Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2008-6938

Disclosure Date: August 11, 2009 (last updated October 04, 2023)
Pi3Web 2.0.3 before PL2, when installed on Windows as a desktop application and without using the Pi3Web/Conf/Intenet.pi3, allows remote attackers to cause a denial of service (crash or hang) and obtain the full pathname of the server via a request to a file in the ISAPI directory that is not an executable DLL, which triggers the crash when the DLL load fails, as demonstrated using Isapi\users.txt.
0
Attacker Value
Unknown

CVE-2007-2415

Disclosure Date: May 01, 2007 (last updated October 04, 2023)
Pi3Web Web Server 2.0.3 PL1 allows remote attackers to cause a denial of service (application exit) via a long URI. NOTE: this issue was originally reported as a crash, but the vendor states that the impact is a "clean" exit in which "the server I/O loop finishes and the process exits normally."
0
Attacker Value
Unknown

CVE-2003-1032

Disclosure Date: February 17, 2004 (last updated February 22, 2025)
Pi3Web web server 2.0.2 Beta 1, when the Directory Index is configured to use the "Name" column and sort using the column title as a hyperlink, allows remote attackers to cause a denial of service (crash) via a malformed URL to the web server, possibly involving a buffer overflow.
0
Attacker Value
Unknown

CVE-2003-0276

Disclosure Date: June 16, 2003 (last updated February 22, 2025)
Buffer overflow in Pi3Web 2.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GET request with a large number of / characters.
0
Attacker Value
Unknown

CVE-2002-0433

Disclosure Date: July 26, 2002 (last updated February 22, 2025)
Pi3Web 2.0.0 allows remote attackers to view restricted files via an HTTP request containing a "*" (wildcard or asterisk) character.
0
Attacker Value
Unknown

CVE-2002-0142

Disclosure Date: March 25, 2002 (last updated February 22, 2025)
CGI handler in John Roy Pi3Web for Windows 2.0 beta 1 and 2 allows remote attackers to cause a denial of service (crash) via a series of requests whose physical path is exactly 260 characters long and ends in a series of . (dot) characters.
0