CVE-2021-32962 – Claroty Secure Remote Access Site - Authentication Bypass Using an Alternate Path or Channel
https://notcve.org/view.php?id=CVE-2021-32962
The AGG Software Web Server version 4.0.40.1014 and prior is vulnerable to cross-site scripting, which may allow an attacker to remotely execute arbitrary code. AGG Software Web Server versión 4.0.40.1014 y anteriores, es vulnerable a un ataque de tipo cross-site scripting, que puede permitir a un atacante ejecutar código arbitrario de forma remota • https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-02 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-32964 – Claroty Secure Remote Access Site - Authentication Bypass Using an Alternate Path or Channel
https://notcve.org/view.php?id=CVE-2021-32964
The AGG Software Web Server version 4.0.40.1014 and prior is vulnerable to a path traversal attack, which may allow an attacker to read arbitrary files from the file system. AGG Software Web Server versiones 4.0.40.1014 y anteriores, es vulnerable a un ataque de salto de ruta, que puede permitir a un atacante leer archivos arbitrarios del sistema de archivos • https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-02 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •
CVE-2005-2008
https://notcve.org/view.php?id=CVE-2005-2008
Yaws Webserver 1.55 and earlier allows remote attackers to obtain the source code for yaws scripts via a request to a yaw script with a trailing %00 (null). • http://marc.info/?l=bugtraq&m=111927717726371&w=2 http://secunia.com/advisories/15740 http://www.osvdb.org/17375 http://yaws.hyber.org/yaws-1.55_to_1.56.patch •
CVE-2000-0671 – Roxen WebServer 2.0.x - '%00' Request File/Directory Disclosure
https://notcve.org/view.php?id=CVE-2000-0671
Roxen web server earlier than 2.0.69 allows allows remote attackers to bypass access restrictions, list directory contents, and read source code by inserting a null character (%00) to the URL. • https://www.exploit-db.com/exploits/20104 http://archives.neohapsis.com/archives/bugtraq/2000-07/0307.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0321.html http://www.securityfocus.com/bid/1510 https://exchange.xforce.ibmcloud.com/vulnerabilities/4965 •