Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-1999-0725
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft IIS 3.0/4.0"%81"ASP源码泄露漏洞(MS99-022)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IIS 是一个非常流行的Internet Web服务器产品,随Windows NT捆绑销售。 中文版、日文版、韩文版等双字节语言版本的IIS 3.0和4.0存在一个问题,在HTTP请求中CGI文件名后面加上"%81"就可以显示出文件的源代码,而不是执行。 该问题是一个输入验证错误。IIS是通过文件扩展名来决定将一个文件内容直接显示出来还是作为脚本执行的。对于asp文件,如果请求中的扩展名是".asp"那么IIS可以正确处理。如果将扩展名后面加一个"%81",IIS将不认为这是一个ASP文件,也就不会执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-1999-0725
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-1999-0725
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-1999-0725

No comments yet


Leave a comment