Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-0410 | 1 Hfs | 1 Http File Server | 2024-11-21 | 5.0 MEDIUM | N/A |
HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as <id>%version%</id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL. | |||||
CVE-2008-0409 | 1 Hfs | 1 Http File Server | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in HTTP File Server (HFS) before 2.2c allows remote attackers to inject arbitrary web script or HTML via the userinfo subcomponent of a URL. | |||||
CVE-2008-0408 | 1 Hfs | 1 Http File Server | 2024-11-21 | 6.4 MEDIUM | N/A |
HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication. | |||||
CVE-2008-0407 | 1 Hfs | 1 Http File Server | 2024-11-21 | 5.0 MEDIUM | N/A |
HTTP File Server (HFS) before 2.2c tags HTTP request log entries with the username sent during HTTP Basic Authentication, regardless of whether authentication succeeded, which might make it more difficult for an administrator to determine who made a remote request. | |||||
CVE-2008-0406 | 1 Hfs | 1 Http File Server | 2024-11-21 | 5.0 MEDIUM | N/A |
HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allows remote attackers to cause a denial of service (daemon crash) via a long account name. | |||||
CVE-2008-0405 | 1 Hfs | 1 Http File Server | 2024-11-21 | 10.0 HIGH | N/A |
Multiple directory traversal vulnerabilities in HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allow remote attackers to create arbitrary (1) files and (2) directories via a .. (dot dot) in an account name, when requesting the / URI; and (3) append arbitrary data to a file via a .. (dot dot) in an account name, when requesting a URI composed of a "/?%0a" sequence followed by the data. |