Plugins Database As of 12-09-2019

ASP source using %20 trick

Web application abuses
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.11071

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Recommendations:
Install all the latest security patches.

Summary:
It is possible to get the source code of the remote ASP scripts by appending %20 at the end of the request (like GET /default.asp%20) ASP source code usually contains sensitive information such as logins and passwords.

Solution Type:
Vendor Patch

Detection Type:
Remote Vulnerability

Search
Severity
Medium
CVSS Score
5.0
Published
2005-11-03 13:08:04
Modified
2019-02-15 08:20:11
CVE
CVE-2001-1248
BID
2975

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.