Multiple cross-site scripting (XSS) vulnerabilities in OmniHTTPd allow remote attackers to insert script or HTML into web pages via (1) test.php, (2) test.shtml, or (3) redir.exe.
Max CVSS
4.3
EPSS Score
0.53%
Published
2003-06-09
Updated
2008-09-05
Omnicron OmniHTTPd 2.09 allows remote attackers to cause a denial of service (crash) via an HTTP request with a long, malformed HTTP 1version number.
Max CVSS
5.0
EPSS Score
1.09%
Published
2002-10-04
Updated
2008-09-05
OmniHTTPd 2.0.8 and earlier allow remote attackers to obtain source code via a GET request with the URL-encoded symbol for a space (%20).
Max CVSS
5.0
EPSS Score
1.64%
Published
2001-10-18
Updated
2017-12-19
Omnicron OmniHTTPd 2.0.8 allows remote attackers to cause a denial of service (memory exhaustion) via a series of requests for PHP scripts.
Max CVSS
5.0
EPSS Score
0.76%
Published
2001-10-18
Updated
2017-12-19
Omnicron Technologies OmniHTTPD Professional 2.08 and earlier allows a remote attacker to create a denial of service via a long POST URL request.
Max CVSS
5.0
EPSS Score
0.76%
Published
2001-08-22
Updated
2017-10-10
statsconfig.pl in OmniHTTPd 2.07 allows remote attackers to overwrite arbitrary files via the cgidir parameter.
Max CVSS
5.0
EPSS Score
0.27%
Published
2001-03-12
Updated
2008-09-05
statsconfig.pl in OmniHTTPd 2.07 allows remote attackers to execute arbitrary commands via the mostbrowsers parameter, whose value is used as part of a generated Perl script.
Max CVSS
10.0
EPSS Score
0.12%
Published
2001-03-12
Updated
2008-09-05
The OmniHTTPD visadmin.exe program allows a remote attacker to conduct a denial of service via a malformed URL which causes a large number of temporary files to be created.
Max CVSS
5.0
EPSS Score
3.18%
Published
1999-06-05
Updated
2017-12-19
Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.
Max CVSS
10.0
EPSS Score
1.34%
Published
1999-10-22
Updated
2008-09-09
9 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!