18 results (0.013 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

27 Dec 2019 — thttpd 2007 has buffer underflow. thttpd versión 2007, tiene un desbordamiento de búfer. • http://taviso.decsystem.org/research.t2t • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

25 Nov 2019 — thttpd has a local DoS vulnerability via specially-crafted .htpasswd files thttpd, presenta una vulnerabilidad de tipo DoS local por medio de archivos .htpasswd especialmente diseñados. • http://www.openwall.com/lists/oss-security/2012/12/15/1 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

06 Feb 2018 — The htpasswd implementation of mini_httpd before v1.28 and of thttpd before v2.28 is affected by a buffer overflow that can be exploited remotely to perform code execution. La implementación htpasswd de mini_httpd, en versiones anteriores a la v1.28 y de thttpd, en versiones anteriores a la v2.28, se ha visto afectada por un desbordamiento de búfer que podría ser explotado de forma remota para ejecutar código. • http://acme.com/updates/archive/199.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0

13 Dec 2013 — thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file. thttpd.c en sthttpd antes de 2.26.4-r2 y httpd 2.25b usa permisos de lectura universales para / var / log / thttpd.log, lo que permite a usuarios locales obtener información sensible mediante la lectura del archivo. • http://lists.opensuse.org/opensuse-updates/2013-12/msg00050.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 3

13 Jan 2010 — thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. thttpd v2.25b0, escribe datos en un archivo de los sin depurar los caracteres no escribibles, lo que podría permitir a atacantes remotos modificar la ventana de título, o posiblemente ejecutar comandos de su elección o sobrescribi... • https://packetstorm.news/files/id/175949 • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

02 Feb 2007 — thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files. thttpd anterior a 2.25b-r6 en Gentoo Linux es iniciado desde el directorio raíz del sistema (/) por el paquete de distribución base 1.12.6 de Gentoo, lo cual permite a atacantes remotos leer archivos de su elección. m-privacy TightGate-Pro suffers from code execution, insecure permissions, deletion mitigation, and outdated server... • https://packetstorm.news/files/id/175949 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2006 — thttpd on Debian GNU/Linux, and possibly other distributions, allows local users to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file. thttpd en Debian GNU/Linux, y posiblemente otras distribuciones, permite a usuarios locales crear o tocar ficheros de su elección mediante un ataque de enlaces simbólicos en el fichero temporal start_thttpd. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396277 •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 1

09 Mar 2006 — Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common produc... • https://packetstorm.news/files/id/175949 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

09 Mar 2006 — htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common pro... • https://packetstorm.news/files/id/175949 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

06 Nov 2005 — syslogtocern in Acme thttpd before 2.23 allows local users to write arbitrary files via a symlink attack on a temporary file. • http://secunia.com/advisories/17454 •