8 results (0.003 seconds)

CVSS: 7.8EPSS: 1%CPEs: 19EXPL: 3

12 Jul 2006 — Directory traversal vulnerability in Nullsoft SHOUTcast DSP before 1.9.6 filters directory traversal sequences before decoding, which allows remote attackers to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing "/content". Vulnerabilidad de salto de directorio en Nullsoft SHOUTcast DSP versiones anteriores a la 1.9.6, filtra secuencias de salto de directorio antes de decodificarse, lo que permite a atacantes remotos leer ficheros de su elección a t... • http://bugs.gentoo.org/show_bug.cgi?id=136721 •

CVSS: 6.1EPSS: 0%CPEs: 14EXPL: 0

13 Jun 2006 — Multiple cross-site scripting (XSS) vulnerabilities in SHOUTcast 1.9.5 allow remote attackers to inject arbitrary HTML or web script via the DJ fields (1) Description, (2) URL, (3) Genre, (4) AIM, and (5) ICQ. Múltiples vulnerabilidades de XSS en SHOUTcast 1.9.5 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de los campos DJ (1) Description, (2) URL, (3) Genre, (4) AIM y (5) ICQ. • http://marc.info/?l=bugtraq&m=114980135615062&w=2 •

CVSS: 8.8EPSS: 86%CPEs: 3EXPL: 3

23 Dec 2004 — Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file. • https://www.exploit-db.com/exploits/712 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 5

31 Dec 2003 — Buffer overflow in NullSoft Shoutcast Server 1.9.2 allows local users to cause a denial of service via (1) icy-name followed by a long server name or (2) icy-url followed by a long URL. • https://www.exploit-db.com/exploits/23328 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

18 Mar 2003 — SHOUTcast 1.8.9 and earlier allows local users to obtain the cleartext administrative password via a GET request to port 8001, which causes the password to be logged in the world-readable sc_serv.log file. SHOUTcast 1.8.9 y anteriores permite a usuarios locales obtenter la contraseña administrativa en texto claro mediante una petición GET al puerto 9001, lo que hace que la contraseña sea registrada en el fichero sc_serv.log, con permisos de lectura para todo el mundo. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0017.html •

CVSS: 8.8EPSS: 10%CPEs: 5EXPL: 2

31 Aug 2002 — Buffer overflow in SHOUTcast 1.8.9 and other versions before 1.8.12 allows a remote authenticated DJ to execute arbitrary code on the server via a long value in a header whose name begins with "icy-". Desbordamiento de búfer en SHOUTcast 1.8.9 y otras versiones anteriores a 1.8.12 permite a un DJ autenticado remotamente ejecutar código arbitrario en el servidor mediante un un valor largo en una cabecera cuyo nombre empieza con "icy-" • https://www.exploit-db.com/exploits/21511 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

03 May 2002 — Buffer overflow in admin.cgi for Nullsoft Shoutcast Server 1.8.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an argument with a large number of backslashes. Desbordamiento de buffer en admin.cgi de Nullsoft Shoutcast Server 1.8.3 permite a atacantes remotos causar un denegación de servicio y posiblemente ejecutar código arbitrario con un grán numero de barras invertidas (\\). • http://marc.info/?l=bugtraq&m=101167484012724&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

03 Aug 2001 — Buffer overflow in SHOUTcast Server 1.8.2 allows remote attackers to cause a denial of service (crash) via several HTTP requests with a long (1) user-agent or (2) host HTTP header. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0048.html •