http://www.kb.cert.org/vuls/id/363715 CAN-2002-0071 Microsoft Internet Information Server (IIS) vulnerable to heap overflow during processing of crafted ".htr" request by "ISM.DLL" ISAPI filter http://www.kb.cert.org/vuls/id/883091 CAN-2002-0074 Microsoft Internet Information Server (IIS) contains cross-site scripting vulnerability in IIS Help Files search facility http://www.kb.cert.org/vuls/id/886699 CAN-2002-0148 Microsoft Internet Information Server (IIS) contains cross-site scripting vulnerability in HTTP error page results http://www.kb.cert.org/vuls/id/520707 CAN-2002-0075 Microsoft Internet Information Server (IIS) contains cross-site scripting vulnerability in redirect response messages http://www.kb.cert.org/vuls/id/412203 CAN-2002-0073 Microsoft Internet Information Server (IIS) vulnerable to DoS via malformed FTP connection status request http://www.kb.cert.org/vuls/id/454091 CAN-2002-0150 Microsoft Internet Information Server (IIS) vulnerable to buffer overflow via inaccurate checking of delimiters in HTTP header fields http://www.kb.cert.org/vuls/id/721963 CAN-2002-0149 Microsoft Internet Information Server (IIS) buffer overflow in server-side includes (SSI) containing long invalid file name http://www.kb.cert.org/vuls/id/521059 CAN-2002-0072 Microsoft Internet Information Server (IIS) vulnerable to DoS when URL request exceeds maximum allowed length http://www.kb.cert.org/vuls/id/610291 CAN-2002-0079 Microsoft Internet Information Server (IIS) buffer overflow in chunked encoding transfer mechanism http://www.kb.cert.org/vuls/id/669779 CAN-2002-0147 Microsoft Internet Information Server (IIS) buffer overflow in chunked encoding transfer mechanism
There you go again: Attributing flaws in IIS to Windows. You do realize that IIS is a server-based web server, right? You might as well talk about Apache, if you're going to talk about IIS.
63 posted on 01/11/2004 2:52:25 PM PST by Bush2000
(tro)