Directory traversal vulnerability in MyServer 0.11 and 0.2 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP GET request.
Max CVSS
5.0
EPSS Score
0.34%
Published
2002-12-31
Updated
2017-07-29
Directory traversal vulnerability in myServer 0.7 allows remote attackers to list arbitrary directories via an HTTP GET command with a large number of "./" sequences followed by "../" sequences.
Max CVSS
5.0
EPSS Score
1.75%
Published
2004-12-31
Updated
2017-07-11
myServer 0.7.1 allows remote attackers to cause a denial of service (crash) via a long HTTP POST request in a View=Logon operation to index.html.
Max CVSS
5.0
EPSS Score
9.70%
Published
2004-12-31
Updated
2017-07-11
Directory traversal vulnerability in filemanager.cpp in MyServer 0.8 allows remote attackers to list the parent directory of the web root via a URL with a "..." (triple dot).
Max CVSS
5.0
EPSS Score
0.20%
Published
2005-05-18
Updated
2008-09-05
server.cpp in MyServer 0.8.5 calls Process::setuid before calling Process::setgid and thus does not properly drop privileges, which might allow remote attackers to execute CGI programs with unintended privileges.
Max CVSS
7.5
EPSS Score
1.03%
Published
2007-03-21
Updated
2008-11-15
MyServer before 0.8.8 allows remote attackers to cause a denial of service via unspecified vectors.
Max CVSS
7.8
EPSS Score
4.59%
Published
2007-05-01
Updated
2017-07-29
Cross-site scripting (XSS) vulnerability in the cgi-bin/post.mscgi sample page in MyServer 0.8.9 allows remote attackers to inject arbitrary web script or HTML via the body content.
Max CVSS
4.3
EPSS Score
0.54%
Published
2007-06-22
Updated
2018-10-16
Unspecified vulnerability in MyServer 0.8.11 allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests with the HTTP GET, DELETE, OPTIONS, and possibly other methods, related to a "204 No Content error."
Max CVSS
5.0
EPSS Score
4.74%
Published
2008-11-18
Updated
2017-09-29
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!