Page 2 of 13 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

syslogtocern in Acme thttpd before 2.23 allows local users to write arbitrary files via a symlink attack on a temporary file. • http://secunia.com/advisories/17454 http://secunia.com/advisories/17472 http://www.debian.org/security/2005/dsa-883 http://www.securityfocus.com/bid/15320 http://www.vupen.com/english/advisories/2005/2308 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Multiple directory traversal vulnerabilities in thttpd 2.07 beta 0.4, when running on Windows, allow remote attackers to read arbitrary files via a URL that contains (1) a hex-encoded backslash dot-dot sequence ("%5C..") or (2) a drive letter (such as "C:"). • https://www.exploit-db.com/exploits/24350 http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0097.html http://marc.info/?l=bugtraq&m=109164010629836&w=2 http://securitytracker.com/alerts/2004/Aug/1010850.html http://www.acme.com/software/thttpd/#releasenotes http://www.osvdb.org/displayvuln.php?osvdb_id=8372 http://www.securityfocus.com/bid/10862 https://exchange.xforce.ibmcloud.com/vulnerabilities/16882 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in thttpd, when using virtual hosting, allows remote attackers to read arbitrary files via .. (dot dot) sequences in the Host: header. Vulnerabilidad de atravesamiento de directorios en thttpd, cuando se usan servidores virtuales, permite a atacantes remotos leer ficheros mediante secuencias .. (punto punto) en la cabecera Host: • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000777 http://marc.info/?l=thttpd&m=103609565110472&w=2 http://news.php.net/article.php?group=php.cvs&article=15698 https://www.debian.org/security/2003/dsa-396 •

CVSS: 7.5EPSS: 9%CPEs: 1EXPL: 2

Cross-site scripting vulnerability in thttpd 2.20 and earlier allows remote attackers to execute arbitrary script via a URL to a nonexistent page, which causes thttpd to insert the script into a 404 error message. Vulnerabilidad de secuencia de comandos en sitios cruzados en thttpd 2.20 y anteriores permite a atacantes remotos la ejecución arbitraria de rutinas mediante una URL a una página inexistente, lo cual provoca que thttpd inserte la rutina en un mensaje de error 404. • https://www.exploit-db.com/exploits/21422 http://archives.neohapsis.com/archives/vuln-dev/2002-q2/0155.html http://www.acme.com/software/thttpd/#releasenotes http://www.ifrance.com/kitetoua/tuto/5holes1.txt http://www.iss.net/security_center/static/9029.php http://www.osvdb.org/5125 http://www.securityfocus.com/bid/4601 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Acme.Serve 1.7, as used in Cisco Secure ACS Unix and possibly other products, allows remote attackers to read arbitrary files by prepending several / (slash) characters to the URI. • https://www.exploit-db.com/exploits/20894 http://www.cisco.com/warp/public/707/acmeweb-acsunix-dirtravers-vuln-pub.shtml http://www.iss.net/security_center/static/6634.php http://www.osvdb.org/5544 http://www.securityfocus.com/archive/1/188141 http://www.securityfocus.com/bid/2809 • CWE-20: Improper Input Validation •