AN HTTPD 1.42n, and possibly other versions before 1.42p, allows remote attackers to obtain source code of scripts via crafted requests with (1) dot and (2) space characters in the file extension.
Max CVSS
7.8
EPSS Score
1.17%
Published
2006-04-03
Updated
2018-10-18
CRLF injection vulnerability in the cmdIS.DLL plugin for AN HTTPD Server 1.42n allows remote attackers to spoof or hide entries in the logfile, and possibly read files using an injected type command, via CRLF sequences in an HTTP request.
Max CVSS
6.4
EPSS Score
3.09%
Published
2005-04-07
Updated
2017-07-11
Buffer overflow in the cmdIS.DLL plugin for AN HTTPD Server 1.42n allows remote attackers to execute arbitrary code via an HTTP request with a long User-Agent header.
Max CVSS
6.4
EPSS Score
18.04%
Published
2005-05-02
Updated
2017-07-11
Cross-site scripting vulnerability (XSS) in AN HTTP 1.41e allows remote attackers to execute arbitrary web script or HTML as other users via a URL containing the script.
Max CVSS
4.3
EPSS Score
0.40%
Published
2003-12-31
Updated
2008-09-05
AN HTTP 1.41e allows remote attackers to cause a denial of service (borken pipe) via an HTTP request to aux.cgi with a long argument, possibly triggering a buffer overflow or MS-DOS device vulnerability.
Max CVSS
5.0
EPSS Score
0.20%
Published
2003-12-31
Updated
2008-09-05
AN HTTP 1.41e allows remote attackers to obtain the root web server path via an HTTP request with a long argument to a script, which leaks the path in an error message.
Max CVSS
5.0
EPSS Score
0.22%
Published
2003-12-31
Updated
2008-09-05
Buffer overflow in AN HTTPd 1.38 through 1.4.1c allows remote attackers to execute arbitrary code via a SOCKS4 request with a long username.
Max CVSS
7.5
EPSS Score
3.19%
Published
2002-12-31
Updated
2008-09-05
AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.
Max CVSS
7.5
EPSS Score
2.21%
Published
1999-11-02
Updated
2016-10-18
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!