3 results (0.002 seconds)

CVSS: 7.8EPSS: 2%CPEs: 19EXPL: 3

Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content". Vulnerabilidad de salto de directorio en Nullsoft SHOUTcast DSP versiones anteriores a la 1.9.6, filtra secuencias de salto de directorio antes de decodificarse, lo que permite a atacantes remotos leer ficheros de su elección a través de secuencias codificadas punto punto (%2E%2E) en una petición HTTP GET para una ruta de archivo que contenga "/content". • http://bugs.gentoo.org/show_bug.cgi?id=136721 http://people.ksp.sk/~goober/advisory/001-shoutcast.html http://secunia.com/advisories/20524 http://security.gentoo.org/glsa/glsa-200607-05.xml http://securitytracker.com/id?1016493 http://www.shoutcast.com/#news http://www.vupen.com/english/advisories/2006/2801 •

CVSS: 4.3EPSS: 0%CPEs: 14EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in SHOUTcast 1.9.5 allow remote attackers to inject arbitrary HTML or web script via the DJ fields (1) Description, (2) URL, (3) Genre, (4) AIM, and (5) ICQ. Múltiples vulnerabilidades de XSS en SHOUTcast 1.9.5 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de los campos DJ (1) Description, (2) URL, (3) Genre, (4) AIM y (5) ICQ. • http://marc.info/?l=bugtraq&m=114980135615062&w=2 http://secunia.com/advisories/20524 http://secunia.com/advisories/21005 http://www.gentoo.org/security/en/glsa/glsa-200607-05.xml http://www.securityfocus.com/bid/18376 http://www.vupen.com/english/advisories/2006/2254 https://exchange.xforce.ibmcloud.com/vulnerabilities/27129 •

CVSS: 7.5EPSS: 97%CPEs: 3EXPL: 3

Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file. • https://www.exploit-db.com/exploits/712 https://www.exploit-db.com/exploits/830 https://www.exploit-db.com/exploits/16751 http://marc.info/?l=bugtraq&m=110382975516003&w=2 http://marc.info/?l=bugtraq&m=110886444014745&w=2 http://securitytracker.com/id?1012675 http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml http://www.securityfocus.com/bid/12096 https://exchange.xforce.ibmcloud.com/vulnerabilities/18669 •