP header field values.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
NA
CVE-2002-0364
Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows malicious users to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
NA
CVE-2004-0845
Internet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote malicious users to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
NA
CVE-2005-2087
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 5.2.3
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Ie 6
1 EDB exploit
NA
CVE-2011-3414
The CaseInsensitiveHashProvider.getHashCode function in the HashTable implementation in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 computes hash values for form parameters without restricting the ability to trigger hash collisions ...
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Xp Sp3
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Vista -
Microsoft Windows Vista
1 Github repository
7.5
CVSSv3
CVE-2022-21986
.NET Denial of Service Vulnerability
Microsoft Visual Studio 2019
Microsoft .net
Microsoft Visual Studio 2022
Fedoraproject Fedora 34
Fedoraproject Fedora 35
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »