5 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The htpasswd implementation of mini_httpd before v1.28 and of thttpd before v2.28 is affected by a buffer overflow that can be exploited remotely to perform code execution. La implementación htpasswd de mini_httpd, en versiones anteriores a la v1.28 y de thttpd, en versiones anteriores a la v2.28, se ha visto afectada por un desbordamiento de búfer que podría ser explotado de forma remota para ejecutar código. • http://acme.com/updates/archive/199.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files. thttpd anterior a 2.25b-r6 en Gentoo Linux es iniciado desde el directorio raíz del sistema (/) por el paquete de distribución base 1.12.6 de Gentoo, lo cual permite a atacantes remotos leer archivos de su elección. • http://bugs.gentoo.org/show_bug.cgi?id=142047 http://osvdb.org/31965 http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html http://seclists.org/fulldisclosure/2023/Nov/13 http://secunia.com/advisories/24018 http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml http://www.securityfocus.com/bid/22349 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Multiple directory traversal vulnerabilities in thttpd 2.07 beta 0.4, when running on Windows, allow remote attackers to read arbitrary files via a URL that contains (1) a hex-encoded backslash dot-dot sequence ("%5C..") or (2) a drive letter (such as "C:"). • https://www.exploit-db.com/exploits/24350 http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0097.html http://marc.info/?l=bugtraq&m=109164010629836&w=2 http://securitytracker.com/alerts/2004/Aug/1010850.html http://www.acme.com/software/thttpd/#releasenotes http://www.osvdb.org/displayvuln.php?osvdb_id=8372 http://www.securityfocus.com/bid/10862 https://exchange.xforce.ibmcloud.com/vulnerabilities/16882 •

CVSS: 9.8EPSS: 7%CPEs: 1EXPL: 0

Off-by-one buffer overflow in Basic Authentication in Acme Labs thttpd 1.95 through 2.20 allows remote attackers to cause a denial of service and possibly execute arbitrary code. • http://www.securityfocus.com/archive/1/241310 http://www.securityfocus.com/archive/1/241953 http://www.securityfocus.com/bid/3562 https://exchange.xforce.ibmcloud.com/vulnerabilities/7595 • CWE-193: Off-by-one Error •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Acme Thttpd Secure Webserver before 2.22, with the chroot option enabled, allows remote attackers to view sensitive files under the document root (such as .htpasswd) via a GET request with a trailing /. • http://marc.info/?l=bugtraq&m=100568999726036&w=2 http://www.acme.com/software/thttpd • CWE-668: Exposure of Resource to Wrong Sphere •