Page 3 of 18 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 5

Directory traversal vulnerability in Cherokee Web Server 0.5.4 and earlier for Windows allows remote attackers to read arbitrary files via a /\.. (slash backslash dot dot) in the URL. Vulnerabilidad de salto de directorio en Cherokee Web Server v0.5.4 y anteriores para Windows permite a atacantes remotos leer ficheros de su elección mediante una secuencia de caracteres /\.. (barra barra invertida punto punto) en la URL. • https://www.exploit-db.com/exploits/9873 http://freetexthost.com/ncyss3plli http://osvdb.org/59588 http://pocoftheday.blogspot.com/2009/10/cherokee-web-server-054-directory.html http://secunia.com/advisories/37183 http://www.securityfocus.com/bid/36874 http://www.vupen.com/english/advisories/2009/3091 https://exchange.xforce.ibmcloud.com/vulnerabilities/54024 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 1%CPEs: 13EXPL: 2

Cross-site scripting (XSS) vulnerability in Cherokee HTTPD 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated. • http://secunia.com/advisories/19587 http://www.osvdb.org/24469 http://www.securityfocus.com/archive/1/430385/100/0/threaded http://www.securityfocus.com/bid/17408 http://www.vupen.com/english/advisories/2006/1292 https://exchange.xforce.ibmcloud.com/vulnerabilities/25698 https://security.gentoo.org/glsa/202012-09 •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 3

Cross-site scripting (XSS) vulnerability in Cherokee before 0.4.8 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly quoted in the resulting error page. • https://www.exploit-db.com/exploits/23605 http://secunia.com/advisories/10701 http://www.osvdb.org/3707 http://www.securityfocus.com/bid/9496 https://exchange.xforce.ibmcloud.com/vulnerabilities/14936 •

CVSS: 10.0EPSS: 1%CPEs: 11EXPL: 0

Format string vulnerability in the cherokee_logger_ncsa_write_string function in Cherokee 0.4.17 and earlier, when authenticating via auth_pam, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in the URL. • http://bugs.gentoo.org/show_bug.cgi?id=67667 http://www.gentoo.org/security/en/glsa/glsa-200411-02.xml http://www.securityfocus.com/bid/11574 https://exchange.xforce.ibmcloud.com/vulnerabilities/17934 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Format string vulnerability in the PRINT_ERROR function in common.c for Cherokee Web Server 0.4.16 and earlier allows local users to execute arbitrary code via format string specifiers in the -C command line argument. NOTE: it is not clear whether this issue could be exploited remotely, or if Cherokee is running at escalated privileges. Therefore it might not be a vulnerability. • http://marc.info/?l=bugtraq&m=108249818308672&w=2 http://www.nosystem.com.ar/advisories/advisory-03.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/15924 •