Filtered by vendor Lighttpd
Subscriptions
Filtered by product Lighttpd
Subscriptions
Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2005-0453 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
The buffer_urldecode function in Lighttpd 1.3.7 and earlier does not properly handle control characters, which allows remote attackers to obtain the source code for CGI and FastCGI scripts via a URL with a %00 (null) character after the file extension. | ||||
CVE-2006-0814 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
response.c in Lighttpd 1.4.10 and possibly previous versions, when run on Windows, allows remote attackers to read arbitrary source code via requests that contain trailing (1) "." (dot) and (2) space characters, which are ignored by Windows, as demonstrated by PHP files. | ||||
CVE-2006-0760 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
LightTPD 1.4.8 and earlier, when the web root is on a case-insensitive filesystem, allows remote attackers to bypass URL checks and obtain sensitive information via file extensions with unexpected capitalization, as demonstrated by a request for index.PHP when the configuration invokes the PHP interpreter only for ".php" names. | ||||
CVE-2007-4727 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow." | ||||
CVE-2007-3948 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
connections.c in lighttpd before 1.4.16 might accept more connections than the configured maximum, which allows remote attackers to cause a denial of service (failed assertion) via a large number of connection attempts. | ||||
CVE-2007-3946 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
mod_auth (http_auth.c) in lighttpd before 1.4.16 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving (1) a memory leak, (2) use of md5-sess without a cnonce, (3) base64 encoded strings, and (4) trailing whitespace in the Auth-Digest header. | ||||
CVE-2007-3949 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
mod_access.c in lighttpd 1.4.15 ignores trailing / (slash) characters in the URL, which allows remote attackers to bypass url.access-deny settings. | ||||
CVE-2007-3947 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
request.c in lighttpd 1.4.15 allows remote attackers to cause a denial of service (daemon crash) by sending an HTTP request with duplicate headers, as demonstrated by a request containing two Location header lines, which results in a segmentation fault. | ||||
CVE-2007-3950 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
lighttpd 1.4.15, when run on 32 bit platforms, allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving the use of incompatible format specifiers in certain debugging messages in the (1) mod_scgi, (2) mod_fastcgi, and (3) mod_webdav modules. | ||||
CVE-2007-1870 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
lighttpd before 1.4.14 allows attackers to cause a denial of service (crash) via a request to a file whose mtime is 0, which results in a NULL pointer dereference. | ||||
CVE-2007-1869 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
lighttpd 1.4.12 and 1.4.13 allows remote attackers to cause a denial of service (cpu and resource consumption) by disconnecting while lighttpd is parsing CRLF sequences, which triggers an infinite loop and file descriptor consumption. | ||||
CVE-2008-4359 | 2 Debian, Lighttpd | 2 Debian Linux, Lighttpd | 2024-08-07 | N/A |
lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data. | ||||
CVE-2008-4360 | 2 Debian, Lighttpd | 2 Debian Linux, Lighttpd | 2024-08-07 | N/A |
mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files. | ||||
CVE-2008-4298 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers. | ||||
CVE-2008-1531 | 2 Debian, Lighttpd | 2 Debian Linux, Lighttpd | 2024-08-07 | N/A |
The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost. | ||||
CVE-2008-1270 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory. | ||||
CVE-2008-1111 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information. | ||||
CVE-2008-0983 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access. | ||||
CVE-2010-0295 | 1 Lighttpd | 1 Lighttpd | 2024-08-07 | N/A |
lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow rate. | ||||
CVE-2011-4362 | 2 Debian, Lighttpd | 2 Debian Linux, Lighttpd | 2024-08-07 | N/A |
Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index. |