Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Unknown
CVE-2021-26843
Disclosure Date: February 07, 2021 (last updated February 22, 2025)
An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this is similar to CVE-2017-10671, but occurs in a different part of the de_dotdot function.
0
Attacker Value
Unknown
CVE-2007-0158
Disclosure Date: December 27, 2019 (last updated November 27, 2024)
thttpd 2007 has buffer underflow.
0
Attacker Value
Unknown
CVE-2012-5640
Disclosure Date: November 25, 2019 (last updated November 27, 2024)
thttpd has a local DoS vulnerability via specially-crafted .htpasswd files
0
Attacker Value
Unknown
CVE-2017-17663
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The htpasswd implementation of mini_httpd before v1.28 and of thttpd before v2.28 is affected by a buffer overflow that can be exploited remotely to perform code execution.
0
Attacker Value
Unknown
CVE-2017-10671
Disclosure Date: June 29, 2017 (last updated July 20, 2024)
Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename.
0
Attacker Value
Unknown
CVE-2013-0348
Disclosure Date: December 13, 2013 (last updated October 05, 2023)
thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file.
0
Attacker Value
Unknown
CVE-2009-4491
Disclosure Date: January 13, 2010 (last updated October 04, 2023)
thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
0
Attacker Value
Unknown
CVE-2007-0664
Disclosure Date: February 02, 2007 (last updated October 04, 2023)
thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files.
0
Attacker Value
Unknown
CVE-2006-4248
Disclosure Date: October 31, 2006 (last updated October 04, 2023)
thttpd on Debian GNU/Linux, and possibly other distributions, allows local users to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file.
0
Attacker Value
Unknown
CVE-2006-1079
Disclosure Date: March 09, 2006 (last updated February 22, 2025)
htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
0