
CVE-2006-0760
https://notcve.org/view.php?id=CVE-2006-0760
18 Feb 2006 — LightTPD 1.4.8 and earlier, when the web root is on a case-insensitive filesystem, allows remote attackers to bypass URL checks and obtain sensitive information via file extensions with unexpected capitalization, as demonstrated by a request for index.PHP when the configuration invokes the PHP interpreter only for ".php" names. • http://lighttpd.net/news •

CVE-2005-0453
https://notcve.org/view.php?id=CVE-2005-0453
16 Feb 2005 — The buffer_urldecode function in Lighttpd 1.3.7 and earlier does not properly handle control characters, which allows remote attackers to obtain the source code for CGI and FastCGI scripts via a URL with a %00 (null) character after the file extension. • http://article.gmane.org/gmane.comp.web.lighttpd/1171 •