CVE-2017-17663
https://notcve.org/view.php?id=CVE-2017-17663
The htpasswd implementation of mini_httpd before v1.28 and of thttpd before v2.28 is affected by a buffer overflow that can be exploited remotely to perform code execution. La implementación htpasswd de mini_httpd, en versiones anteriores a la v1.28 y de thttpd, en versiones anteriores a la v2.28, se ha visto afectada por un desbordamiento de búfer que podría ser explotado de forma remota para ejecutar código. • http://acme.com/updates/archive/199.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-0664
https://notcve.org/view.php?id=CVE-2007-0664
thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files. thttpd anterior a 2.25b-r6 en Gentoo Linux es iniciado desde el directorio raíz del sistema (/) por el paquete de distribución base 1.12.6 de Gentoo, lo cual permite a atacantes remotos leer archivos de su elección. • http://bugs.gentoo.org/show_bug.cgi?id=142047 http://osvdb.org/31965 http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html http://seclists.org/fulldisclosure/2023/Nov/13 http://secunia.com/advisories/24018 http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml http://www.securityfocus.com/bid/22349 •
CVE-2001-0892
https://notcve.org/view.php?id=CVE-2001-0892
Acme Thttpd Secure Webserver before 2.22, with the chroot option enabled, allows remote attackers to view sensitive files under the document root (such as .htpasswd) via a GET request with a trailing /. • http://marc.info/?l=bugtraq&m=100568999726036&w=2 http://www.acme.com/software/thttpd • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2000-0359
https://notcve.org/view.php?id=CVE-2000-0359
Buffer overflow in Trivial HTTP (THTTPd) allows remote attackers to cause a denial of service or execute arbitrary commands via a long If-Modified-Since header. • http://archives.neohapsis.com/archives/bugtraq/1626.html http://www.novell.com/linux/security/advisories/suse_security_announce_30.html http://www.securityfocus.com/bid/1248 •