CVE-2002-2431
https://notcve.org/view.php?id=CVE-2002-2431
Unspecified vulnerability in GoAhead WebServer before 2.1.4 allows remote attackers to cause "incorrect behavior" via unknown "malicious code," related to incorrect use of the socketInputBuffered function by sockGen.c. Vulnerabilidad sin especificar en GoAhead WebServer anterior a v2.1.4 permite a atacantes remotos provocar "funcionamiento incorrecto" a través de "código malicioso" desconocido, relacionado con el uso incorrecto de la función "socketInputBuffered" en sockGen.c. • http://data.goahead.com/Software/Webserver/2.1.8/release.htm#fixed-vulnerability-to-malicious-code-in-sockgen-c •
CVE-2002-2430
https://notcve.org/view.php?id=CVE-2002-2430
GoAhead WebServer before 2.1.1 allows remote attackers to cause a denial of service (CPU consumption) by performing a socket disconnect to terminate a request before it has been fully processed by the server. GoAhead WebServer anterior a v2.1.1 permite a actacantes remotos provocar una denegación de servicio (consumo de CPU)implicando una desconexión de socket que finalizará una petición antes de que ésta haya sido totalmente procesada por el servidor. • http://data.goahead.com/Software/Webserver/2.1.8/release.htm#cpu-utilization-hangs-at-100-on-a-socket-disconnect-bug01865 • CWE-399: Resource Management Errors •
CVE-2002-1951 – GoAhead Web Server 2.1 - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2002-1951
Buffer overflow in GoAhead WebServer 2.1 allows remote attackers to execute arbitrary code via a long HTTP GET request with a large number of subdirectories. • https://www.exploit-db.com/exploits/21707 http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 http://osvdb.org/81099 http://www.iss.net/security_center/static/9884.php http://www.securiteam.com/securitynews/5MP0C1580W.html http://www.securityfocus.com/bid/5464 •
CVE-2002-0681 – GoAhead Web Server 2.1.x - Error Page Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2002-0681
Cross-site scripting vulnerability in GoAhead Web Server 2.1 allows remote attackers to execute script as other web users via script in a URL that generates a "404 not found" message, which does not quote the script. Vulnerabilidad de secuencias de comandos en sitios cruzados (cross-site scripting) en GoAhead Web Server 2.1 permite a atacantes remotos ejecutar secuencias de comandos como otros usuarios web mediante un script en una URL que genera un mensaje "404 no encontrado", que no le pone comillas al script. • https://www.exploit-db.com/exploits/21608 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 http://marc.info/?l=bugtraq&m=102631742711795&w=2 http://osvdb.org/81099 http://www.iss.net/security_center/static/9518.php http://www.securityfocus.com/bid/5198 •
CVE-2002-0680 – GoAhead Web Server 2.1.x - URL Encoded Slash Directory Traversal
https://notcve.org/view.php?id=CVE-2002-0680
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228. Vulnerabilidad de atravesamiento de directorios en GoAhead Web Server 2.1 permite a atacantes remotos mediante una URL con una "/" (carácter barra) codificada (%5C) en una secuencia .. (punto punto) • https://www.exploit-db.com/exploits/21607 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 http://marc.info/?l=bugtraq&m=102631742711795&w=2 http://marc.info/?l=bugtraq&m=102709382714597&w=2 http://osvdb.org/81099 •