
CVE-2007-0664 – m-privacy TightGate-Pro Code Execution / Insecure Permissions
https://notcve.org/view.php?id=CVE-2007-0664
02 Feb 2007 — thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files. thttpd anterior a 2.25b-r6 en Gentoo Linux es iniciado desde el directorio raíz del sistema (/) por el paquete de distribución base 1.12.6 de Gentoo, lo cual permite a atacantes remotos leer archivos de su elección. m-privacy TightGate-Pro suffers from code execution, insecure permissions, deletion mitigation, and outdated server... • https://packetstorm.news/files/id/175949 •

CVE-2006-4248
https://notcve.org/view.php?id=CVE-2006-4248
31 Oct 2006 — thttpd on Debian GNU/Linux, and possibly other distributions, allows local users to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file. thttpd en Debian GNU/Linux, y posiblemente otras distribuciones, permite a usuarios locales crear o tocar ficheros de su elección mediante un ataque de enlaces simbólicos en el fichero temporal start_thttpd. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396277 •

CVE-2006-1078 – m-privacy TightGate-Pro Code Execution / Insecure Permissions
https://notcve.org/view.php?id=CVE-2006-1078
09 Mar 2006 — Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common produc... • https://packetstorm.news/files/id/175949 •

CVE-2006-1079 – m-privacy TightGate-Pro Code Execution / Insecure Permissions
https://notcve.org/view.php?id=CVE-2006-1079
09 Mar 2006 — htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common pro... • https://packetstorm.news/files/id/175949 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2005-4162
https://notcve.org/view.php?id=CVE-2005-4162
11 Dec 2005 — Cross-site scripting (XSS) vulnerability in cal_make.pl in ACME PerlCal 2.99.20 allows remote attackers to inject arbitrary web script or HTML via the p0 parameter. Vulnerabilidad de secuencias de comandos en sitos cruzados (XSS) en cal_make.pl de ACME PerlCal 2.99.20 permite a atacantes remotos inyectar 'scritp' web o HTML de su elección mediante el parámetro "p0". • http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0315.html •

CVE-2005-3124
https://notcve.org/view.php?id=CVE-2005-3124
06 Nov 2005 — syslogtocern in Acme thttpd before 2.23 allows local users to write arbitrary files via a symlink attack on a temporary file. • http://secunia.com/advisories/17454 •

CVE-2004-2628 – Acme thttpd 2.0.7 - Directory Traversal
https://notcve.org/view.php?id=CVE-2004-2628
31 Dec 2004 — Multiple directory traversal vulnerabilities in thttpd 2.07 beta 0.4, when running on Windows, allow remote attackers to read arbitrary files via a URL that contains (1) a hex-encoded backslash dot-dot sequence ("%5C..") or (2) a drive letter (such as "C:"). • https://www.exploit-db.com/exploits/24350 •

CVE-2002-1562
https://notcve.org/view.php?id=CVE-2002-1562
26 Apr 2003 — Directory traversal vulnerability in thttpd, when using virtual hosting, allows remote attackers to read arbitrary files via .. (dot dot) sequences in the Host: header. Vulnerabilidad de atravesamiento de directorios en thttpd, cuando se usan servidores virtuales, permite a atacantes remotos leer ficheros mediante secuencias .. (punto punto) en la cabecera Host: • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000777 •

CVE-2002-0733 – ACME Labs thttpd 2.20 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2002-0733
12 Aug 2002 — Cross-site scripting vulnerability in thttpd 2.20 and earlier allows remote attackers to execute arbitrary script via a URL to a nonexistent page, which causes thttpd to insert the script into a 404 error message. Vulnerabilidad de secuencia de comandos en sitios cruzados en thttpd 2.20 y anteriores permite a atacantes remotos la ejecución arbitraria de rutinas mediante una URL a una página inexistente, lo cual provoca que thttpd inserte la rutina en un mensaje de error 404. • https://www.exploit-db.com/exploits/21422 •

CVE-2001-0748 – Acme.Serve 1.7 - Arbitrary File Access
https://notcve.org/view.php?id=CVE-2001-0748
18 Oct 2001 — Acme.Serve 1.7, as used in Cisco Secure ACS Unix and possibly other products, allows remote attackers to read arbitrary files by prepending several / (slash) characters to the URI. • https://www.exploit-db.com/exploits/20894 • CWE-20: Improper Input Validation •